Analysis

  • max time kernel
    148s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 05:53

General

  • Target

    2024-01-09_471b5fd8f3d43327356f6fdd3e3ddaeb_ryuk.exe

  • Size

    1.8MB

  • MD5

    471b5fd8f3d43327356f6fdd3e3ddaeb

  • SHA1

    196b4fe0e53cf5b39d47d5bcf452f07e6271a249

  • SHA256

    1ce20aa81831acd642db137d68208487cb721673e8f33f1a6abcbc77e5866d04

  • SHA512

    2e3d41c7fd78f3f7aa83f126da9d689d4c6c2b7226d9dffc50ab91d675b9ad4f7191e472b4bc94930e6986a9f2cd18da520b71e86703fb258141cb6d432cd1cf

  • SSDEEP

    24576:LM56HMIS/cag4c96RlXfbRwkmzo4YjgXe4i7ojhsP5Lgrk1TWb4AN5:Y5SZGcag4c9sTDmk4re30jaNf1TWbdz

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_471b5fd8f3d43327356f6fdd3e3ddaeb_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_471b5fd8f3d43327356f6fdd3e3ddaeb_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1556-1-0x0000000140000000-0x00000001401F0000-memory.dmp

    Filesize

    1.9MB

  • memory/1556-0-0x00000000020D0000-0x0000000002130000-memory.dmp

    Filesize

    384KB

  • memory/1556-8-0x00000000020D0000-0x0000000002130000-memory.dmp

    Filesize

    384KB

  • memory/1556-7-0x00000000020D0000-0x0000000002130000-memory.dmp

    Filesize

    384KB

  • memory/1556-10-0x00000000020D0000-0x0000000002130000-memory.dmp

    Filesize

    384KB

  • memory/1556-12-0x0000000140000000-0x00000001401F0000-memory.dmp

    Filesize

    1.9MB