Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe
-
Size
577KB
-
MD5
7daf0e15401f2cf0cc13592dc63c5b55
-
SHA1
aa307d7ec500baf6fea6f7388dd59ab427be12f0
-
SHA256
657dd292929810602b1edd43a3970867639949b66b95e683567baefae8353aa0
-
SHA512
485ade2cf26d6309189cfc6215b12d880eb4c1f4485463f2aaceed49e83ea723e2ed98412726ef79799c4ac4ba907fe470e30f49ae26bc13bc70da24c0dee882
-
SSDEEP
6144:kn2yi4uy3wpb5MyzHPea26rafnxa5igm/RXTG01muPUexRoh4xwigLtjWTQat+1N:knR7uy3y5TvA6G5PL/HoLxlat+OOst
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\LaunchWUApp = "C:\\AMD\\WU-CCC2\\ccc2_install\\LaunchWLApp.bat" 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3600 powershell.exe 3600 powershell.exe 1540 powershell.exe 1540 powershell.exe 3228 powershell.exe 3228 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3600 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeDebugPrivilege 3228 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3756 wrote to memory of 4064 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 83 PID 3756 wrote to memory of 4064 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 83 PID 4064 wrote to memory of 3600 4064 cmd.exe 85 PID 4064 wrote to memory of 3600 4064 cmd.exe 85 PID 3756 wrote to memory of 2096 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 88 PID 3756 wrote to memory of 2096 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 88 PID 3756 wrote to memory of 3568 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 90 PID 3756 wrote to memory of 3568 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 90 PID 3568 wrote to memory of 1540 3568 cmd.exe 92 PID 3568 wrote to memory of 1540 3568 cmd.exe 92 PID 3756 wrote to memory of 3776 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 94 PID 3756 wrote to memory of 3776 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 94 PID 3756 wrote to memory of 2232 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 96 PID 3756 wrote to memory of 2232 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 96 PID 2232 wrote to memory of 3228 2232 cmd.exe 98 PID 2232 wrote to memory of 3228 2232 cmd.exe 98 PID 3756 wrote to memory of 1120 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 99 PID 3756 wrote to memory of 1120 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 99 PID 3756 wrote to memory of 4900 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 101 PID 3756 wrote to memory of 4900 3756 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C "powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.59462344778C5*" | Remove-AppxPackage -AllUsers""2⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.59462344778C5*" | Remove-AppxPackage -AllUsers"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C ""Get-AppXProvisionedPackage -Online | where PackageName -Like "AdvancedMicroDevicesInc-2.59462344778C5*" | Remove-AppXProvisionedPackage -Online""2⤵PID:2096
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C "powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.AMDDisplayEnhance_0a9344xs7nr4m*" | Remove-AppxPackage -AllUsers""2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.AMDDisplayEnhance_0a9344xs7nr4m*" | Remove-AppxPackage -AllUsers"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C ""Get-AppXProvisionedPackage -Online | where PackageName -Like "AdvancedMicroDevicesInc-2.AMDDisplayEnhance_0a9344xs7nr4m*" | Remove-AppXProvisionedPackage -Online""2⤵PID:3776
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C "powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.AMDGraphicsProfile_0a9344xs7nr4m*" | Remove-AppxPackage -AllUsers""2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.AMDGraphicsProfile_0a9344xs7nr4m*" | Remove-AppxPackage -AllUsers"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C ""Get-AppXProvisionedPackage -Online | where PackageName -Like "AdvancedMicroDevicesInc-2.AMDGraphicsProfile_0a9344xs7nr4m*" | Remove-AppXProvisionedPackage -Online""2⤵PID:1120
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "AMDDVRAnalytics" /F2⤵PID:4900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5958ec9d245aa0e4bd5d05bbdb37475f4
SHA180e6d2c6a85922cb83b9fea874320e9c53740bd9
SHA256a01df48cd7398ad6894bc40d27fb024dcdda87a3315934e5452a2a3e7dfb371d
SHA51282567b9f898238e38b3b6b3cdb2565be8cac08788e612564c6ac1545f161cd5c545ba833946cc6f0954f38f066a20c9a4922a09f7d37604c71c8f0e7e46a59ec
-
Filesize
1KB
MD5e1940a586785c9170f03f6487276ed0d
SHA10e631c850dd89e7948874a6e32c912ed43dd7df1
SHA256f09f40f11e825361e2b58b706812399d91cfe53197b9f0404a62eb1e0088dc6f
SHA512ff7727c5b61dd1af03bc6443092fa60d8e857b4a336d77ee06ec64b5b7622cfff2a9971d0f651db7d2002ca324cb7eb54ab190e6a48d22b92727d718e03a298c
-
Filesize
1KB
MD5d486c18652cf2131c43fbcaf092cd122
SHA153297cfead4e317f7df391e8425bf0c380764e21
SHA256c4c059feb26f103fd9ae42ebb808039d06fce0f15fec0211fac52a1ce93dfb27
SHA51230a0e97d7812fcf5397b5b39f833df2a82e8ed0ee8fa13ccd6026e660d236aca112b5b612c0627a444059d2524310669a6d73e252080480440f3d7510d305fa1
-
Filesize
287B
MD5a99ed801634710099e1a92c6a1c27cec
SHA1d4bfe31420e0f833d47b7e5d8d5c71f005abbc59
SHA256329b5e78b56adc3c27a1a9e6b74c47db1686ada7b6b98945dd7d2f2aff7cb8ac
SHA512c2baa653eb6a8d9a66957508eb05975ad1f35e292410b9c7dd2e5d43a34c0b7fb9f5b23364403c73c4b81f828df884457c73327155738b098d23b27f9f2d84e7
-
Filesize
1KB
MD5af7f3c7c53d541bc34326737b7684763
SHA155fac57afa98397f58611bfc243e9ea3bd90ab24
SHA25647d352170380cddbce932a7a20c0c87eee2b6ce280766775ea75620b540c98eb
SHA512f4161f09a97915bb50a6c73a344a2b7bd16560c40f87a473794f0950e51118a18ad95cec4d008e4da6cb8087c033040924cd98686a9ccd50340dd73b39f6cee5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82