Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
-
Size
384KB
-
MD5
67164c4680d767fcc5dbe48c3586444c
-
SHA1
059cea33a907a59d6f41b2aceef3571bf2a4ceb0
-
SHA256
9c21c7149cf5980ee64d5fbb3f78a336b122cf7e92335718bcc5fa45e9dafb25
-
SHA512
0db0054182afcb6c3b8564457224598985958fe409503a3b1954852bd9f54ecb5ee0bb68d7a8551f369836d7e825c1bb6cda9f47f66aa43ce10d6f1b30bfe31a
-
SSDEEP
6144:f5yaWtrA/WSo1rl3ALrlHQpn0BwK3SBDmhYfFQ:fTW6WSofcZ+KCIG
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Ryuk family
-
Deletes itself 1 IoCs
pid Process 1732 UXUMa.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RyukReadMe.txt taskhost.exe -
Executes dropped EXE 1 IoCs
pid Process 1732 UXUMa.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\UXUMa.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\ERROR.GIF taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\1047x576black.png taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02740U.BMP taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CMNTY_01.MID taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInAcrobat.gif taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\EST5 taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01170_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\DataSet.zip taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-output2.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs-nio2_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-threaddump.xml taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01191_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18219_.WMF taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\shatter.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.nl_zh_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Discussion14.gta taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL104.XML taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1CACH.LEX taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18197_.WMF taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.manipulator.nl_ja_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\THMBNAIL.PNG taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.config taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21504_.GIF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePageStyle.css taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB4.BDR taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Iqaluit taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExpenseReport.xltx taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01161_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Dublin taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Easter taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Pushpin.eftx taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10297_.GIF taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\form_responses.gif taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Main.gif taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR44F.GIF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7cm_es.dub taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Manila taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0233018.WMF taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\background.gif taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR30F.GIF taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMain.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-tabcontrol.xml taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0301052.WMF taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\telnet.luac taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD06200_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryResume.dotx taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02093_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageAttachmentIconImagesMask.bmp taskhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\helpmap.txt taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msadox28.tlb taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1732 UXUMa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1732 UXUMa.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1732 2692 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe 30 PID 2692 wrote to memory of 1732 2692 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe 30 PID 2692 wrote to memory of 1732 2692 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe 30 PID 2692 wrote to memory of 1732 2692 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe 30 PID 1732 wrote to memory of 2416 1732 UXUMa.exe 31 PID 1732 wrote to memory of 2416 1732 UXUMa.exe 31 PID 1732 wrote to memory of 2416 1732 UXUMa.exe 31 PID 1732 wrote to memory of 1128 1732 UXUMa.exe 19 PID 1732 wrote to memory of 1180 1732 UXUMa.exe 20 PID 2416 wrote to memory of 2304 2416 cmd.exe 33 PID 2416 wrote to memory of 2304 2416 cmd.exe 33 PID 2416 wrote to memory of 2304 2416 cmd.exe 33 PID 1732 wrote to memory of 1364 1732 UXUMa.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\users\Public\UXUMa.exe"C:\users\Public\UXUMa.exe" C:\Users\Admin\AppData\Local\Temp\2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\UXUMa.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\UXUMa.exe" /f4⤵
- Adds Run key to start application
PID:2304
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
170KB
MD531bd0f224e7e74eee2847f43aae23974
SHA192e331e1e8ad30538f38dd7ba31386afafa14a58
SHA2568b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
SHA512a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249