Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_98d7da39fafb24d903e8cf1d50408b9a_ryuk.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
2024-01-25_98d7da39fafb24d903e8cf1d50408b9a_ryuk.exe
-
Size
2.1MB
-
MD5
98d7da39fafb24d903e8cf1d50408b9a
-
SHA1
70e35c3e25b1fca399edb942f32fabc1f5dbe267
-
SHA256
79ea36ef3757d6eb13e014f7339aa5ab4cc4a96fde15afbe470542d7d72e9586
-
SHA512
345078ad218ab50abfff8d152cc7dc39d329ccd5002a49c425c2795807998c5805440b1c8eeaac22915bb1f8bb9598d183eb20f93b042aa73c11e28f95e74383
-
SSDEEP
49152:ugp6n0bEQ0zm8zhNr6M4olFmOpmRS1fcTIzc+pFzz+/2fNR:cNm8zrCg1M+pFtFR
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
2024-01-25_98d7da39fafb24d903e8cf1d50408b9a_ryuk.exedescription ioc process File opened for modification C:\Windows\System32\alg.exe 2024-01-25_98d7da39fafb24d903e8cf1d50408b9a_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-01-25_98d7da39fafb24d903e8cf1d50408b9a_ryuk.exedescription pid process Token: SeTakeOwnershipPrivilege 2900 2024-01-25_98d7da39fafb24d903e8cf1d50408b9a_ryuk.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2900-0-0x00000000003C0000-0x0000000000420000-memory.dmpFilesize
384KB
-
memory/2900-1-0x0000000140000000-0x0000000140229000-memory.dmpFilesize
2.2MB
-
memory/2900-8-0x00000000003C0000-0x0000000000420000-memory.dmpFilesize
384KB
-
memory/2900-7-0x00000000003C0000-0x0000000000420000-memory.dmpFilesize
384KB
-
memory/2900-12-0x00000000003C0000-0x0000000000420000-memory.dmpFilesize
384KB
-
memory/2900-14-0x0000000140000000-0x0000000140229000-memory.dmpFilesize
2.2MB