Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe
-
Size
4.3MB
-
MD5
df432101171c78c912ddd5ba26707cc2
-
SHA1
1780cd288935787f87f0569e4f4d792e3933414c
-
SHA256
04d186d7189a0169524d7e980e03ea2ad6cca3f07c3cf9053963ef2451436732
-
SHA512
92d4398c8c09364f915e221f7523a4a20e9b2ab04b7ee2e7e52b8dfb0978f84cd133d88e77ea90f34ea03e5ce619812b7befd10f9c8080f06223b217fe2e3aac
-
SSDEEP
49152:tJ2NYoVYKmsB7UYzXQRPbyV1w1xXG+I/WGC/qmrwFzekI4RRFnFtZnNs4T3Bet2j:pATzgQVr+/GC/qAwDnL1x1PDtC
Malware Config
Signatures
-
Detects executables calling ClearMyTracksByProcess 1 IoCs
resource yara_rule behavioral2/memory/4636-32-0x0000000010000000-0x0000000010061000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess -
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023516-5.dat UPX behavioral2/memory/4636-6-0x0000000000400000-0x0000000000558000-memory.dmp UPX behavioral2/memory/4636-43-0x0000000000400000-0x0000000000558000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 4636 QPqTHGsg.exe -
resource yara_rule behavioral2/files/0x0008000000023516-5.dat upx behavioral2/memory/4636-6-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/memory/4636-43-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3944 2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe 3944 2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe 3944 2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe 3944 2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4636 QPqTHGsg.exe 4636 QPqTHGsg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3944 wrote to memory of 4636 3944 2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe 95 PID 3944 wrote to memory of 4636 3944 2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe 95 PID 3944 wrote to memory of 4636 3944 2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe 95 PID 4636 wrote to memory of 1988 4636 QPqTHGsg.exe 98 PID 4636 wrote to memory of 1988 4636 QPqTHGsg.exe 98 PID 4636 wrote to memory of 1988 4636 QPqTHGsg.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_df432101171c78c912ddd5ba26707cc2_ryuk.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Public\Downloads\p84i0v7G\QPqTHGsg.exe"C:\Users\Public\Downloads\p84i0v7G\QPqTHGsg.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini3⤵PID:1988
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1048,i,5838972776061051553,16186488414347324308,262144 --variations-seed-version --mojo-platform-channel-handle=1052 /prefetch:81⤵PID:1584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e39405e85e09f64ccde0f59392317dd3
SHA19c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b
SHA256cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f
SHA5126733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a
-
Filesize
36KB
MD5f6bf82a293b69aa5b47d4e2de305d45a
SHA14948716616d4bbe68be2b4c5bf95350402d3f96f
SHA2566a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0
SHA512edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa
-
Filesize
358KB
MD5f3a6652861cc10d29c151b798bc02250
SHA147fa2c86d17f38c2b4f3317fcb8b2c91da105490
SHA256885e37f95b5378d32ad583d85c50381f4fe5d183607647c780e88bb6d0d109f5
SHA51241d7e4e27ea8cf072d6dfe81c9bc4b7a4e2a6043242201db376cd71e5d88b570d22a0a568cd3474f04b47046f445f15dee022bb328ad43acc56dc6841b16441a
-
Filesize
132KB
MD592d635d735cca3ba249eedd55917202b
SHA1fcc10fe057831067e28968460970b55acafc5427
SHA256f34e6a4405cb8fe97465f72164431b14587fc757e60e3c19ca128422c0d7e12e
SHA5126b7d899c83161f462e2d8debc9c2448fb95d26ca7873e396c1fd4af7b27dcfa699d0dfec7a8c93758b9609d92a5e58e7c3c1bc74186b8787bbf677f12dd28620
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
53KB
MD5309da49a2b576d4ae33cfcad1f69b4db
SHA14dde5c24b73ab7dd797d66361531343aad3ae4b7
SHA25641fb91b112157f5d6a4189af541f1bdca44e15217294a596ab112c81ac8fdfc6
SHA5121a0a7c97cbd29f676bf2328d8b4cfdf7b73653bbc91dc0e108def42281f7b04db83a9ea16d2dcec3339a88e23a261bc7075449f4b7e79f77506be3dbeed92dcc