Analysis
-
max time kernel
7s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe
Resource
win10v2004-20240412-en
Errors
General
-
Target
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe
-
Size
170KB
-
MD5
7f193964270dc3d207e4413890c95ab2
-
SHA1
e3b1b6adf8292e91234a455397d6496b5d92e322
-
SHA256
29824133432b929766e8287ad658b75ebfef08d62341c0bb338f239c6f114932
-
SHA512
16210a0ee45b1ea20921ea967e44ad569427960c8299840398c8024c7ef88d18ff4aaf18a6331bbc620992e6ae77c221a72381d136b9f4b1070d4cb788e410d4
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpni:2+rA/WSo1rl3ALrlHQpni
Malware Config
Signatures
-
Detects command variations typically used by ransomware 2 IoCs
resource yara_rule behavioral2/memory/2560-0-0x00007FF73F660000-0x00007FF73F9EE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral2/memory/2560-1-0x00007FF73F660000-0x00007FF73F9EE000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing many references to VEEAM. Observed in ransomware 2 IoCs
resource yara_rule behavioral2/memory/2560-0-0x00007FF73F660000-0x00007FF73F9EE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral2/memory/2560-1-0x00007FF73F660000-0x00007FF73F9EE000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000\Control Panel\International\Geo\Nation 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2200 wrote to memory of 3968 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 89 PID 2200 wrote to memory of 3968 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 89 PID 2200 wrote to memory of 2560 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 42 PID 3968 wrote to memory of 1372 3968 cmd.exe 91 PID 3968 wrote to memory of 1372 3968 cmd.exe 91 PID 2200 wrote to memory of 2568 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 43 PID 2200 wrote to memory of 2816 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 48 PID 2200 wrote to memory of 3524 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 57 PID 2200 wrote to memory of 3716 2200 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe 58
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2568
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3524
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe" /f3⤵
- Adds Run key to start application
PID:1372
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4048,i,5838972776061051553,16186488414347324308,262144 --variations-seed-version --mojo-platform-channel-handle=1444 /prefetch:81⤵PID:3792