Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 04:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe
-
Size
627KB
-
MD5
f385d5765004cd7ca4162da807635a7f
-
SHA1
2aedbe1d1ac7133a325650e35e8b1b7258aabda5
-
SHA256
7ee703efee4bd394efd87fcaf1a4ab9d78e767e9baf287d54125f4d4f147d0a9
-
SHA512
9f94288d8fc7860c735d27d869460879db82d3baba6a117552a24afb11257851ce410be4d2cc3365686992de34eb179a1d0178149939ebb8d45fb628cc296bc8
-
SSDEEP
12288:kQJlmyBNzSZUHnKCTzpzL6RF99CwiGafY4qUgFFWhcVcXENsaZhnrzY:DfzSZEnKYd6CwC4FWhcVEENsMhnrz
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uNrMTIwZhkXd63\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\uNrMTIwZhkXd633OtOPb.sys" 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeLoadDriverPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeDebugPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeCreateTokenPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeAssignPrimaryTokenPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeIncreaseQuotaPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeMachineAccountPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeTcbPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeSecurityPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeSystemProfilePrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeProfSingleProcessPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeCreatePagefilePrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeAuditPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: SeSystemEnvironmentPrivilege 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe Token: 35 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4252 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe 85 PID 2872 wrote to memory of 4252 2872 2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_f385d5765004cd7ca4162da807635a7f_ryuk.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:4252
-