Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
64s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20/02/2022, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe
Resource
win10v2004-en-20220113
General
-
Target
e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe
-
Size
190KB
-
MD5
fb0cc68e9679d61aa39779cabc5e6196
-
SHA1
fe91a5a32aa26e92925426b88f810b215610d8b4
-
SHA256
e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a
-
SHA512
12ae1da23953ba65108aa2358942a77c442e57580fde053b435569d7ac15af6b077a8febf4d2d36489ca4aae130e6a737d4ff2e60f0aebecc9fe491f4614b54e
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 268 oyjOuyK.exe -
Loads dropped DLL 2 IoCs
pid Process 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 268 oyjOuyK.exe 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 268 oyjOuyK.exe 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 268 oyjOuyK.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe Token: SeBackupPrivilege 268 oyjOuyK.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1568 wrote to memory of 268 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 27 PID 1568 wrote to memory of 268 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 27 PID 1568 wrote to memory of 268 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 27 PID 1568 wrote to memory of 268 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 27 PID 1568 wrote to memory of 580 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 28 PID 1568 wrote to memory of 580 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 28 PID 1568 wrote to memory of 580 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 28 PID 1568 wrote to memory of 580 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 28 PID 1568 wrote to memory of 568 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 30 PID 1568 wrote to memory of 568 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 30 PID 1568 wrote to memory of 568 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 30 PID 1568 wrote to memory of 568 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 30 PID 580 wrote to memory of 1408 580 net.exe 33 PID 580 wrote to memory of 1408 580 net.exe 33 PID 580 wrote to memory of 1408 580 net.exe 33 PID 580 wrote to memory of 1408 580 net.exe 33 PID 568 wrote to memory of 1820 568 net.exe 32 PID 568 wrote to memory of 1820 568 net.exe 32 PID 568 wrote to memory of 1820 568 net.exe 32 PID 568 wrote to memory of 1820 568 net.exe 32 PID 1568 wrote to memory of 1836 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 34 PID 1568 wrote to memory of 1836 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 34 PID 1568 wrote to memory of 1836 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 34 PID 1568 wrote to memory of 1836 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 34 PID 1836 wrote to memory of 452 1836 net.exe 36 PID 1836 wrote to memory of 452 1836 net.exe 36 PID 1836 wrote to memory of 452 1836 net.exe 36 PID 1836 wrote to memory of 452 1836 net.exe 36 PID 1568 wrote to memory of 1524 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 37 PID 1568 wrote to memory of 1524 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 37 PID 1568 wrote to memory of 1524 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 37 PID 1568 wrote to memory of 1524 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 37 PID 1524 wrote to memory of 1124 1524 net.exe 39 PID 1524 wrote to memory of 1124 1524 net.exe 39 PID 1524 wrote to memory of 1124 1524 net.exe 39 PID 1524 wrote to memory of 1124 1524 net.exe 39 PID 268 wrote to memory of 3172 268 oyjOuyK.exe 40 PID 268 wrote to memory of 3172 268 oyjOuyK.exe 40 PID 268 wrote to memory of 3172 268 oyjOuyK.exe 40 PID 268 wrote to memory of 3172 268 oyjOuyK.exe 40 PID 3172 wrote to memory of 3196 3172 net.exe 42 PID 3172 wrote to memory of 3196 3172 net.exe 42 PID 3172 wrote to memory of 3196 3172 net.exe 42 PID 3172 wrote to memory of 3196 3172 net.exe 42 PID 1568 wrote to memory of 8484 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 43 PID 1568 wrote to memory of 8484 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 43 PID 1568 wrote to memory of 8484 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 43 PID 1568 wrote to memory of 8484 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 43 PID 8484 wrote to memory of 8508 8484 net.exe 45 PID 8484 wrote to memory of 8508 8484 net.exe 45 PID 8484 wrote to memory of 8508 8484 net.exe 45 PID 8484 wrote to memory of 8508 8484 net.exe 45 PID 1568 wrote to memory of 8524 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 46 PID 1568 wrote to memory of 8524 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 46 PID 1568 wrote to memory of 8524 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 46 PID 1568 wrote to memory of 8524 1568 e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe 46 PID 8524 wrote to memory of 8548 8524 net.exe 48 PID 8524 wrote to memory of 8548 8524 net.exe 48 PID 8524 wrote to memory of 8548 8524 net.exe 48 PID 8524 wrote to memory of 8548 8524 net.exe 48 PID 268 wrote to memory of 8576 268 oyjOuyK.exe 50 PID 268 wrote to memory of 8576 268 oyjOuyK.exe 50 PID 268 wrote to memory of 8576 268 oyjOuyK.exe 50 PID 268 wrote to memory of 8576 268 oyjOuyK.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe"C:\Users\Admin\AppData\Local\Temp\e63a0fdaaaf0aa3363522e1db78c9f06babb6cfb452aa8cd139aee77e8cbc15a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\oyjOuyK.exe"C:\Users\Admin\AppData\Local\Temp\oyjOuyK.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:3196
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:8576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:8620
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:36620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:36712
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1408
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1820
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:452
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1124
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8484 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8508
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8548
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:36484
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:36580
-
-