Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe
Resource
win10v2004-20220812-en
General
-
Target
0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe
-
Size
63KB
-
MD5
7ac7fa1d0b8653556b1f773534aaaee0
-
SHA1
353143b31e48f08c4402f1df9b85d990fff85277
-
SHA256
0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e
-
SHA512
eb74d5141d42f3edfb7377c82c45a593ffb6dd5c4a051b7153c813659fc77e22118e0ff5a3aba4b25bbced9b6f59b817fc550c55d44413948584676975f6ebf7
-
SSDEEP
1536:wGN7c9SKiGN8fsR1lGyHm5q7yaF4DJxChSG:BySFI8kGyH/yaKVx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1352 ryrtuc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ryrtuc.exe 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe File opened for modification C:\Windows\SysWOW64\ryrtuc.exe 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1352 ryrtuc.exe -
Suspicious behavior: MapViewOfSection 41 IoCs
pid Process 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe 1352 ryrtuc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe Token: SeDebugPrivilege 1352 ryrtuc.exe Token: SeIncBasePriorityPrivilege 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 368 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 23 PID 2020 wrote to memory of 368 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 23 PID 2020 wrote to memory of 368 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 23 PID 2020 wrote to memory of 368 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 23 PID 2020 wrote to memory of 368 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 23 PID 2020 wrote to memory of 368 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 23 PID 2020 wrote to memory of 368 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 23 PID 2020 wrote to memory of 376 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 22 PID 2020 wrote to memory of 376 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 22 PID 2020 wrote to memory of 376 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 22 PID 2020 wrote to memory of 376 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 22 PID 2020 wrote to memory of 376 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 22 PID 2020 wrote to memory of 376 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 22 PID 2020 wrote to memory of 376 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 22 PID 2020 wrote to memory of 416 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 21 PID 2020 wrote to memory of 416 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 21 PID 2020 wrote to memory of 416 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 21 PID 2020 wrote to memory of 416 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 21 PID 2020 wrote to memory of 416 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 21 PID 2020 wrote to memory of 416 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 21 PID 2020 wrote to memory of 416 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 21 PID 2020 wrote to memory of 464 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2 PID 2020 wrote to memory of 464 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2 PID 2020 wrote to memory of 464 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2 PID 2020 wrote to memory of 464 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2 PID 2020 wrote to memory of 464 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2 PID 2020 wrote to memory of 464 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2 PID 2020 wrote to memory of 464 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 2 PID 2020 wrote to memory of 472 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1 PID 2020 wrote to memory of 472 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1 PID 2020 wrote to memory of 472 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1 PID 2020 wrote to memory of 472 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1 PID 2020 wrote to memory of 472 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1 PID 2020 wrote to memory of 472 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1 PID 2020 wrote to memory of 472 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 1 PID 2020 wrote to memory of 480 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 3 PID 2020 wrote to memory of 480 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 3 PID 2020 wrote to memory of 480 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 3 PID 2020 wrote to memory of 480 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 3 PID 2020 wrote to memory of 480 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 3 PID 2020 wrote to memory of 480 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 3 PID 2020 wrote to memory of 480 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 3 PID 2020 wrote to memory of 576 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 20 PID 2020 wrote to memory of 576 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 20 PID 2020 wrote to memory of 576 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 20 PID 2020 wrote to memory of 576 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 20 PID 2020 wrote to memory of 576 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 20 PID 2020 wrote to memory of 576 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 20 PID 2020 wrote to memory of 576 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 20 PID 2020 wrote to memory of 656 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 19 PID 2020 wrote to memory of 656 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 19 PID 2020 wrote to memory of 656 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 19 PID 2020 wrote to memory of 656 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 19 PID 2020 wrote to memory of 656 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 19 PID 2020 wrote to memory of 656 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 19 PID 2020 wrote to memory of 656 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 19 PID 2020 wrote to memory of 728 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 18 PID 2020 wrote to memory of 728 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 18 PID 2020 wrote to memory of 728 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 18 PID 2020 wrote to memory of 728 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 18 PID 2020 wrote to memory of 728 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 18 PID 2020 wrote to memory of 728 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 18 PID 2020 wrote to memory of 728 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 18 PID 2020 wrote to memory of 788 2020 0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe 16
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:472
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:864
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1704
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1932
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1272
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:380
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:992
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:828
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:788
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:728
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:656
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:576
-
-
C:\Windows\SysWOW64\ryrtuc.exeC:\Windows\SysWOW64\ryrtuc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:480
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe"C:\Users\Admin\AppData\Local\Temp\0ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1364
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD57ac7fa1d0b8653556b1f773534aaaee0
SHA1353143b31e48f08c4402f1df9b85d990fff85277
SHA2560ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e
SHA512eb74d5141d42f3edfb7377c82c45a593ffb6dd5c4a051b7153c813659fc77e22118e0ff5a3aba4b25bbced9b6f59b817fc550c55d44413948584676975f6ebf7
-
Filesize
63KB
MD57ac7fa1d0b8653556b1f773534aaaee0
SHA1353143b31e48f08c4402f1df9b85d990fff85277
SHA2560ff350994a03055f6cba9f71ccea07c0e9ac1cbcdee8072c41645af2c718c81e
SHA512eb74d5141d42f3edfb7377c82c45a593ffb6dd5c4a051b7153c813659fc77e22118e0ff5a3aba4b25bbced9b6f59b817fc550c55d44413948584676975f6ebf7