Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-04-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe
-
Size
170KB
-
MD5
7f193964270dc3d207e4413890c95ab2
-
SHA1
e3b1b6adf8292e91234a455397d6496b5d92e322
-
SHA256
29824133432b929766e8287ad658b75ebfef08d62341c0bb338f239c6f114932
-
SHA512
16210a0ee45b1ea20921ea967e44ad569427960c8299840398c8024c7ef88d18ff4aaf18a6331bbc620992e6ae77c221a72381d136b9f4b1070d4cb788e410d4
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpni:2+rA/WSo1rl3ALrlHQpni
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Detects command variations typically used by ransomware 42 IoCs
resource yara_rule behavioral1/memory/1108-2-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-3-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-17-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-19-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-23-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-27-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-25-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-31-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-18-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-33-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-37-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-40-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-44-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-46-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-49-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-42-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-56-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-58-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-60-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-63-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-64-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-66-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-71-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-75-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-78-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-80-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-77-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-83-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-74-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-89-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-88-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-91-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-95-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-93-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-100-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-102-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-106-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-107-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-109-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-114-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1108-2122-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/1160-2513-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing many references to VEEAM. Observed in ransomware 42 IoCs
resource yara_rule behavioral1/memory/1108-2-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-3-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-17-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-19-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-23-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-27-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-25-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-31-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-18-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-33-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-37-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-40-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-44-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-46-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-49-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-42-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-56-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-58-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-60-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-63-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-64-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-66-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-71-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-75-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-78-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-80-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-77-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-83-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-74-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-89-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-88-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-91-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-95-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-93-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-100-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-102-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-106-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-107-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-109-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-114-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1108-2122-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral1/memory/1160-2513-0x000000013FC20000-0x000000013FFAE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\hy.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861261279.profile.gz taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.property.nl_zh_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Month_Calendar.emf taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+1 taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\ECLIPSE_.RSA taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\toc.gif taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui_3.106.0.v20140812-1751.jar taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Guadalcanal taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Saipan taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-2 taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\curtains.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\NetworkServerControl.bat taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_scene.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\javaws.policy taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jayapura taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Madrid taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.ecore.xmi_2.10.1.v20140901-1043.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_zh_CN.properties taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.batik.util.gui_1.7.0.v200903091627.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\DumontDUrville taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Tahiti taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher.nl_ja_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml taskhost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\huemainsubpicture2.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.bidi_0.10.0.v20130327-1442.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Anchorage taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.ui.ja_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme_0.9.300.v20140424-2042.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator_1.1.0.v20131217-1203.jar taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\index.gif taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme.nl_zh_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Title_mainImage-mask.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_notes.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nome taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Bougainville taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.application.zh_CN_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\LICENSE taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Helsinki taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\HST taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Port_Moresby taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\PST8PDT taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passportcover.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Panama taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jakarta taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse_2.1.200.v20140512-1650.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text.nl_zh_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Metlakatla taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2868 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2488 2868 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 28 PID 2868 wrote to memory of 2488 2868 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 28 PID 2868 wrote to memory of 2488 2868 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 28 PID 2868 wrote to memory of 1108 2868 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 19 PID 2488 wrote to memory of 2264 2488 cmd.exe 30 PID 2488 wrote to memory of 2264 2488 cmd.exe 30 PID 2488 wrote to memory of 2264 2488 cmd.exe 30 PID 2868 wrote to memory of 1160 2868 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 20
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe" /f3⤵
- Adds Run key to start application
PID:2264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda