Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20/02/2022, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe
Resource
win10v2004-en-20220113
General
-
Target
5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe
-
Size
129KB
-
MD5
d7697d0d692bd883e53036b906108d56
-
SHA1
cbff9d66d68fa67e40ca4a295daed68f0d5f8383
-
SHA256
5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5
-
SHA512
6b2dc807abecb6075e754c49baf703ec44ea9e45ae82ffdef855bbae85768605696071c8c7a3e333ce363df7434d2613be4db2052fe56ed30cab7154cd9246f6
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Drops desktop.ini file(s) 53 IoCs
description ioc Process File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\K819CMRP\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\FNOUQX38\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\RO7FJFDE\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\T7AS43M2\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\T0STXTA8\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\NK9YD4KU\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\NK9YD4KU\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\T0STXTA8\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Recent\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Downloads\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\QDAZQ7UR\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\FNOUQX38\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\Searches\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\S3IV548V\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\RO7FJFDE\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\T7AS43M2\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\Favorites\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\K819CMRP\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Desktop\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\NK9YD4KU\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\QDAZQ7UR\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links for United States\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\K819CMRP\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\Saved Games\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Links\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Pictures\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\NK9YD4KU\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\S3IV548V\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\S3IV548V\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\QDAZQ7UR\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\S3IV548V\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\K819CMRP\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\QDAZQ7UR\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Videos\desktop.ini 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1680 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1416 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1680 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe Token: SeBackupPrivilege 1260 taskhost.exe Token: SeBackupPrivilege 1680 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE 1416 Explorer.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1260 1680 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe 18 PID 1680 wrote to memory of 1352 1680 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe 17 PID 1680 wrote to memory of 1416 1680 5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe"C:\Users\Admin\AppData\Local\Temp\5b1ab6fae05ca9005ee7026cc30fb79780c470d6a920a63383c3496381778fb5.exe"2⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1352
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:1260