Analysis

  • max time kernel
    330s
  • max time network
    319s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 03:00

General

  • Target

    Ryuk .Net Ransomware Builder.exe

  • Size

    287KB

  • MD5

    b20d5ada2e81683bda32aa80cd71c025

  • SHA1

    1ab3daa872761d887ef0be9ace528ee323201211

  • SHA256

    0d8b4a07e91e02335f600332644e8f0e504f75ab19899a58b2c85ecb0887c738

  • SHA512

    94da5ae4e43e6b0fdc8d0a83d8a3f2991a47b6e12f6781cc6aecb2d8d97a2d0da6dc456e3618c1a36697862e1a7a50b27a036b3569f33889452fe921c6981d91

  • SSDEEP

    3072:GVgr8/vRx5cCPaEy3YxB+DV0Ugr8/vfx:GSrS/yKrS

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\read_it.txt

Ransom Note
All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: bc1qw0ll8p9m8uezhqhyd7z459ajrk722yn8c5j4fg

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 5 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ryuk .Net Ransomware Builder.exe
    "C:\Users\Admin\AppData\Local\Temp\Ryuk .Net Ransomware Builder.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\f2p3uor3\f2p3uor3.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB52C.tmp" "c:\Users\Admin\Desktop\CSCB39A415F9C4F44DFA18A801699B89EB1.TMP"
        3⤵
          PID:2804
    • C:\Users\Admin\Desktop\dddd.exe
      "C:\Users\Admin\Desktop\dddd.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1020
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
          3⤵
          • Opens file in notepad (likely ransom note)
          PID:2068
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESB52C.tmp

      Filesize

      1KB

      MD5

      c83886992cd850a2b57e802f60d2f3c7

      SHA1

      fc8eddeb1da3a7bb6b2b1276c937553f047a731d

      SHA256

      6819ecfc13493bbed510e5c4ab800614e7f5d93cede4796c5c24e1b3ab18f8f4

      SHA512

      cdabd46cd66bfc76e63797a45b95be6130b01f582985571f1ef237abeb7e73149356e33708a9405f41b2537169415f012c426d951648b0575eeb13163f7887df

    • C:\Users\Admin\Desktop\dddd.exe

      Filesize

      15KB

      MD5

      2df0d82bbc1627424d2adceae27f1812

      SHA1

      61cc42d4b7b0a30e047d02b63271be4565bcc159

      SHA256

      0721fe0a20c3cd84221c2f1cb412c3349bfb06bf73b86292508a159fa8e4fbd6

      SHA512

      f9cf14f2a3d02a0fcec23ac0a77cccc539250337b030fcce2919c1d7931beb8564f050af2e3f863242747eae4205ab0c0d54ae70d128b9a79ee3e67a8339adc0

    • C:\Users\Admin\Downloads\read_it.txt

      Filesize

      877B

      MD5

      9814b140eb85668b095096dc0ac32702

      SHA1

      27e792330b4526b0f1ccb1eb212f9a80262353fd

      SHA256

      3d3a137cdf8a12a35f67451a8afead595b6281f3de271673606ee80a47de9eb0

      SHA512

      4caa4a28649dd76b4e845e928eb0893ad1a50cd4aaa6d58d3123303dcf07f42379171740a4d2c77ceb854b54c86f3c430ef6429bd5d10ad2b96fbcfef0a4fb13

    • \??\c:\Users\Admin\AppData\Local\Temp\f2p3uor3\f2p3uor3.0.cs

      Filesize

      18KB

      MD5

      586f17e9f5b8200f4fde447e8072dac5

      SHA1

      6a6f9325dbf7b027032f98b13f0897692aab2b2d

      SHA256

      4c85e5a27c2136aa3d32216a6814db744ce86bba526c2fa818d0683f10134971

      SHA512

      020c29eb0e21464fe61b138aa50a7f8371083100a26daa918e32e894a2d1a181118ce750ef73208198af5013f16039c3449c85f2832b0dcb02a25afefdd90601

    • \??\c:\Users\Admin\AppData\Local\Temp\f2p3uor3\f2p3uor3.cmdline

      Filesize

      330B

      MD5

      07a8a51887d17313ce43136f94838573

      SHA1

      bc68b31aa99d83bd58d267443a4b755bff1fac43

      SHA256

      6be145c50b94a1727181b9a1caa87b8c0b51e48bc87935449e9e9d4d827dab10

      SHA512

      b36a6b0325c2219691995b30e398461c55c113f0969f0722a9ef11fe8e2bd11f6069407cb362ad27be7acb1542010dc6e73441bbb5a02d2b3b9f9b34e5a9bff4

    • \??\c:\Users\Admin\Desktop\CSCB39A415F9C4F44DFA18A801699B89EB1.TMP

      Filesize

      1KB

      MD5

      e804d3c5b28a522b6479f72d9ea12b49

      SHA1

      0cda5073274182c3a83e3bfbe1f82627d912b2c3

      SHA256

      1af6647e1296e434e7e5f3864c52d76254ab267223dfebea3a8f9caf5189e1a6

      SHA512

      3ca6b6c3a6f80acd31446e62aef3ec2dc37a644037da26e56ffdb586c16ca61e261e2d111c4650484615c13a2febc87da1110a149aec9846d7e61713efac19d0

    • memory/816-137-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/816-141-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/816-140-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/816-139-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/816-138-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/844-22-0x0000000000160000-0x000000000016A000-memory.dmp

      Filesize

      40KB

    • memory/1020-28-0x0000000000830000-0x000000000083A000-memory.dmp

      Filesize

      40KB

    • memory/2388-4-0x000007FEF5B73000-0x000007FEF5B74000-memory.dmp

      Filesize

      4KB

    • memory/2388-1-0x0000000000010000-0x000000000005E000-memory.dmp

      Filesize

      312KB

    • memory/2388-0-0x000007FEF5B73000-0x000007FEF5B74000-memory.dmp

      Filesize

      4KB

    • memory/2388-135-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/2388-136-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/2388-3-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/2388-7-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/2388-2-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/2388-5-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

      Filesize

      9.9MB

    • memory/2388-6-0x000000001ECB0000-0x000000001ECC0000-memory.dmp

      Filesize

      64KB