Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 06:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-11_8c275f21cfa70d2fe9f59a22b73e641a_ryuk.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-11_8c275f21cfa70d2fe9f59a22b73e641a_ryuk.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-11_8c275f21cfa70d2fe9f59a22b73e641a_ryuk.exe
-
Size
1.6MB
-
MD5
8c275f21cfa70d2fe9f59a22b73e641a
-
SHA1
ddbbc9e85440af5f997bd9e1d49629eb8b58c31e
-
SHA256
a43b4d16a77ca3857cefc6e50075d6684fff32a02ab47c0f073156196bd6ff07
-
SHA512
6a1e5dbcb8668c83c48938d9a0ca05f5a366d03cff1cd0dc166a5ab430b0f53b2a24a10a79b43d089181a49f39db35094d7790c563a363d246638cd48904188b
-
SSDEEP
12288:ZXDAAZzP/w24lhpPf6t1j7ywI+0bDceNsxK8GrnpixHJJxb37UKVKFMGz:+ANw243BK1jzhIgeNWKDpi1JDkMGz
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-01-11_8c275f21cfa70d2fe9f59a22b73e641a_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2020 2024-01-11_8c275f21cfa70d2fe9f59a22b73e641a_ryuk.exe