Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 06:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-23_dca467cd1d74883c57b19cb088e3a9de_cobalt-strike_ryuk.exe
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-23_dca467cd1d74883c57b19cb088e3a9de_cobalt-strike_ryuk.exe
Resource
win10v2004-20240221-en
2 signatures
150 seconds
General
-
Target
2024-02-23_dca467cd1d74883c57b19cb088e3a9de_cobalt-strike_ryuk.exe
-
Size
796KB
-
MD5
dca467cd1d74883c57b19cb088e3a9de
-
SHA1
17ba4931a201913912e789d774d8d9368abdddb9
-
SHA256
ed67715c7472a3ee806cc2c48f3e466632e33d5724a78d8b56d6277175bd2234
-
SHA512
5ae267c8ec99ad58915942fc4331edc772260ed13f03cd142fe82a0959d840a5ea07c4e2afdc791bcc9853bb4fa238fffa3863489b183536991dbf017007d39e
-
SSDEEP
24576:IANw243E8S+LbzQkWWbCzLLB+lMP1NFzSRY:Iew258FD5nb2LLPrFmRY
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-02-23_dca467cd1d74883c57b19cb088e3a9de_cobalt-strike_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3820 2024-02-23_dca467cd1d74883c57b19cb088e3a9de_cobalt-strike_ryuk.exe