General
-
Target
JaffaCakes118_8bd0c2de7af721194571df16912e01228e4e1d2a2f26470d7947f231c05b4269
-
Size
71KB
-
Sample
241221-zj1k9szjgk
-
MD5
0e77214161419f8e409ca2b7827011ca
-
SHA1
7970b51a59e0969f0dc9a5658da73d50e2525922
-
SHA256
8bd0c2de7af721194571df16912e01228e4e1d2a2f26470d7947f231c05b4269
-
SHA512
d8069b6149dc1f49187332d0fbf6680224b83627f83fb6a7cbe1bc851960133a87a3289d8f41c497c300ea75ff99ad29d89f4ebfb903f956a778f814ace8a915
-
SSDEEP
1536:g2ceJ0E6NflQlnYi8jPOIpUFNRs2GGbFiW8GQoXEmi7iqPlr:NK3V0al6iW8tKEb71PV
Static task
static1
Behavioral task
behavioral1
Sample
ec3da4ac9ec917e66ab943ab149119807922f64f2e4960ebadc36fe7520b300f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ec3da4ac9ec917e66ab943ab149119807922f64f2e4960ebadc36fe7520b300f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Targets
-
-
Target
ec3da4ac9ec917e66ab943ab149119807922f64f2e4960ebadc36fe7520b300f
-
Size
134KB
-
MD5
0a0b0ac20e9fe72753e74def1e37724f
-
SHA1
fd683b33ee10ba92e485f76fbad9b48a2e697358
-
SHA256
ec3da4ac9ec917e66ab943ab149119807922f64f2e4960ebadc36fe7520b300f
-
SHA512
3f5d8b747955fc5926767c04be7c7d414205d01e8a2e586d3e94f2a4da756b56b15a795ec5847894b21b39fba7d595d18898df60375c126998e6b638cf78a759
-
SSDEEP
3072:lZkmuVEvfzS9ljrZU/bH0ffOkObkPnSh6/P:LkmQIW9ljrqbH0cwH
Score10/10-
Ryuk family
-
Renames multiple (4688) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-