Examining Ryuk Ransomware - Blog
Examining Ryuk Ransomware - Blog
Examining Ryuk Ransomware - Blog
Pre-Register
Analysis /
Ryuk dropper contains both 32-bit and 64-bit payloads. The
dropper checks to see if it is being executed in a 32-bit or 64-bit
OS using the "IsWow64Process" API and drops the payload
accordingly. It also checks the version of the operating system.
If it is executed in Windows XP, it drops the Ryuk payload
at "C:\Documents and Settings\Default User\{random-5
char}.exe". If it is executed in Windows Vista or later versions of
Windows, it drops the le at "C:\users\Public\{random-5
char}.exe”. Next, it executes the payload using the
ShellExecuteW API.
Persistence mechanism
Process injection
Ryuk injects its main code into several remote processes. Ryuk
enumerates the process by calling the
CreateToolhelp32Snapshot API and injecting its code in all the
processes except the ones named explorer.exe, lsaas.exe and
csrss.exe, telling it that it should not be executed by the
NT AUTHORITY.
/
Figure 1: The list of services disabled by the Ryuk ransomware.
/
Figure 4: The HERMES marker and the encrypted AES key.
Ryuk encrypts les in every drive and network shared from the
infected system. It has whitelisted a few folders, including
“Windows, Mozilla, Chrome, Recycle Bin, and Ahnlab” so it won’t
encrypt les inside these folders. Ryuk drops its ransom note,
named RyukReadMe.txt, in every directory. Ryuk asks for the
ransom in bitcoin, providing the bitcoin address in the ransom
note. Ryuk contains different templates for the ransom
note. Below is a screenshot for RyukReadMe.txt le.
/
Conclusion
While most ransomware is spread using spam email and exploit
kits, Ryuk is delivered as a payload of the Emotet and Trickbot
malware. Looking at the encryption process and ransom
demands, Ryuk is targeting big enterprises in the hopes of large
payoffs. Zscaler ThreatLabZ team continues to monitor this
threat to ensure that Zscaler customers are protected.
IOCs
MD5
5AC0F050F93F86E69026FAEA1FBB4450
6CDCB9F86972EFC4CFCE4B06B6BE053A
31BD0F224E7E74EEE2847F43AAE23974
Suggested Blogs
Dec
19
2019
/
2019 in Review
By: Jay Chaudhry
Dec
18
2019
/
Products Blog
Solutions Language
Resources Français
Company Deutsch
Careers 日本語
Email Submit
Privacy Policy
GDPR and Privacy Shield Policy
Cookies Policy
Acceptable Use Policy
Patents
Vulnerability Disclosure Program