Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
181s -
max time network
229s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20/02/2022, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe
Resource
win10v2004-en-20220113
General
-
Target
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe
-
Size
188KB
-
MD5
d2d3d877e06b0181b67c6e610b40c44c
-
SHA1
6a0dd2ab04d5b0b6869d5b7d9b4eb591087bace9
-
SHA256
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
-
SHA512
320cc4f1862425d706c4d369fa5f13a62cc9f3454dae91b239a28440c14dd92972b8d1cfa4fea699dc996e67c3a4db49b4c4ed6e63329492ee6cf8f4f7059cf0
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 4628 XaKdReS.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation XaKdReS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 4628 XaKdReS.exe 4628 XaKdReS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe Token: SeBackupPrivilege 4628 XaKdReS.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4628 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 83 PID 5088 wrote to memory of 4628 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 83 PID 5088 wrote to memory of 4628 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 83 PID 5088 wrote to memory of 3436 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 84 PID 5088 wrote to memory of 3436 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 84 PID 5088 wrote to memory of 3436 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 84 PID 3436 wrote to memory of 3632 3436 net.exe 86 PID 3436 wrote to memory of 3632 3436 net.exe 86 PID 3436 wrote to memory of 3632 3436 net.exe 86 PID 5088 wrote to memory of 4436 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 87 PID 5088 wrote to memory of 4436 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 87 PID 5088 wrote to memory of 4436 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 87 PID 4436 wrote to memory of 1272 4436 net.exe 89 PID 4436 wrote to memory of 1272 4436 net.exe 89 PID 4436 wrote to memory of 1272 4436 net.exe 89 PID 5088 wrote to memory of 2668 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 91 PID 5088 wrote to memory of 2668 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 91 PID 5088 wrote to memory of 2668 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 91 PID 2668 wrote to memory of 1772 2668 net.exe 93 PID 2668 wrote to memory of 1772 2668 net.exe 93 PID 2668 wrote to memory of 1772 2668 net.exe 93 PID 5088 wrote to memory of 4616 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 94 PID 5088 wrote to memory of 4616 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 94 PID 5088 wrote to memory of 4616 5088 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 94 PID 4616 wrote to memory of 3976 4616 net.exe 96 PID 4616 wrote to memory of 3976 4616 net.exe 96 PID 4616 wrote to memory of 3976 4616 net.exe 96 PID 4628 wrote to memory of 4356 4628 XaKdReS.exe 97 PID 4628 wrote to memory of 4356 4628 XaKdReS.exe 97 PID 4628 wrote to memory of 4356 4628 XaKdReS.exe 97 PID 4628 wrote to memory of 4136 4628 XaKdReS.exe 99 PID 4628 wrote to memory of 4136 4628 XaKdReS.exe 99 PID 4628 wrote to memory of 4136 4628 XaKdReS.exe 99 PID 4136 wrote to memory of 3048 4136 net.exe 101 PID 4136 wrote to memory of 3048 4136 net.exe 101 PID 4136 wrote to memory of 3048 4136 net.exe 101 PID 4356 wrote to memory of 3936 4356 net.exe 102 PID 4356 wrote to memory of 3936 4356 net.exe 102 PID 4356 wrote to memory of 3936 4356 net.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe"C:\Users\Admin\AppData\Local\Temp\4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\XaKdReS.exe"C:\Users\Admin\AppData\Local\Temp\XaKdReS.exe" 8 LAN2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:3936
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:3048
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:3632
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1272
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1772
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3976
-
-