Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 06:02

General

  • Target

    2024-01-11_8c275f21cfa70d2fe9f59a22b73e641a_ryuk.exe

  • Size

    1.6MB

  • MD5

    8c275f21cfa70d2fe9f59a22b73e641a

  • SHA1

    ddbbc9e85440af5f997bd9e1d49629eb8b58c31e

  • SHA256

    a43b4d16a77ca3857cefc6e50075d6684fff32a02ab47c0f073156196bd6ff07

  • SHA512

    6a1e5dbcb8668c83c48938d9a0ca05f5a366d03cff1cd0dc166a5ab430b0f53b2a24a10a79b43d089181a49f39db35094d7790c563a363d246638cd48904188b

  • SSDEEP

    12288:ZXDAAZzP/w24lhpPf6t1j7ywI+0bDceNsxK8GrnpixHJJxb37UKVKFMGz:+ANw243BK1jzhIgeNWKDpi1JDkMGz

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_8c275f21cfa70d2fe9f59a22b73e641a_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_8c275f21cfa70d2fe9f59a22b73e641a_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2020

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2020-1-0x0000000140000000-0x000000014026E000-memory.dmp

          Filesize

          2.4MB

        • memory/2020-7-0x00000000008F0000-0x0000000000950000-memory.dmp

          Filesize

          384KB

        • memory/2020-13-0x0000000140000000-0x000000014026E000-memory.dmp

          Filesize

          2.4MB

        • memory/2020-12-0x00000000008F0000-0x0000000000950000-memory.dmp

          Filesize

          384KB

        • memory/2020-0-0x00000000008F0000-0x0000000000950000-memory.dmp

          Filesize

          384KB