Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe
-
Size
7.5MB
-
MD5
15019485506f576585048aab9ada0d82
-
SHA1
df4bd51a6322be6674f2863f8460fea0eaada456
-
SHA256
c9a6f2559eb19a40da73e731ee4fbcfabd9e8069daa8041e9fbd87c5ea14c1ff
-
SHA512
6d1869672cdafb2bcec30edfd2dcb15746ae65f57041e5376f5c2559a9e18aedd9f1880529c6fd1ef9c80fb459c5b123b4b302dbb6d103944c8a5bbd6643efe8
-
SSDEEP
98304:U4huZx4w9uj/QTAef+I3BksxX0nDpbfyyV/4tx8JPKDnzwpF:UHx4+rFXK9T4tKPKDnzwp
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2124-0-0x0000000180000000-0x0000000180019000-memory.dmp upx behavioral1/memory/2124-13-0x0000000180000000-0x0000000180019000-memory.dmp upx behavioral1/memory/2124-7-0x0000000180000000-0x0000000180019000-memory.dmp upx behavioral1/memory/2124-4-0x0000000180000000-0x0000000180019000-memory.dmp upx behavioral1/memory/2124-3-0x0000000180000000-0x0000000180019000-memory.dmp upx -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 820 set thread context of 2768 820 XXEmulator.exe 32 PID 848 set thread context of 2292 848 svchost.exe 36 PID 2292 set thread context of 3020 2292 svchost.exe 37 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\~MHZ svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2124 2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe 2124 2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe 2124 2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe 820 XXEmulator.exe 820 XXEmulator.exe 820 XXEmulator.exe 2768 svchost.exe 2768 svchost.exe 2060 XXEmulator.exe 2060 XXEmulator.exe 2060 XXEmulator.exe 848 svchost.exe 848 svchost.exe 2292 svchost.exe 3020 dllhost.exe 3020 dllhost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 3020 dllhost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2768 svchost.exe Token: SeTcbPrivilege 2768 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1216 2124 2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe 21 PID 2124 wrote to memory of 1216 2124 2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe 21 PID 2124 wrote to memory of 1216 2124 2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe 21 PID 2124 wrote to memory of 1216 2124 2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe 21 PID 2124 wrote to memory of 1216 2124 2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe 21 PID 820 wrote to memory of 2768 820 XXEmulator.exe 32 PID 820 wrote to memory of 2768 820 XXEmulator.exe 32 PID 820 wrote to memory of 2768 820 XXEmulator.exe 32 PID 820 wrote to memory of 2768 820 XXEmulator.exe 32 PID 820 wrote to memory of 2768 820 XXEmulator.exe 32 PID 820 wrote to memory of 2768 820 XXEmulator.exe 32 PID 2740 wrote to memory of 2060 2740 taskeng.exe 34 PID 2740 wrote to memory of 2060 2740 taskeng.exe 34 PID 2740 wrote to memory of 2060 2740 taskeng.exe 34 PID 2060 wrote to memory of 848 2060 XXEmulator.exe 13 PID 2060 wrote to memory of 848 2060 XXEmulator.exe 13 PID 2060 wrote to memory of 848 2060 XXEmulator.exe 13 PID 848 wrote to memory of 2292 848 svchost.exe 36 PID 848 wrote to memory of 2292 848 svchost.exe 36 PID 848 wrote to memory of 2292 848 svchost.exe 36 PID 848 wrote to memory of 2292 848 svchost.exe 36 PID 848 wrote to memory of 2292 848 svchost.exe 36 PID 848 wrote to memory of 2292 848 svchost.exe 36 PID 2292 wrote to memory of 3020 2292 svchost.exe 37 PID 2292 wrote to memory of 3020 2292 svchost.exe 37 PID 2292 wrote to memory of 3020 2292 svchost.exe 37 PID 2292 wrote to memory of 3020 2292 svchost.exe 37 PID 2292 wrote to memory of 3020 2292 svchost.exe 37 PID 2292 wrote to memory of 3020 2292 svchost.exe 37 PID 848 wrote to memory of 1720 848 svchost.exe 38 PID 848 wrote to memory of 1720 848 svchost.exe 38 PID 848 wrote to memory of 1720 848 svchost.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\taskeng.exetaskeng.exe {3F473F69-0BDE-4987-82FE-D5D0FDE74868} S-1-5-18:NT AUTHORITY\System:Service:2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files\Windows Mail\XXEmulator.exe"C:\Program Files\Windows Mail\XXEmulator.exe" -svc3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:1720
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-14_15019485506f576585048aab9ada0d82_ryuk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\XXEmulator.exe"C:\Users\Admin\AppData\Local\Temp\XXEmulator.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -Install3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-