File name:

Ryuk.exe

Full analysis: https://app.any.run/tasks/11a64a03-9c92-4237-8ded-21fb2ffd1340
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: February 07, 2023, 06:52:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
ryuk
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

987336D00FDBEC3BCDB95B078F7DE46F

SHA1:

8BBDED5710280F055BF53F9E4F6C5ABB596F7899

SHA256:

A9643EB83D509AD4EAC20A2A89D8571F8D781979AD078E89F5B75B4BCB16F65E

SSDEEP:

12288:bma40rTiKNAIRhOnloZq7St7uIUr086ah2I/0xI8QTPCXOY1LEfVUF:bH4URP0lVEO0xI8CIOIIfK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Starts NET.EXE for service management

      • net.exe (PID: 2284)
      • Ryuk.exe (PID: 3664)
      • net.exe (PID: 3536)
      • net.exe (PID: 3072)
      • net.exe (PID: 1668)
      • net.exe (PID: 2516)
      • net.exe (PID: 1412)
      • net.exe (PID: 5860)
      • net.exe (PID: 7956)
      • net.exe (PID: 6472)
      • net.exe (PID: 7616)
      • net.exe (PID: 8112)
      • net.exe (PID: 173720)
      • net.exe (PID: 173444)
      • net.exe (PID: 173808)
      • net.exe (PID: 179748)
      • net.exe (PID: 180164)
      • net.exe (PID: 179536)
      • net.exe (PID: 179876)
      • net.exe (PID: 475640)
      • net.exe (PID: 477028)
      • Ryuk.exe (PID: 860)
      • net.exe (PID: 485528)
      • net.exe (PID: 484756)
      • net.exe (PID: 4592)
      • net.exe (PID: 166400)
    • Using BCDEDIT.EXE to modify recovery options

      • cmd.exe (PID: 3988)
      • cmd.exe (PID: 4308)
    • Deletes shadow copies

      • cmd.exe (PID: 2900)
      • cmd.exe (PID: 2780)
      • cmd.exe (PID: 4300)
      • cmd.exe (PID: 4292)
    • Ryuk is detected

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Ryuk ransom note is found

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Steals credentials from Web Browsers

      • Ryuk.exe (PID: 860)
      • Ryuk.exe (PID: 3664)
    • Writes a file to the Word startup folder

      • Ryuk.exe (PID: 860)
    • Writes to the Start menu file

      • Ryuk.exe (PID: 860)
    • Creates a writable file the system directory

      • Ryuk.exe (PID: 860)
      • Ryuk.exe (PID: 3664)
    • Actions looks like stealing of personal data

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Renames files like ransomware

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Starts CMD.EXE for commands execution

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Uses TASKKILL.EXE to kill Office Apps

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Uses ICACLS.EXE to modify access control lists

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Uses WMIC.EXE to obtain shadow copy information

      • cmd.exe (PID: 2900)
      • cmd.exe (PID: 4292)
    • Starts itself from another location

      • Ryuk.exe (PID: 860)
      • Ryuk.exe (PID: 3664)
    • Creates files like ransomware instruction

      • Ryuk.exe (PID: 3664)
  • INFO

    • Reads the computer name

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
      • mCucNESwGlan.exe (PID: 876)
      • qZsauooDHlan.exe (PID: 2992)
      • kfvBmyByYlan.exe (PID: 2116)
      • ZOlDJKuXNlan.exe (PID: 1988)
    • Checks proxy server information

      • Ryuk.exe (PID: 3664)
      • mCucNESwGlan.exe (PID: 876)
      • qZsauooDHlan.exe (PID: 2992)
      • ZOlDJKuXNlan.exe (PID: 1988)
      • Ryuk.exe (PID: 860)
      • kfvBmyByYlan.exe (PID: 2116)
    • Checks supported languages

      • qZsauooDHlan.exe (PID: 2992)
      • mCucNESwGlan.exe (PID: 876)
      • Ryuk.exe (PID: 860)
      • Ryuk.exe (PID: 3664)
      • kfvBmyByYlan.exe (PID: 2116)
      • ZOlDJKuXNlan.exe (PID: 1988)
    • Create files in a temporary directory

      • Ryuk.exe (PID: 860)
      • mCucNESwGlan.exe (PID: 876)
      • qZsauooDHlan.exe (PID: 2992)
      • Ryuk.exe (PID: 3664)
      • kfvBmyByYlan.exe (PID: 2116)
      • ZOlDJKuXNlan.exe (PID: 1988)
    • Reads the machine GUID from the registry

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
      • mCucNESwGlan.exe (PID: 876)
      • qZsauooDHlan.exe (PID: 2992)
      • kfvBmyByYlan.exe (PID: 2116)
      • ZOlDJKuXNlan.exe (PID: 1988)
    • The process checks LSA protection

