Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19/02/2022, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe
Resource
win10v2004-en-20220112
General
-
Target
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe
-
Size
192KB
-
MD5
38df8a5c21f7df368490f8a0a0e276f9
-
SHA1
564641f0da5a9365a748a9589535f3b9439e5cc9
-
SHA256
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c
-
SHA512
2d3aaabd9f2d1fc4438ff31717dd53667b16acfa421c0364374135ed41360a1dee78d8f51ae588017c895c192f031bf13cbbaa67b1d240ddd86025ebc06be2cf
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 648 FYqNGGm.exe -
Loads dropped DLL 2 IoCs
pid Process 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 648 FYqNGGm.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 648 FYqNGGm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe Token: SeBackupPrivilege 648 FYqNGGm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 648 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 27 PID 1624 wrote to memory of 648 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 27 PID 1624 wrote to memory of 648 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 27 PID 1624 wrote to memory of 648 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 27 PID 648 wrote to memory of 1580 648 FYqNGGm.exe 29 PID 648 wrote to memory of 1580 648 FYqNGGm.exe 29 PID 648 wrote to memory of 1580 648 FYqNGGm.exe 29 PID 648 wrote to memory of 1580 648 FYqNGGm.exe 29 PID 1624 wrote to memory of 1700 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 28 PID 1624 wrote to memory of 1700 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 28 PID 1624 wrote to memory of 1700 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 28 PID 1624 wrote to memory of 1700 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 28 PID 1624 wrote to memory of 1292 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 30 PID 1624 wrote to memory of 1292 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 30 PID 1624 wrote to memory of 1292 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 30 PID 1624 wrote to memory of 1292 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 30 PID 1624 wrote to memory of 2076 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 34 PID 1624 wrote to memory of 2076 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 34 PID 1624 wrote to memory of 2076 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 34 PID 1624 wrote to memory of 2076 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 34 PID 1624 wrote to memory of 2092 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 36 PID 1624 wrote to memory of 2092 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 36 PID 1624 wrote to memory of 2092 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 36 PID 1624 wrote to memory of 2092 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 36 PID 648 wrote to memory of 2100 648 FYqNGGm.exe 35 PID 648 wrote to memory of 2100 648 FYqNGGm.exe 35 PID 648 wrote to memory of 2100 648 FYqNGGm.exe 35 PID 648 wrote to memory of 2100 648 FYqNGGm.exe 35 PID 1580 wrote to memory of 2524 1580 net.exe 41 PID 1580 wrote to memory of 2524 1580 net.exe 41 PID 1580 wrote to memory of 2524 1580 net.exe 41 PID 1580 wrote to memory of 2524 1580 net.exe 41 PID 1700 wrote to memory of 2532 1700 net.exe 43 PID 2100 wrote to memory of 2540 2100 net.exe 42 PID 1700 wrote to memory of 2532 1700 net.exe 43 PID 1700 wrote to memory of 2532 1700 net.exe 43 PID 2100 wrote to memory of 2540 2100 net.exe 42 PID 1700 wrote to memory of 2532 1700 net.exe 43 PID 2100 wrote to memory of 2540 2100 net.exe 42 PID 2100 wrote to memory of 2540 2100 net.exe 42 PID 2092 wrote to memory of 2556 2092 net.exe 40 PID 2092 wrote to memory of 2556 2092 net.exe 40 PID 2092 wrote to memory of 2556 2092 net.exe 40 PID 2092 wrote to memory of 2556 2092 net.exe 40 PID 1292 wrote to memory of 2548 1292 net.exe 45 PID 1292 wrote to memory of 2548 1292 net.exe 45 PID 1292 wrote to memory of 2548 1292 net.exe 45 PID 1292 wrote to memory of 2548 1292 net.exe 45 PID 2076 wrote to memory of 2564 2076 net.exe 44 PID 2076 wrote to memory of 2564 2076 net.exe 44 PID 2076 wrote to memory of 2564 2076 net.exe 44 PID 2076 wrote to memory of 2564 2076 net.exe 44 PID 1624 wrote to memory of 22768 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 49 PID 1624 wrote to memory of 22768 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 49 PID 1624 wrote to memory of 22768 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 49 PID 1624 wrote to memory of 22768 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 49 PID 1624 wrote to memory of 22760 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 48 PID 1624 wrote to memory of 22760 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 48 PID 1624 wrote to memory of 22760 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 48 PID 1624 wrote to memory of 22760 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 48 PID 22760 wrote to memory of 22812 22760 net.exe 52 PID 22760 wrote to memory of 22812 22760 net.exe 52 PID 22760 wrote to memory of 22812 22760 net.exe 52 PID 22760 wrote to memory of 22812 22760 net.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe"C:\Users\Admin\AppData\Local\Temp\08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\FYqNGGm.exe"C:\Users\Admin\AppData\Local\Temp\FYqNGGm.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:2524
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:2540
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:37032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:37060
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2532
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2548
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2564
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2556
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:22760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:22812
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:22768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:22820
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36964
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:37004
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:37012
-
-