Potential Ryuk Ransomware Activity

Detects Ryuk ransomware activity

Sigma rule (View on GitHub)

 1title: Potential Ryuk Ransomware Activity
 2id: c37510b8-2107-4b78-aa32-72f251e7a844
 3related:
 4    - id: 58bf96d9-ff5f-44bd-8dcc-1c4f79bf3a27
 5      type: similar
 6    - id: 0acaad27-9f02-4136-a243-c357202edd74
 7      type: obsolete
 8status: stable
 9description: Detects Ryuk ransomware activity
10references:
11    - https://app.any.run/tasks/d860402c-3ff4-4c1f-b367-0237da714ed1/
12    - https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
13author: Florian Roth (Nextron Systems), Vasiliy Burov, Nasreddine Bencherchali (Nextron Systems)
14date: 2019-12-16
15modified: 2023-02-03
16tags:
17    - attack.persistence
18    - attack.t1547.001
19    - detection.emerging-threats
20logsource:
21    category: process_creation
22    product: windows
23detection:
24    selection_reg:
25        CommandLine|contains|all:
26            - 'Microsoft\Windows\CurrentVersion\Run'
27            - 'C:\users\Public\'
28    selection_del:
29        CommandLine|contains|all:
30            - 'del /s /f /q c:\'
31            - '\*.bac'
32            - '\*.bak'
33            - '\*.bkf'
34    selection_net:
35        Image|endswith:
36            - '\net.exe'
37            - '\net1.exe'
38        CommandLine|contains|all:
39            - ' stop '
40            - ' /y'
41        CommandLine|contains:
42            - 'samss'
43            - 'audioendpointbuilder'
44            - 'unistoresvc_'
45            - 'AcrSch2Svc'
46    condition: 1 of selection_*
47fields:
48    - CommandLine
49    - ParentCommandLine
50falsepositives:
51    - Unlikely
52level: high

References

Related rules

to-top