Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe
-
Size
170KB
-
MD5
aba18ddf7490e3c6bb95d8ebbc1d8fd1
-
SHA1
965018fae5c6e43ef8bc1c5c550201e499cb15c0
-
SHA256
916a76052e84693bf9f65457d67a4b31f0f1db8f89cfbcdf579743b9c52a1886
-
SHA512
f4007aa617eb9cd6001c6b3fefb60afa352806370ced4bb09921e257299cbdbc0cd551e19396786b3676395a7e08e53ba1c68b7f98ed56f8f97e5f2b7a5da1f9
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpn8:2+rA/WSo1rl3ALrlHQpn8
Malware Config
Signatures
-
Detects command variations typically used by ransomware 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2540-0-0x00007FF741740000-0x00007FF741ACE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral2/memory/2540-1-0x00007FF741740000-0x00007FF741ACE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing many references to VEEAM. Observed in ransomware 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2540-0-0x00007FF741740000-0x00007FF741ACE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral2/memory/2540-1-0x00007FF741740000-0x00007FF741ACE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exepid process 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exedescription pid process Token: SeDebugPrivilege 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.execmd.exedescription pid process target process PID 4796 wrote to memory of 1056 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe cmd.exe PID 4796 wrote to memory of 1056 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe cmd.exe PID 4796 wrote to memory of 2540 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe sihost.exe PID 1056 wrote to memory of 3388 1056 cmd.exe reg.exe PID 1056 wrote to memory of 3388 1056 cmd.exe reg.exe PID 4796 wrote to memory of 2568 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe svchost.exe PID 4796 wrote to memory of 2680 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe taskhostw.exe PID 4796 wrote to memory of 3652 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe svchost.exe PID 4796 wrote to memory of 3816 4796 2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe DllHost.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2568
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-04-07_aba18ddf7490e3c6bb95d8ebbc1d8fd1_ryuk.exe" /f3⤵
- Adds Run key to start application
PID:3388
-
-