Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 15:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-23_0b39263d0119a9436fbd7beeada340f5_ryuk.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-23_0b39263d0119a9436fbd7beeada340f5_ryuk.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-23_0b39263d0119a9436fbd7beeada340f5_ryuk.exe
-
Size
1.5MB
-
MD5
0b39263d0119a9436fbd7beeada340f5
-
SHA1
306370e8391402fc18526cc7adfaaecfed71bc53
-
SHA256
04b01a36ee85bdb0fae1f81c339b07fe92956f9b185504c6d539830e6f53c9d5
-
SHA512
e81255c8669f224d7e7e45d19bd7af244a11f4b58b1ac8e03ad1f0fb0280613d098c7fcf58468ffe99ff445dd2a58599e167b466e94c3b810f6c8a9c67746a2d
-
SSDEEP
24576:GANw243IWHRlMugdD+JsRgZRJ4fM430Eg6nET7M/IiN:Gew2UxlMPdlR8v4UC0Eg6ET7M/I
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-01-23_0b39263d0119a9436fbd7beeada340f5_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2104 2024-01-23_0b39263d0119a9436fbd7beeada340f5_ryuk.exe