Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe
Resource
win7-20240221-en
General
-
Target
2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe
-
Size
1.1MB
-
MD5
7aac0b10aee1779dd2535b005ceb9f68
-
SHA1
ab6c46c38338d22bc44c0eb35a00dc271f8ed2d4
-
SHA256
c48930d91e4a0d6450b75d620d295cf84c7c1892e4f3c68cb2d1aa1a9b48c0a1
-
SHA512
1647205b60f2888bd2e482dce7eda110a362cde027315c3cb87c2d9baa11e225ae7764ed302ada233ec39dfcb220052406a1aa3bc19f24840abce5a3b0eed39a
-
SSDEEP
24576:nSi1SoCU5qJSr1eWPSCsP0MugC6eTv743TvRk6NwG:vS7PLjeT8Dv66mG
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 3004 alg.exe 4824 DiagnosticsHub.StandardCollector.Service.exe 2356 fxssvc.exe 4648 elevation_service.exe 4324 elevation_service.exe 4368 maintenanceservice.exe 5080 OSE.EXE 3892 msdtc.exe 2600 PerceptionSimulationService.exe 1964 perfhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe 2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\dc4c62b6b3e2edcd.bin DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{1342F81A-D5C5-42B4-A5E8-933F7759DA30}\chrome_installer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7zG.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4824 DiagnosticsHub.StandardCollector.Service.exe 4824 DiagnosticsHub.StandardCollector.Service.exe 4824 DiagnosticsHub.StandardCollector.Service.exe 4824 DiagnosticsHub.StandardCollector.Service.exe 4824 DiagnosticsHub.StandardCollector.Service.exe 4824 DiagnosticsHub.StandardCollector.Service.exe 4824 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3080 2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe Token: SeAuditPrivilege 2356 fxssvc.exe Token: SeDebugPrivilege 4824 DiagnosticsHub.StandardCollector.Service.exe Token: SeTakeOwnershipPrivilege 4648 elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_7aac0b10aee1779dd2535b005ceb9f68_ryuk.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:3004
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4748
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4324
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4368
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3612 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:4608
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3892
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:2600
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD587ee5a325eedc481ddeff0f054b2464a
SHA16e6146df99ac361254a6fd1c9cefa810b0553d48
SHA25642135e4afd8685714a5a224eac53ea7b79f43a7db9cfac159ad987a111ed6171
SHA512e876eddde3967be6c67168ee855a2c8f1b846521509446064d85b37c5d086a6b9c56e230d007ef272fdcde77755d9bc569d7e1b01d6298384f0687bd38fccacb
-
Filesize
1.4MB
MD504dd6086f346dfe6ba411a1536d9588e
SHA1293820ac9f3dd02ea4de8d5aac2a5498be9b0a8c
SHA256b5da7560e024b5c2e0eae69b1f1c6ad1d588fe829226f96952ca6385999df851
