Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe
Resource
win7-20240221-en
General
-
Target
2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe
-
Size
4.1MB
-
MD5
de6832dddc25cdfad6f3db172c331972
-
SHA1
65b58a63d23cac4854dc1e4c767087531043a03a
-
SHA256
7a8db5d75ca30164236d2474a4719046a7814a4411cf703ffb702bf6319939d7
-
SHA512
f226fae894afe6b75570ce48a29fadf89ecc63409a934fd37a8c7554dd572f87aa0a095cfbb38f5307d2f6135e64fcbb20f5f179ee7fa0eafbfacff4e4d46e59
-
SSDEEP
49152:8Ih624a56H0Z0NyVJobHL3LwabKreD5lyTniPtIoHYWF4vCvPJywnHXZRo0i1co3:m8eLCreTyT2Io4WOWnH29
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
resource yara_rule behavioral2/memory/2196-15-0x0000000000790000-0x0000000000812000-memory.dmp family_lumma_v4 -
Deletes itself 1 IoCs
pid Process 1180 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 880 set thread context of 1180 880 2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe 88 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 880 2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe 880 2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe 1180 cmd.exe 1180 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 880 2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe 1180 cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 880 wrote to memory of 1180 880 2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe 88 PID 880 wrote to memory of 1180 880 2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe 88 PID 880 wrote to memory of 1180 880 2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe 88 PID 880 wrote to memory of 1180 880 2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe 88 PID 1180 wrote to memory of 2196 1180 cmd.exe 94 PID 1180 wrote to memory of 2196 1180 cmd.exe 94 PID 1180 wrote to memory of 2196 1180 cmd.exe 94 PID 1180 wrote to memory of 2196 1180 cmd.exe 94 PID 1180 wrote to memory of 2196 1180 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-03_de6832dddc25cdfad6f3db172c331972_ryuk.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:2196
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50ebe2213c8fd94f1a03be9489c29f865
SHA184e19f4bf219ff83578ac80e343c0322041c1164
SHA2568bfed0df98afa915ecd36c437c16f5b194c7271b57e04addad9d58222ee9785c
SHA51278381f83f3f75a5586df70b43a613dda1d767b9134d334ffcfb68719cf2d2bd718f72e95dc422e9da4a7cd7930c294f5f3e658833ff77858d44f00a776e65815