Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 13:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-20_47ab286da161a03e6a1c64fe4c6f9edf_ryuk.exe
Resource
win7-20240215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-20_47ab286da161a03e6a1c64fe4c6f9edf_ryuk.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-02-20_47ab286da161a03e6a1c64fe4c6f9edf_ryuk.exe
-
Size
1.8MB
-
MD5
47ab286da161a03e6a1c64fe4c6f9edf
-
SHA1
109b1c39fa3880fce7eb298dd7ece7a4ab0ad9ad
-
SHA256
0d8ad15fd97a2555feace9caa32f649b8c7eecb4f52f419f6a02f738fcd9a3de
-
SHA512
2ae49c78971ad1c7c2205f0e9372de39cd0dad558cecf3b7887eac16eb5e1e63781dbe606839b4ca6c022f13f12a53680ea1b72d2815819d840c85ba4d9638f4
-
SSDEEP
24576:oZAfcwJ+RN0Djsf9nz4mloFQnpXUMPQDR6q79dA:omfUiDYf5zaCpXxPuR6E9dA
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-02-20_47ab286da161a03e6a1c64fe4c6f9edf_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2308 2024-02-20_47ab286da161a03e6a1c64fe4c6f9edf_ryuk.exe