SHA51201dc5c01e2cea0e9d85da489a28e18f27546b8196d0f05053cbf2084559ffff4312889a243e71551a256581fc748729ab3f119f65c2c95f9a26e106ae7a87502
-
Filesize
1.4MB
MD5caf6ce766d8325274a94c2b80d7a4885
SHA106c81c5f3cb90ae3c982aff6ebfb5098ce07727a
SHA256864443c52b0051bfdcc5bb0ca6cb048f647dc5157cacc91de40ce6255d54a3fd
SHA5122b419b88fee530e667cb5f6f4b1cc0a2786153b109602ff48dde3ba9c5843313a739dbd951052e176b0e6de3e8e61be65b74370a6c7b72cea52253654f3c32c3
-
Filesize
2.1MB
MD539f9fe293eea3392ffaf9a71aa0f903e
SHA1b90b2b14d1fb98482bb936f7244847967c6a8770
SHA256a49251e3809ac8e5f61752d423a1a001a17f2e46ff9ad37ca10c78b3fe5b1f1e
SHA512ad76e38cbc3a85c2a620c05c6b3da03189f1cfb1da33f26595633e2d7aa2271c4dc0ff58b9885c068f701393b8293cb3dd55e65d63fecacfe5027e94a9b64e16
-
Filesize
1.2MB
MD55f33fc772079b4f6af3f9c6c62bb00ac
SHA17afe3c8c0283dc1c32aa2949ea1c1de8ed247ef9
SHA25661e652b9ee2d45dcf86dc98949192d6ea224f75e351917c7d9101a2f8cb156cf
SHA5125b8aa3c2b987cfc322dc0faa42be150d68acd564fd4dab1de08e1042e9268946dc926e39b4bcad4e2ef3e5150b632b152c071ea79ed96a61839e4a0a8b118c37
-
Filesize
1.3MB
MD51d0a8915b47671b2cdce71bb7eb79471
SHA146120bd1f2f2921d77fef1606c444782b97da5da
SHA2568602109209b078727318cdb868a4974f4397c05d0a690bc29931b80bfc132ea2
SHA512021d63ad3b64952f6a7cc5a34e85827a4bc46d2a646cf2a8a437c3c81e83b2b9a7fe8f153dfe41682f7c9a4a0f903d606c18a7c095548f55ed145a6c3f4f06ef
-
Filesize
1.2MB
MD5cbab02c37f4bfd7ac26c74b2e48f788b
SHA18ef9ecaa7c2ccc7d429cafa36bcea4de24d7c397
SHA25690edf868b86cb05ac17d3063b6291ac8f25f4e3a08310f773e4788d5a762ba5e
SHA5126abd4c9ecb4c70fad0d5df22adda9cd7483c1ce4236b7fc2c544d192c4d930246c8939658e7e5a4495d507066db210368216b5275365521df9d1989aa63d498d
-
Filesize
1.3MB
MD5a5d1e3e663de9efdc27bf423d2dce5e4
SHA1c2127a216aead64a7d2d42917b804c6aeb9e81ee
SHA2567516163b27a0b778c6c98639c025615b2ee19e2d043eaed0964970b834b9b091
SHA512caa3a95232a975f4babaa8b451796a340b9a00283e7df31bd5e7e0dac906fd7668ba6b00146b186c390e32c338e4606b6731f1c2674e1efd56a7d384e7d1a78b
-
Filesize
1.3MB
MD5219624955902107a321298d3f25e9149
SHA11c100ea98d1bf86f75a12ab449caadc152b543ce
SHA2569be83bce652c82242c320fac4534fcc24bd55c23c78ff11d609c9ba103acf3d0
SHA512b58db8e266f753a668a7e0b496ccd5ef0ec318919c06ae55db7524a679de90419fd43e72f6552a14b5454baa05fadc8a3bb0e7c6dedfa4f42bc9c238100b9164
-
Filesize
1.3MB
MD5239bfd1d882dc73ca20d11693d69cc9c
SHA1dceaea525151153e0fafc01f118310f1ded6f8c4
SHA256a66e5bd3f6c57028e74671435bc3b631591820598138042030eb7d257e7157f1
SHA512a6caf2fb3ef4121d733cf6a468b5b18450767e46c2323e950dec583308944086733fa0f3fd6ffc7cb42ad7fb4811f599e8b5f89a132e71d29d8c92f012a1f61c
-
Filesize
1.3MB
MD525e4020afe65e26634c6de018d684373
SHA1ae38f213254dd41edd21d1a22bf562586720a6fd
SHA2566b8fa05703048e43f214a1108a5e204fd5c19800106024f3e5c31af8cfe1395f
SHA5124422157cd1e3a987b37a1853675cfeca5ae0e28b3c822dcbf136de2ead6d022fb3aa08df3784efc7d2a9f0ba677324271a04b7f833d2e7577ee0890aa4bc4368