Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe
-
Size
14.0MB
-
MD5
fc98f5d0bc1552483a44c85d53384a6e
-
SHA1
d696097fec437d4f31739d1460b180e67795b9d6
-
SHA256
33a32609cb5acf54abeef9eed08d24a03dfd138ddd4b6132c8add72d8232b43a
-
SHA512
5b3f9769de97b61568611ed852efcdcb52d9d2371026dc434aeab2f42197cc6a876a24c1132ec0861bd6895c7c9ca164370da9ae63009bd4432ef8ed9dddefa4
-
SSDEEP
393216:IxhOGfw/zTNVC2bH2McKpqeTP91UIU537BEBE/P:aIoszT7C2KMzg537iBEH
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
acC1BbG3DWMqx8btFk0h
Signatures
-
An open source browser data exporter written in golang. 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023d02-155.dat family_hackbrowserdata behavioral2/memory/1264-262-0x00007FF70BCD0000-0x00007FF70D15E000-memory.dmp family_hackbrowserdata -
HackBrowserData
An open source golang web browser extractor.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 19 1260 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 1264 hack-browser-data.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 1260 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 3000 timeout.exe 2180 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings 2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4256 powershell.exe 4256 powershell.exe 1260 powershell.exe 1260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4256 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 960 wrote to memory of 2700 960 2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe 85 PID 960 wrote to memory of 2700 960 2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe 85 PID 2700 wrote to memory of 1596 2700 WScript.exe 86 PID 2700 wrote to memory of 1596 2700 WScript.exe 86 PID 1596 wrote to memory of 1348 1596 cmd.exe 88 PID 1596 wrote to memory of 1348 1596 cmd.exe 88 PID 1348 wrote to memory of 1264 1348 cmd.exe 89 PID 1348 wrote to memory of 1264 1348 cmd.exe 89 PID 1596 wrote to memory of 3000 1596 cmd.exe 91 PID 1596 wrote to memory of 3000 1596 cmd.exe 91 PID 1596 wrote to memory of 4256 1596 cmd.exe 92 PID 1596 wrote to memory of 4256 1596 cmd.exe 92 PID 1596 wrote to memory of 1260 1596 cmd.exe 93 PID 1596 wrote to memory of 1260 1596 cmd.exe 93 PID 1596 wrote to memory of 2180 1596 cmd.exe 95 PID 1596 wrote to memory of 2180 1596 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-08_fc98f5d0bc1552483a44c85d53384a6e_ryuk.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hideCMD.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ha.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\cmd.execmd /c "start "" .\toboot\hack-browser-data.exe -f json --dir res --zip"4⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\toboot\hack-browser-data.exe.\toboot\hack-browser-data.exe -f json --dir res --zip5⤵
- Executes dropped EXE
PID:1264
-
-
-
C:\Windows\system32\timeout.exetimeout /t 44⤵
- Delays execution with timeout.exe
PID:3000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Compress-Archive -Path ".\res" -DestinationPath .\res.zip -CompressionLevel Fastest -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -file "HBDSend.ps1"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\system32\timeout.exetimeout /t 44⤵
