Analysis
-
max time kernel
133s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exe
-
Size
91KB
-
MD5
20b5cf2c27b496d579eff920b6b020ea
-
SHA1
eb5cd4c784c3f8e84712e4f8d9cf0fcbf9ddcffd
-
SHA256
8792ad217a3e74c8b3f09da095c98b0f75074e3d0a52711ccd46ff40b6e44d51
-
SHA512
d8c0084fa00713baed9dbd8c4d9f8fccb3052eedddf21d632f69d59b204330fef9a15e42200296af822bae54a30d367d8dd4967f3eb6e2a6e7307d2c3369920e
-
SSDEEP
1536:suRFSPMJQAS2K7+gZfkEgaIwgKG1sWVdc9dlDXnGa9VhR68MIF:suzSPwq7BFkErHRGHUl3t9VhRZ
Malware Config
Extracted
cobaltstrike
http://154.204.58.234:4433/jquery-3.3.2.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4242.0 Safari/537.36
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exepid process 1968 2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2996 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
explorer.exedescription pid process Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 2996 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
Processes:
explorer.exepid process 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
Processes:
explorer.exepid process 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe -
Suspicious use of WriteProcessMemory 1 IoCs
Processes:
2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exedescription pid process target process PID 1968 wrote to memory of 1256 1968 2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exe Explorer.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-26_20b5cf2c27b496d579eff920b6b020ea_ryuk.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1256-0-0x0000000002C00000-0x0000000002C01000-memory.dmpFilesize
4KB
-
memory/1256-1-0x0000000002C00000-0x0000000002C01000-memory.dmpFilesize
4KB
-
memory/1256-2-0x0000000002BE0000-0x0000000002BE1000-memory.dmpFilesize
4KB
-
memory/2996-3-0x0000000004240000-0x0000000004241000-memory.dmpFilesize
4KB
-
memory/2996-4-0x0000000004240000-0x0000000004241000-memory.dmpFilesize
4KB
-
memory/2996-8-0x0000000002750000-0x0000000002760000-memory.dmpFilesize
64KB