Ryuk Ransomware Audit

Find Windows Devices Infected by Ryuk Ransomware

The Ryuk ransomware is one of the many ransomware out there. Similar to all others of its kind, it usually enters the network by enticing a user to click a malicious link or download a malicious file. Once inside your network, it will try to spread, encrypt and lock devices until a ransom is paid for an encryption key. That's why we created the Ryuk ransomware audit to keep your IT environment safe.

The Ryuk ransomware is known to place a text file in every folder once it starts encrypting files and folders. With Lansweeper's file scanning you can scan any directory (since it will put the text file in all folders) to detect quickly if one of your machines is being encrypted. However, once the ransom note has been detected, it is usually already too late. To try and detect Ryuk earlier, we can utilize a registry scan to check if a registry key commonly created and used by Ryuk is present on a machine. This way you might be able to stop it from encrypting or spreading throughout your network.

The Ryuk ransomware audit below will provide you an overview of your assets an whether the registry key or file have been found.

To check if Ryuk has created the registry key, you will have to add the following registry key and value name to your custom registry scanning configuration.
Regpath: Software\Microsoft\Windows\CurrentVersion\Run
Regvalue: svchos
To check if Ryuk has created the ransom note file, you will have to add the following file to your file property scanning configuration.
Filename: %windir%\RyukReadMe.txt

Ryuk ransomware Audit


Ryuk Ransomware Query

Select Top 1000000 tsysOS.Image As icon,
    When TsysLastscan.Lasttime < GetDate() -
    1 Then
    'Last registry scan more than 24 hours ago! Scanned registry information may not be up-to-date. Try rescanning this machine.' 
End As Comment,
Case When SubQuery1.Valuename Is Not Null And SubQuery1.Valuename <> '' then 'Yes' else 'No' end as RegKeyFound,
  SubQuery1.Value as RegKeyValue,
    Subquery2.Found as FileFound,
  Subquery2.[Files last changed] as [FileLastScanned],
  TsysLastscan.Lasttime As LastRegistryScan
From tblAssets
  Inner Join tblAssetCustom On tblAssets.AssetID = tblAssetCustom.AssetID
  Inner Join tsysOS On tsysOS.OScode = tblAssets.OScode
  Inner Join TsysLastscan On tblAssets.AssetID = TsysLastscan.AssetID
  Inner Join TsysWaittime On TsysWaittime.CFGCode = TsysLastscan.CFGcode
  Left Join (Select Top 1000000 tblRegistry.AssetID,
  From tblRegistry
  Where tblRegistry.Regkey Like '%Software\Microsoft\Windows\CurrentVersion\Run' And
    tblRegistry.Valuename = 'svchos') SubQuery1 On SubQuery1.AssetID =
	Left join ( Select Top 1000000 tblAssets.AssetID,
  Case when tblFileVersions.Found = 1 then 'Yes' else 'No' end as Found,
  tblFileVersions.Lastchanged As [Files last changed]
From tblAssets
  Inner Join tblFileVersions On tblAssets.AssetID = tblFileVersions.AssetID
  Inner Join tblAssetCustom On tblAssets.AssetID = tblAssetCustom.AssetID
  Inner Join tblState On tblState.State = tblAssetCustom.State
Where tblFileVersions.FilePathfull Like '%RyukReadMe%' And tblState.Statename =
  'Active') as Subquery2 on Subquery2.AssetID = tblassets.AssetID
Where tblAssetCustom.State = 1 And TsysWaittime.CFGname = 'registry'
Order By tblAssets.Domain,

Audit and Take Action in 3 Easy Steps


1. Download & Install Lansweeper


3. Run the Audit & Take Action

Download Lansweeper to Run this Audit

Harness the Power of Reporting