- Delays execution with timeout.exe
PID:2180
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
1KB
MD5c86ee90124c6374bc4c440a308eceb38
SHA1b2075096ffa0abb9ba5abb0348e921e03fdf97b1
SHA25699412b05f5ff937533a9c7dfc5ae65a4626c8f7f8b985c0b3a1e0ab5933863c8
SHA5123dfadcd144a269cdf379aeb7f911642823e0426cda40cd231d90360f2aef7f6e49e68e0eaf742327ea3422a373128fb9652f8a361caa6ba99b8623eef1c6b8de
-
Filesize
206B
MD5161010715d0c362173bf20c28c2fd9b7
SHA1f80849d90d3a9843a658e5560f000f97fc4d8d01
SHA256de309dabda86493c2e3260c1e17dd794211789121ffbd93a291909d48a5697e7
SHA512c7599a1d21226e3fb73e669a9451b14dfc6d0d9ce6866bc382e32c645f79671f6457b15cf5e377006bc14f3cd8dd7754a5ff1e4496c1bb4129d7d271ff2293c4
-
Filesize
390B
MD54802a57c6fccba23e67bc66c31356d4f
SHA1fc030aa0f325b17643f58c2659c0742890d9f3d7
SHA2565578ae9942d3aeba7898924a489752dd6c209d4b22cbbdb2eb5f946c61d0df35
SHA5129c2843455b90f14393ff1f6e7b0736607ba16a0e89eef4a9f0d6b7affd3430b2b6dcf87d588758f99d3ae29fcb365e584e40d760024dd1ea2108b3d9190d0b0a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8KB
MD5958a1ff72044f30f68af82e585733974
SHA19ac41e433578b0e8aaa2f4b8ca7cb228d9d412f3
SHA256d53a7c0b594df00f6c490776af5e2f4697c585a470eb9d2c5d77292722756eaf
SHA512de9d693a3c8ae4c6814427120bb163737e7714bec98d5c2a825e163addfd497818a9ba9c55b5ca2bddf5b4b2f1ba9588586b2a96405ee443b8babf2433d98256
-
Filesize
338B
MD5fddf7e3115d866f57c8ee7c39faba7c7
SHA1380fd6c70888e59b3e6422b482bd993a1c6f4092
SHA25658eba8234f52ee4f5cb65bcc38f612fcd0025fbfaaa092f994aa0af02c2623cd
SHA5123efc29aab85d86e83f533baadd275b4692eef50cf1cd600fc6bd27f110bfc0494353ed99679e9e93e3cdc119ea05161cb35906855ad8dedcf6f2324f87041d55
-
Filesize
51B
MD58cb717954c207bc5d1866f0b91f3705b
SHA1bb2eb348bbaae1c03f0e8a69fe632acf3654906d
SHA2565098540013c04d7a204e5ccd000d0342e2724b2a5747c6cde3423c33670e7125
SHA51228671621ebc6b0e2ef08d910770463935f484b3a2bbf2f2d902436856ca63dfefb1d4c5c57bb0eb84d973295bf7dccf4767a72ed26b62f9b7476c5ac51b858bd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5da4955f00150bd6659d9fede22cdb031
SHA1b62d735d547383fc8cd99a39ec8b09373dd0aee7
SHA2567b2ca17aef33a27c0a304a1db291d62510e6bac8470354d8a20508ad5827dccd
SHA512aa657169a85d1ac7c5691a7c3eed6cad19bd6c6671f246045bcc3c94df7338a5bd4a0a382588d98539b6c106ec38997a24ea14f25c67b2d564c1197e54e86e09
-
Filesize
1023B
MD5be3ef38a5549839f142b69e300d32859
SHA10d5f559740bbdafbb8ba682ce3c36ad5ad2d9729
SHA2562cf82dab7376ec4da21b96f13cc93f485ca648d39be003774f7a77ca130e0a58
SHA512ea9734b74c666ef127d28358c72b6fb79fccc5bb59d81a52b15865fd2760101e91b958944d95b02818859b4d4b608748e4a68160dfe2a729b038803606b4242a
-
Filesize
2KB
MD5c69904bff2d0e3fdae0d5fcda30ef19d
SHA1fead75d0019382bfe4250c1c05c69f8845cb1f77
SHA2560151f2d1ed4d991e25f8e657eced0406b0fe4011a34013dbe5eff7809e80061d
SHA512406733f0f5f0b8f9d3e898b28b1f89be35e48a86391ed317b0f9e60aebdd1f9581acf3863c8490c3dcb72ed989aed5b33458e5553944968ce318e5ac850c3c77
-
Filesize
20.9MB
MD56c66514d0e3b4cf5a2e4c2844efcb1f3
SHA1682d46485ce44e719309f80483221d82011c3779
SHA2567374c9b387000b813be75e10c2b988bf8d892985de63eb7446e11ceb225312e8
SHA5124ca2657b47f145db2b162428ed057b52260a0db6758bf21803d75c6451914918f6392a4f8eb4216929e9feac1da70c161bd5ff61878d328863c9267c798c81a5