Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
65s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10/04/2021, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
Resource
win10v20201028
General
-
Target
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
-
Size
136KB
-
MD5
45295780f2ba837be42ccf50710bd2b5
-
SHA1
f937b1b7b3593a38702f870077658a891974edda
-
SHA256
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025
-
SHA512
588666aa108f01334c2e0adc03aa68d5e3ebb68ee773939b668a5a6ca1eacf03570b7608d4ca3c936dd7f7ec6edd4063a05b1cef7d446661c8f00f8520e72f8b
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://smtpys6pvcvdvram6xucwecfv7rdhs6fmxzivrbcrncdeiphryhb75id.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 3408 YFFRqPhjRrep.exe 640 EJenDAOhKlan.exe 2204 eynOXuXAHlan.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1172 icacls.exe 1168 icacls.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\P: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\L: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\K: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\J: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\G: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\Z: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\V: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\T: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\I: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\H: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\F: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\X: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\R: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\S: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\W: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\Q: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\O: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\N: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\M: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\E: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened (read-only) \??\Y: 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\co.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\Services\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Hand Prints.htm 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tipresx.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setEmbeddedCP.bat 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_zh_TW.jar 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\th-TH\tipresx.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\th-TH\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\3RDPARTY 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\tipresx.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_zh_CN.jar 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\SharedPerformance.man 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-CN\tipresx.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\BlockSelect.cr2 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nl-NL\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Internet Explorer\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.jpg 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\tipresx.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\EnableSend.ppt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setNetworkClientCP.bat 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_cs.jar 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\tipresx.dll.mui 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\RyukReadMe.html 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1212 wrote to memory of 3408 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 79 PID 1212 wrote to memory of 3408 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 79 PID 1212 wrote to memory of 3408 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 79 PID 1212 wrote to memory of 640 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 80 PID 1212 wrote to memory of 640 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 80 PID 1212 wrote to memory of 640 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 80 PID 1212 wrote to memory of 2204 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 81 PID 1212 wrote to memory of 2204 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 81 PID 1212 wrote to memory of 2204 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 81 PID 1212 wrote to memory of 1172 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 82 PID 1212 wrote to memory of 1172 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 82 PID 1212 wrote to memory of 1172 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 82 PID 1212 wrote to memory of 1168 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 83 PID 1212 wrote to memory of 1168 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 83 PID 1212 wrote to memory of 1168 1212 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe"C:\Users\Admin\AppData\Local\Temp\60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\YFFRqPhjRrep.exe"C:\Users\Admin\AppData\Local\Temp\YFFRqPhjRrep.exe" 9 REP2⤵
- Executes dropped EXE
PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\EJenDAOhKlan.exe"C:\Users\Admin\AppData\Local\Temp\EJenDAOhKlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\eynOXuXAHlan.exe"C:\Users\Admin\AppData\Local\Temp\eynOXuXAHlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:2204
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1172
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1168
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:3232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1596
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:4824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3024
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:4940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1592
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:3700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2212
-
-