Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe
-
Size
4.9MB
-
MD5
af5d43475fb5a2cfb98d359d08df7fd1
-
SHA1
af757310b7d75513842e7b05d9ebe0855c88ee00
-
SHA256
94717ff72ab2c2465df984bed7d3c81e0625ae27324f59e0aed6b5f9e428c3ef
-
SHA512
4767b0407fb5cb617f56bcfc35863ae0537e06563bbd213b401c068053326092e4e9d1186f6702827fb547046c7c848f7fa07ddd78f235b6e0ccd25d2bc9df8e
-
SSDEEP
98304:KAsskRAdKvmGy0cljyi9vzlVkOekp/ekPjqgBE0d:OskRM3U0BV4kYmqQ9
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe -
Deletes itself 1 IoCs
pid Process 2600 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe -
Modifies registry class 2 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\SHELL\BAGMRU 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Key deleted \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\SHELL\MUICACHE 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1540 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1540 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Token: SeSecurityPrivilege 1540 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Token: SeShutdownPrivilege 1540 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Token: SeBackupPrivilege 2600 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Token: SeSecurityPrivilege 2600 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe Token: SeShutdownPrivilege 2600 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1540 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe 2600 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2600 1540 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe 28 PID 1540 wrote to memory of 2600 1540 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe 28 PID 1540 wrote to memory of 2600 1540 2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe"1⤵
- Modifies firewall policy service
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe"2024-03-28_af5d43475fb5a2cfb98d359d08df7fd1_ryuk.exe"2⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD509d16370f92906e1a534ac2475a353ac
SHA1c62f5162e6ac57e789cdee209904bdbd303c671a
SHA2563b10894413b49fea4f02e49bc00a02aa6620cc6222a9171022668aaeceeb8a4f
SHA51256639b8e83335c2e0c2f92c8aaf73ad720742179ba0aba61dfd342520740ef146bc9f06ffb38a932b1e08c9b8280da7760f25d49a096783f74be2a7cad1815ab
-
Filesize
1.0MB
MD53b5cb38dae23f3d0e7fcef07392910c8
SHA12efee09a5af95151900761eb7366a5dc913dd0a0
SHA2569ad4ccbede5f41fb591bec3db68a53d4a5c78c78846b49446850242a74a37936
SHA5120412685e303d720118e023b2e5aa0bdaf4e8e8a62037ed1f35f2459fba52792820b41694b24070e5cd39a3b20287611f1dcb3179a024f981aae191a1c5772aea
-
Filesize
12B
MD535f4c78ddcf2808dd67d5a20617fd7f0
SHA1da9a8c19f1e539aee9dd0160b3f06c499f993b8f
SHA25699eacd1d0c50ee8d0be66fe334ce0cb0a24bbfddf0b2f24360ffdfc1e0151b08
SHA512a1d64d98e3d361ad223d0b0d402bc632e475cb35064e798736be88a63f3c5e50f69f40d7980bdcff09c74a5cfb9ea8a31c6f9139f8ddef2d5eb56ef44187089a