Analysis
-
max time kernel
5s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 13:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe
-
Size
212KB
-
MD5
4b856a1955455820d78ff42a58a77cd8
-
SHA1
738ac3a6503620634fe841aac9a3bdff44efe8db
-
SHA256
2d90f3ce2c9cb5e3cb5365e5f618e96c80a08133839ff6b29fc4808fe70ddf41
-
SHA512
d017e766a3ca6f4ef71f137c3b8acd9e4b764ab47c3b5436113c08f1df0e33604b4f2954555edbcd1f3c38d64795a007a627656178c5827661773c45b162ab6f
-
SSDEEP
3072:skoemwJEECCvcVbQQFrUoR19V6To0Hqs3WvSp:ZEECCElQk3wqFu
Score
9/10
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule behavioral2/memory/3028-1-0x00007FF6B5F20000-0x00007FF6B62B7000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1020 2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe 1020 2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe 1020 2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe 1020 2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1020 2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1020 wrote to memory of 3028 1020 2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe 39
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "spooler" /y2⤵PID:372
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "spooler" /y3⤵PID:4564
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:4416
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2372
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:2100
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:964
-
-