      • Ryuk.exe (PID: 3664)
      • wmpnscfg.exe (PID: 3356)
      • Ryuk.exe (PID: 860)
      • taskkill.exe (PID: 3412)
      • WMIC.exe (PID: 3828)
      • vssadmin.exe (PID: 3848)
      • mCucNESwGlan.exe (PID: 876)
      • qZsauooDHlan.exe (PID: 2992)
      • taskkill.exe (PID: 3936)
      • WMIC.exe (PID: 5432)
      • taskkill.exe (PID: 4936)
      • vssadmin.exe (PID: 5936)
      • ZOlDJKuXNlan.exe (PID: 1988)
      • taskkill.exe (PID: 7816)
      • kfvBmyByYlan.exe (PID: 2116)
      • taskkill.exe (PID: 173456)
      • taskkill.exe (PID: 179512)
    • Manual execution by a user

      • Ryuk.exe (PID: 860)
      • WINWORD.EXE (PID: 1552)
      • WINWORD.EXE (PID: 1852)
      • WINWORD.EXE (PID: 6244)
      • WINWORD.EXE (PID: 167420)
      • WINWORD.EXE (PID: 6280)
      • WINWORD.EXE (PID: 174384)
      • rundll32.exe (PID: 363288)
    • Creates files in the program directory

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
      • kfvBmyByYlan.exe (PID: 2116)
    • Creates files or folders in the user directory

      • Ryuk.exe (PID: 3664)
      • Ryuk.exe (PID: 860)
    • Application launched itself

      • iexplore.exe (PID: 382448)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 10-Jan-2020 02:22:44
Detected languages:
  • English - United States
LegalCopyright: Copyright (c) 2014 - . All rights reserved. InstallShield Software Corporation
PrivateBuild: 5.4.6.373
InternalName: PortletReferencing
ProductName: PortletReferencing
CompanyName: InstallShield Software Corporation
FileVersion: 5.4.6.373
OriginalFilename: PortletReferencing
Languages: English
FileDescription: When Excels Paintbrush
ProductVersion: 5.4.6.373

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 10-Jan-2020 02:22:44
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00023619
0x00023800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.65611
.rdata
0x00025000
0x00010D58
0x00010E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.14502
.data
0x00036000
0x00004798
0x00001800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.51973
.rsrc
0x0003B000
0x00126F08
0x00051000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.26714

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.99863
848
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.79774
16936
Latin 1 / Western European
English - United States
RT_ICON
3
4.83057
9640
Latin 1 / Western European
English - United States
RT_ICON
4
4.92225
4264
Latin 1 / Western European
English - United States
RT_ICON
5
4.9416
2440
Latin 1 / Western European
English - United States
RT_ICON
6
4.97227
1128
Latin 1 / Western European
English - United States
RT_ICON
101
2.90476
90
Latin 1 / Western European
English - United States
RT_GROUP_ICON
132
7.51476
11639
Latin 1 / Western European
English - United States
RAW
133
7.42512
26112
Latin 1 / Western European
English - United States
RAW
134
7.46901
14605
Latin 1 / Western European
English - United States
RAW

Imports

ADVAPI32.dll
AVICAP32.dll
AVIFIL32.dll
COMCTL32.dll
CRYPT32.dll
DCIMAN32.dll
GDI32.dll
GLU32.dll
KERNEL32.dll
MSIMG32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
175
Monitored processes
88
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start #RYUK ryuk.exe winword.exe no specs #RYUK ryuk.exe mcucneswglan.exe qzsauoodhlan.exe taskkill.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs icacls.exe no specs cmd.exe no specs wmic.exe no specs vssadmin.exe no specs net.exe no specs bcdedit.exe no specs net.exe no specs net1.exe no specs bcdedit.exe no specs net1.exe no specs winword.exe no specs kfvbmybyylan.exe zoldjkuxnlan.exe taskkill.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs icacls.exe no specs taskkill.exe no specs wmic.exe no specs net.exe no specs vssadmin.exe no specs bcdedit.exe no specs net1.exe no specs bcdedit.exe no specs net.exe no specs net1.exe no specs winword.exe no specs taskkill.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs winword.exe no specs winword.exe no specs taskkill.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs winword.exe no specs taskkill.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs rundll32.exe no specs iexplore.exe no specs iexplore.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
568C:\Windows\system32\net1 stop "audioendpointbuilder" /yC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
576C:\Windows\system32\net1 stop "samss" /yC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
632cmd /c "bootstatuspolicy ignoreallfailures"C:\Windows\system32\cmd.exeRyuk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
860"C:\Users\admin\Desktop\Ryuk.exe" C:\Users\admin\Desktop\Ryuk.exe
Explorer.EXE
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
MEDIUM
Description:
When Excels Paintbrush
Exit code:
0
Version:
5.4.6.373
Modules
Images
c:\users\admin\desktop\ryuk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
876"C:\Users\admin\Desktop\mCucNESwGlan.exe" 8 LANC:\Users\admin\Desktop\mCucNESwGlan.exe
Ryuk.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
MEDIUM
Description:
When Excels Paintbrush
Exit code:
0
Version:
5.4.6.373
Modules
Images
c:\users\admin\desktop\mcucneswglan.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1412"C:\Windows\System32\net.exe" stop "samss" /yC:\Windows\System32\net.exeRyuk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
1552"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\languagealternative.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
1
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
1668"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /yC:\Windows\System32\net.exeRyuk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
1828C:\Windows\system32\net1 stop "audioendpointbuilder" /yC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\ws2_32.dll
1852"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\languagealternative.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
Total events
37 468
Read events
31 462
Write events
4 046
Delete events
1 960

