Analysis

  • max time kernel
    140s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 22:36

General

  • Target

    2024-01-18_305b1d05a2c8af5ae38fc6c406d9866c_ryuk.exe

  • Size

    1.7MB

  • MD5

    305b1d05a2c8af5ae38fc6c406d9866c

  • SHA1

    c4cd9271b0f5953470e3869dc095104e9c14e4ec

  • SHA256

    2eda87dec3b22cb79916a8867d44b75a685d1d7432435c4b94e192b73a8a9b5c

  • SHA512

    49add4e0470230ef1d004fd0fbde9e28164e8ffc416b00a0793993e9e3334b424fd2ec3457b5226f8e03336a70892a6f4dfa930151760e44571dba3105571d20

  • SSDEEP

    24576:Z6V6gC/AyqGizWCaFbyZHJh7qDxRmN9OlthkUmYGEF4cifb:Z6cSGizWCaFbA+DxrlthkTsiD

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_305b1d05a2c8af5ae38fc6c406d9866c_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_305b1d05a2c8af5ae38fc6c406d9866c_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3196-0-0x0000000140000000-0x0000000140265000-memory.dmp

    Filesize

    2.4MB

  • memory/3196-1-0x00000000021C0000-0x0000000002220000-memory.dmp

    Filesize

    384KB

  • memory/3196-11-0x00000000021C0000-0x0000000002220000-memory.dmp

    Filesize

    384KB

  • memory/3196-8-0x00000000021C0000-0x0000000002220000-memory.dmp

    Filesize

    384KB

  • memory/3196-13-0x0000000140000000-0x0000000140265000-memory.dmp

    Filesize

    2.4MB