Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2024, 09:39

General

  • Target

    2024-01-29_7e8b66ddafb9f5f578d40c08a3ee21bd_ryuk.exe

  • Size

    1.9MB

  • MD5

    7e8b66ddafb9f5f578d40c08a3ee21bd

  • SHA1

    3ede2a307f955436f4e02372903751b607eea076

  • SHA256

    9023d9bbe4bde45ad507d2cd828910509730077bf41236dce5ad4b6129620f5a

  • SHA512

    f7b5d58ef028375287ed10bae0c7c97ef31ba4f60bf3f323aa06f8ff7716b8f2666a30ebc228625b517ae9aa0df5d37d679e4a5a2b32bec96a76a70e2ec1d508

  • SSDEEP

    49152:VlOVDTtQY6SoNtaUJ6SUnHpclbwbWAaJiwmcTdcoVCks7R9L58UqFJjskU:6qfUHxqPF7C17DVqFJU

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-29_7e8b66ddafb9f5f578d40c08a3ee21bd_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-29_7e8b66ddafb9f5f578d40c08a3ee21bd_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2528

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2528-0-0x00000000002F0000-0x0000000000350000-memory.dmp

    Filesize

    384KB

  • memory/2528-4-0x0000000140000000-0x0000000140201000-memory.dmp

    Filesize

    2.0MB

  • memory/2528-8-0x00000000002F0000-0x0000000000350000-memory.dmp

    Filesize

    384KB

  • memory/2528-10-0x00000000002F0000-0x0000000000350000-memory.dmp

    Filesize

    384KB

  • memory/2528-12-0x0000000140000000-0x0000000140201000-memory.dmp

    Filesize

    2.0MB