Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 01:10
Behavioral task
behavioral1
Sample
2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe
-
Size
6.4MB
-
MD5
5448f611ca6380fa0984a58f8571d39b
-
SHA1
2106ca0cc48d228aa82aa68db6c9e8e6dc31cea2
-
SHA256
ab898eff9ee7c286dfb57ab34efb18969aded12f8bea55b537c9f9e78380de95
-
SHA512
1d79d10c3be18c5f21e19789cf1fda61fa5d4c9da254051a45262b6818501b61c717138b236fc4668fbf5a7d98a29291a730247fb0617763297953b218363cfb
-
SSDEEP
196608:TtcI2tVOfR5vPOHR3f1gwrGXBNlqlhsJ0A42:pj2OZP23fqxNWsZ
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2552 2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe 2552 2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2552 2956 2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe 85 PID 2956 wrote to memory of 2552 2956 2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe 85 PID 2552 wrote to memory of 4744 2552 2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe 87 PID 2552 wrote to memory of 4744 2552 2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_5448f611ca6380fa0984a58f8571d39b_ryuk.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pip install psutil3⤵PID:4744
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD56e2ebe550eaeacc198b7ead9fcbe2ce5
SHA151e2e0b0b3505e31e9b74dbe287dc717b1606f2b
SHA2562f74926b20672324853d3328863fdb1cd7cf3d8e7fbb6dd18d902a982adb641d
SHA5123169f9d5dab5fc01e1cdc6c6bf96c20d6ad71d8314091d47c56ea3be37b1d377501e1f2f3bde9c2e7dcff660abddc07065aea4b28d5b94c3a49d43aefb696bee
-
Filesize
118KB
MD514a00d260c8dd3c05acd2aee92c80497
SHA1270a79e486bec4aed0f4e839d560ae4cf678ae84
SHA25614df3e276e4ab33aec0731201dd6cd571baff1b7f21430cc1e4e0d36251475be
SHA512e3d3e95fc8f93f5d217b5d3a6250755c919509a7a37e285efb508c84fcaa6b5dccd10fbb105333dd34aca94f948648d35f1a0797c1015da0314f86035ee511f4