Modification events

(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{B8ECC31C-9278-4C55-A213-F19A3B41AC3E}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:writeName:Reason
Value:
565
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{B8ECC31C-9278-4C55-A213-F19A3B41AC3E}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:writeName:ID
Value:
S-1-5-21-1302019708-1500728564-335382590-1000
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{B8ECC31C-9278-4C55-A213-F19A3B41AC3E}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:writeName:Data
Value:
ignored
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{B8ECC31C-9278-4C55-A213-F19A3B41AC3E}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:writeName:Scope
Value:
ignored
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{E515E207-28D6-4C0E-9004-583E10963205}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:writeName:Reason
Value:
565
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{E515E207-28D6-4C0E-9004-583E10963205}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:writeName:ID
Value:
S-1-5-21-1302019708-1500728564-335382590-1000
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{E515E207-28D6-4C0E-9004-583E10963205}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:writeName:Data
Value:
ignored
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{E515E207-28D6-4C0E-9004-583E10963205}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:writeName:Scope
Value:
ignored
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{E515E207-28D6-4C0E-9004-583E10963205}\{1F6EC552-4E3B-4C16-AF13-CE6FD4698E41}
Operation:delete keyName:(default)
Value:
(PID) Process:(3356) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{E515E207-28D6-4C0E-9004-583E10963205}
Operation:delete keyName:(default)
Value:
Executable files
8
Suspicious files
7 034
Text files
2 048
Unknown types
333

Dropped files

PID
Process
Filename
Type
1552WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR3291.tmp.cvr
MD5:
SHA256:
3664Ryuk.exeC:\Users\admin\AppData\Local\Temp\tmp1277.tmpvxd
MD5:
SHA256:
1552WINWORD.EXEC:\Users\admin\Desktop\~$nguagealternative.rtfpgc
MD5:
SHA256:
860Ryuk.exeC:\Users\admin\AppData\Local\Temp\tmp6809.tmpvxd
MD5:
SHA256:
1552WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:
SHA256:
876mCucNESwGlan.exeC:\Users\admin\AppData\Local\Temp\tmpA59E.tmpvxd
MD5:
SHA256:
1552WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.datini
MD5:
SHA256:
2992qZsauooDHlan.exeC:\Users\admin\AppData\Local\Temp\tmpB926.tmpvxd
MD5:
SHA256:
1552WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\languagealternative.rtf.LNKlnk
MD5:
SHA256:
1552WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BA4F3339-7203-4C86-BA2F-6364D6A052C8}.tmpdbf
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
75
DNS requests
28
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
301
2.21.20.159:80
http://shell.windows.com/fileassoc/fileassoc.asp?Ext=RYK
DE
whitelisted
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
GET
200
142.251.208.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDrLFyBxR1WMQr6Mn9JjdU0
US
der
472 b
whitelisted
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAP%2B7xu1tkg0miCVD4vGl1M%3D
US
der
471 b
whitelisted
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
GET
200
93.184.220.29:80
http://status.geotrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTIyCPRUzvKHRw7iRE1lF%2BfcLu%2FjgQUypJnUmHervy6Iit%2FHIdMJftvmVgCEAwte8U4Vmo%2FG5y%2FKX9y5Kc%3D
US
der
471 b
whitelisted
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
US
der
471 b
whitelisted
GET
200
142.251.208.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEDL9Bzu4Sp7ECvL8ZaLDxes%3D
US
der
471 b
whitelisted
GET
200
142.251.208.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDc3qNwAWsSZRI0YX46ktZZ
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.2:445
whitelisted
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
40.126.32.136:443
login.microsoftonline.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
suspicious
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
suspicious
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
172.66.43.223:443
www.pcrisk.com
CLOUDFLARENET
US
unknown
2.21.20.159:80
shell.windows.com
Akamai International B.V.
DE
suspicious
142.251.208.174:443
www.google-analytics.com
GOOGLE
US
suspicious
142.251.39.78:443
www.youtube.com
GOOGLE
US
whitelisted
142.251.208.131:80
ocsp.pki.goog
GOOGLE
US
suspicious

DNS requests

Domain
IP
Reputation
go.microsoft.com
  • 104.64.117.184
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
shell.windows.com
  • 2.21.20.159
  • 2.21.20.141
whitelisted
r.bing.com
  • 23.36.163.98
  • 23.36.163.116
whitelisted
th.bing.com
  • 23.36.163.98
  • 23.36.163.116
whitelisted
login.microsoftonline.com
  • 40.126.32.136
  • 40.126.32.68
  • 40.126.32.140
  • 40.126.32.72
  • 20.190.160.17
  • 40.126.32.138
  • 40.126.32.133
  • 20.190.160.14
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.0
  • 20.190.159.68
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.23
  • 40.126.31.73
  • 20.190.159.71
whitelisted

Threats

No threats detected
No debug info