Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 14:54

General

  • Target

    2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe

  • Size

    577KB

  • MD5

    7daf0e15401f2cf0cc13592dc63c5b55

  • SHA1

    aa307d7ec500baf6fea6f7388dd59ab427be12f0

  • SHA256

    657dd292929810602b1edd43a3970867639949b66b95e683567baefae8353aa0

  • SHA512

    485ade2cf26d6309189cfc6215b12d880eb4c1f4485463f2aaceed49e83ea723e2ed98412726ef79799c4ac4ba907fe470e30f49ae26bc13bc70da24c0dee882

  • SSDEEP

    6144:kn2yi4uy3wpb5MyzHPea26rafnxa5igm/RXTG01muPUexRoh4xwigLtjWTQat+1N:knR7uy3y5TvA6G5PL/HoLxlat+OOst

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /C "powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.59462344778C5*" | Remove-AppxPackage -AllUsers""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.59462344778C5*" | Remove-AppxPackage -AllUsers"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3600
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /C ""Get-AppXProvisionedPackage -Online | where PackageName -Like "AdvancedMicroDevicesInc-2.59462344778C5*" | Remove-AppXProvisionedPackage -Online""
      2⤵
        PID:2096
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /C "powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.AMDDisplayEnhance_0a9344xs7nr4m*" | Remove-AppxPackage -AllUsers""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3568
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.AMDDisplayEnhance_0a9344xs7nr4m*" | Remove-AppxPackage -AllUsers"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1540
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /C ""Get-AppXProvisionedPackage -Online | where PackageName -Like "AdvancedMicroDevicesInc-2.AMDDisplayEnhance_0a9344xs7nr4m*" | Remove-AppXProvisionedPackage -Online""
        2⤵
          PID:3776
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /C "powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.AMDGraphicsProfile_0a9344xs7nr4m*" | Remove-AppxPackage -AllUsers""
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell "Get-AppxPackage -AllUsers "AdvancedMicroDevicesInc-2.AMDGraphicsProfile_0a9344xs7nr4m*" | Remove-AppxPackage -AllUsers"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3228
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /C ""Get-AppXProvisionedPackage -Online | where PackageName -Like "AdvancedMicroDevicesInc-2.AMDGraphicsProfile_0a9344xs7nr4m*" | Remove-AppXProvisionedPackage -Online""
          2⤵
            PID:1120
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "AMDDVRAnalytics" /F
            2⤵
              PID:4900

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            958ec9d245aa0e4bd5d05bbdb37475f4

            SHA1

            80e6d2c6a85922cb83b9fea874320e9c53740bd9

            SHA256

            a01df48cd7398ad6894bc40d27fb024dcdda87a3315934e5452a2a3e7dfb371d

            SHA512

            82567b9f898238e38b3b6b3cdb2565be8cac08788e612564c6ac1545f161cd5c545ba833946cc6f0954f38f066a20c9a4922a09f7d37604c71c8f0e7e46a59ec

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            e1940a586785c9170f03f6487276ed0d

            SHA1

            0e631c850dd89e7948874a6e32c912ed43dd7df1

            SHA256

            f09f40f11e825361e2b58b706812399d91cfe53197b9f0404a62eb1e0088dc6f

            SHA512

            ff7727c5b61dd1af03bc6443092fa60d8e857b4a336d77ee06ec64b5b7622cfff2a9971d0f651db7d2002ca324cb7eb54ab190e6a48d22b92727d718e03a298c

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            d486c18652cf2131c43fbcaf092cd122

            SHA1

            53297cfead4e317f7df391e8425bf0c380764e21

            SHA256

            c4c059feb26f103fd9ae42ebb808039d06fce0f15fec0211fac52a1ce93dfb27

            SHA512

            30a0e97d7812fcf5397b5b39f833df2a82e8ed0ee8fa13ccd6026e660d236aca112b5b612c0627a444059d2524310669a6d73e252080480440f3d7510d305fa1

          • C:\Users\Admin\AppData\Local\Temp\WUCNLog.log

            Filesize

            287B

            MD5

            a99ed801634710099e1a92c6a1c27cec

            SHA1

            d4bfe31420e0f833d47b7e5d8d5c71f005abbc59

            SHA256

            329b5e78b56adc3c27a1a9e6b74c47db1686ada7b6b98945dd7d2f2aff7cb8ac

            SHA512

            c2baa653eb6a8d9a66957508eb05975ad1f35e292410b9c7dd2e5d43a34c0b7fb9f5b23364403c73c4b81f828df884457c73327155738b098d23b27f9f2d84e7

          • C:\Users\Admin\AppData\Local\Temp\WUCNLog.log

            Filesize

            1KB

            MD5

            af7f3c7c53d541bc34326737b7684763

            SHA1

            55fac57afa98397f58611bfc243e9ea3bd90ab24

            SHA256

            47d352170380cddbce932a7a20c0c87eee2b6ce280766775ea75620b540c98eb

            SHA512

            f4161f09a97915bb50a6c73a344a2b7bd16560c40f87a473794f0950e51118a18ad95cec4d008e4da6cb8087c033040924cd98686a9ccd50340dd73b39f6cee5

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_34anmjcs.40r.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/3600-19-0x00007FFBC2780000-0x00007FFBC3241000-memory.dmp

            Filesize

            10.8MB

          • memory/3600-20-0x000001C8F70A0000-0x000001C8F70B6000-memory.dmp

            Filesize

            88KB

          • memory/3600-21-0x000001C8F7090000-0x000001C8F709A000-memory.dmp

            Filesize

            40KB

          • memory/3600-22-0x000001C8F7360000-0x000001C8F7386000-memory.dmp

            Filesize

            152KB

          • memory/3600-25-0x00007FFBC2780000-0x00007FFBC3241000-memory.dmp

            Filesize

            10.8MB

          • memory/3600-18-0x00007FFBC2780000-0x00007FFBC3241000-memory.dmp

            Filesize

            10.8MB

          • memory/3600-8-0x000001C8F6E10000-0x000001C8F6E32000-memory.dmp

            Filesize

            136KB

          • memory/3600-7-0x00007FFBC2783000-0x00007FFBC2785000-memory.dmp

            Filesize

            8KB

          • memory/3756-0-0x00007FF7A7E10000-0x00007FF7A7EA4000-memory.dmp

            Filesize

            592KB

          • memory/3756-65-0x00007FF7A7E10000-0x00007FF7A7EA4000-memory.dmp

            Filesize

            592KB