Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
174s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20/02/2022, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe
Resource
win10v2004-en-20220113
General
-
Target
7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe
-
Size
191KB
-
MD5
708f63f5ef0bafa61743f242f470480f
-
SHA1
96233bf3b488a31852b8e32f7cb91dd5d935f9c2
-
SHA256
7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9
-
SHA512
5e202f916430e179373c814e2b2cefbb993b83c597776afecea731c190f3aec1ce21c76ce1786afc8ab5d92c060201ce0828b9ac81d709407a8b6358146260c9
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 1660 QUkJTEr.exe -
Loads dropped DLL 2 IoCs
pid Process 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QUkJTEr.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 1660 QUkJTEr.exe 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1660 QUkJTEr.exe 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 1660 QUkJTEr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe Token: SeBackupPrivilege 1660 QUkJTEr.exe Token: SeBackupPrivilege 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1660 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 27 PID 1700 wrote to memory of 1660 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 27 PID 1700 wrote to memory of 1660 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 27 PID 1700 wrote to memory of 1660 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 27 PID 1700 wrote to memory of 1108 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 8 PID 1700 wrote to memory of 1172 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 14 PID 1700 wrote to memory of 528 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 28 PID 1700 wrote to memory of 528 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 28 PID 1700 wrote to memory of 528 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 28 PID 1700 wrote to memory of 528 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 28 PID 1700 wrote to memory of 1488 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 30 PID 1700 wrote to memory of 1488 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 30 PID 1700 wrote to memory of 1488 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 30 PID 1700 wrote to memory of 1488 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 30 PID 1700 wrote to memory of 1816 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 32 PID 1700 wrote to memory of 1816 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 32 PID 1700 wrote to memory of 1816 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 32 PID 1700 wrote to memory of 1816 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 32 PID 1700 wrote to memory of 1156 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 34 PID 1700 wrote to memory of 1156 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 34 PID 1700 wrote to memory of 1156 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 34 PID 1700 wrote to memory of 1156 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 34 PID 1700 wrote to memory of 1860 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 36 PID 1700 wrote to memory of 1860 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 36 PID 1700 wrote to memory of 1860 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 36 PID 1700 wrote to memory of 1860 1700 7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe 36 PID 1660 wrote to memory of 1864 1660 QUkJTEr.exe 38 PID 1660 wrote to memory of 1864 1660 QUkJTEr.exe 38 PID 1660 wrote to memory of 1864 1660 QUkJTEr.exe 38 PID 1660 wrote to memory of 1864 1660 QUkJTEr.exe 38 PID 1660 wrote to memory of 1904 1660 QUkJTEr.exe 40 PID 1660 wrote to memory of 1904 1660 QUkJTEr.exe 40 PID 1660 wrote to memory of 1904 1660 QUkJTEr.exe 40 PID 1660 wrote to memory of 1904 1660 QUkJTEr.exe 40 PID 1816 wrote to memory of 1680 1816 net.exe 45 PID 1816 wrote to memory of 1680 1816 net.exe 45 PID 1816 wrote to memory of 1680 1816 net.exe 45 PID 1816 wrote to memory of 1680 1816 net.exe 45 PID 1156 wrote to memory of 1548 1156 net.exe 43 PID 1156 wrote to memory of 1548 1156 net.exe 43 PID 1156 wrote to memory of 1548 1156 net.exe 43 PID 1156 wrote to memory of 1548 1156 net.exe 43 PID 528 wrote to memory of 1668 528 net.exe 44 PID 528 wrote to memory of 1668 528 net.exe 44 PID 528 wrote to memory of 1668 528 net.exe 44 PID 528 wrote to memory of 1668 528 net.exe 44 PID 1864 wrote to memory of 1620 1864 net.exe 42 PID 1864 wrote to memory of 1620 1864 net.exe 42 PID 1864 wrote to memory of 1620 1864 net.exe 42 PID 1864 wrote to memory of 1620 1864 net.exe 42 PID 1488 wrote to memory of 1336 1488 net.exe 46 PID 1488 wrote to memory of 1336 1488 net.exe 46 PID 1488 wrote to memory of 1336 1488 net.exe 46 PID 1488 wrote to memory of 1336 1488 net.exe 46 PID 1860 wrote to memory of 1868 1860 cmd.exe 47 PID 1860 wrote to memory of 1868 1860 cmd.exe 47 PID 1860 wrote to memory of 1868 1860 cmd.exe 47 PID 1860 wrote to memory of 1868 1860 cmd.exe 47 PID 1904 wrote to memory of 916 1904 net.exe 48 PID 1904 wrote to memory of 916 1904 net.exe 48 PID 1904 wrote to memory of 916 1904 net.exe 48 PID 1904 wrote to memory of 916 1904 net.exe 48 PID 1660 wrote to memory of 3064 1660 QUkJTEr.exe 51 PID 1660 wrote to memory of 3064 1660 QUkJTEr.exe 51
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe"C:\Users\Admin\AppData\Local\Temp\7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\QUkJTEr.exe"C:\Users\Admin\AppData\Local\Temp\QUkJTEr.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:1620
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\QUkJTEr.exe" /f /reg:643⤵PID:3064
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\QUkJTEr.exe" /f /reg:644⤵
- Adds Run key to start application
PID:932
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:36236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:36272
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1668
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1336
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1680
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe" /f /reg:642⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7433f2a47d324d386ed215930ab6607a7cce28d5cef868afe994582c409e5dc9.exe" /f /reg:643⤵
- Adds Run key to start application
PID:1868
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:4304
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4328
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:4752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4976
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:36504
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:36020
-
-