Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 01:37

General

  • Target

    2024-03-14_ef3f47471a0da0eecbb200ef340121ad_ryuk.exe

  • Size

    1.1MB

  • MD5

    ef3f47471a0da0eecbb200ef340121ad

  • SHA1

    4d4f4b7da81c90963ada636aec6ba06d8f25d91d

  • SHA256

    3e1a461aac9e4e186217f9c2e899750edad72995a01698716ba242d6fa011090

  • SHA512

    7d8add82fea7d08ca3b126b6afc6771103bac2c237cb09dbce3772d0b27432d8940fb7da756fca10234353d3bbe0dbee3ae61e05b99f5679b6114b16cdbbfabb

  • SSDEEP

    24576:rm9u7nqZR/kMByNtuhaVBxwkqd2LZjW1xqS73k1hNh:q2nqZR/3utu8Gkq+j6oi4h

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_ef3f47471a0da0eecbb200ef340121ad_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_ef3f47471a0da0eecbb200ef340121ad_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3772
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:4460

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    661KB

    MD5

    d964fbb67376ffff66910d8595079c3e

    SHA1

    c17e3b644b04f1db31228b8c33a6d9cf82386f14

    SHA256

    27e6651042d4fb8ac018fb4f5ae4dbbb66b5b4561ce7f307cb39b868577203e5

    SHA512

    36925e23f6c2acc006eb96dfa28eafa00283c2be2bf092824d8285c52c072d90bbd4b65de841bcb6af841c3147b36410e57e38d66e2ac51bc0401727bec99aa4

  • memory/3772-0-0x0000000140000000-0x0000000140115000-memory.dmp

    Filesize

    1.1MB

  • memory/3772-1-0x0000000000810000-0x0000000000870000-memory.dmp

    Filesize

    384KB

  • memory/3772-7-0x0000000000810000-0x0000000000870000-memory.dmp

    Filesize

    384KB

  • memory/3772-12-0x0000000000810000-0x0000000000870000-memory.dmp

    Filesize

    384KB

  • memory/3772-15-0x0000000140000000-0x0000000140115000-memory.dmp

    Filesize

    1.1MB

  • memory/4460-13-0x0000000140000000-0x00000001400AA000-memory.dmp

    Filesize

    680KB

  • memory/4460-16-0x0000000140000000-0x00000001400AA000-memory.dmp

    Filesize

    680KB