Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe
-
Size
170KB
-
MD5
aba18ddf7490e3c6bb95d8ebbc1d8fd1
-
SHA1
965018fae5c6e43ef8bc1c5c550201e499cb15c0
-
SHA256
916a76052e84693bf9f65457d67a4b31f0f1db8f89cfbcdf579743b9c52a1886
-
SHA512
f4007aa617eb9cd6001c6b3fefb60afa352806370ced4bb09921e257299cbdbc0cd551e19396786b3676395a7e08e53ba1c68b7f98ed56f8f97e5f2b7a5da1f9
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpn8:2+rA/WSo1rl3ALrlHQpn8
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Detects command variations typically used by ransomware 50 IoCs
Processes:
resource yara_rule behavioral1/memory/1128-2-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-3-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-17-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-18-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-20-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-21-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-23-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-25-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-27-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-28-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-24-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-31-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-33-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-36-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-37-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-39-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-43-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-46-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-45-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-48-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-50-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-53-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-51-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-57-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-59-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-61-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-64-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-62-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-71-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-72-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-74-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-75-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-77-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-80-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-78-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-85-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-86-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-89-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-90-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-92-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-95-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-102-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-100-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-105-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-107-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-109-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-113-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-115-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1128-972-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1184-1304-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing many references to VEEAM. Observed in ransomware 50 IoCs
Processes:
resource yara_rule behavioral1/memory/1128-2-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-3-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-17-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-18-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-20-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-21-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-23-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-25-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-27-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-28-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-24-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-31-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-33-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-36-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-37-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-39-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-43-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-46-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-45-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-48-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-50-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-53-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-51-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-57-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-59-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-61-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-64-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-62-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-71-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-72-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-74-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-75-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-77-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-80-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-78-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-85-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-86-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-89-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-90-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-92-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-95-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-102-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-100-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-105-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-107-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-109-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-113-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-115-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1128-972-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1184-1304-0x000000013F8B0000-0x000000013FC3E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
taskhost.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\1047x576black.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Casablanca taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Denver taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Vevay taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Tegucigalpa taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\plugin.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\ECLIPSE_.RSA taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(inch).wmf taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861240811.profile.gz taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-background.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\bandwidth.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Resolute taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Tell_City taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Toronto taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\photograph.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Rothera taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Currie taskhost.exe File opened for modification C:\Program Files\DVD Maker\fieldswitch.ax taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-bullet.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Aqtobe taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-static.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_zh_TW.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunec.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\MST7 taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.ja_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ho_Chi_Minh taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.properties taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\contbig.gif taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Eirunepe taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\MANIFEST.MF taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_rgb.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Thimphu taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Chita taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Petersburg taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Novokuznetsk taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_postage_Thumbnail.bmp taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Macquarie taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Riyadh87 taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Canary taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\feature.properties taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.ibm.icu_52.1.0.v201404241930.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml taskhost.exe File opened for modification C:\Program Files\Common Files\System\ado\adojavas.inc taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-image-mask.png taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exepid process 1704 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exedescription pid process Token: SeDebugPrivilege 1704 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.execmd.exedescription pid process target process PID 1704 wrote to memory of 1720 1704 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe cmd.exe PID 1704 wrote to memory of 1720 1704 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe cmd.exe PID 1704 wrote to memory of 1720 1704 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe cmd.exe PID 1704 wrote to memory of 1128 1704 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe taskhost.exe PID 1720 wrote to memory of 1760 1720 cmd.exe reg.exe PID 1720 wrote to memory of 1760 1720 cmd.exe reg.exe PID 1720 wrote to memory of 1760 1720 cmd.exe reg.exe PID 1704 wrote to memory of 1184 1704 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe Dwm.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe" /f3⤵
- Adds Run key to start application
PID:1760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda