Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2024 09:29

General

  • Target

    2024-03-14_702ba6085641e8f88e68e75b9356368e_ryuk.exe

  • Size

    1.1MB

  • MD5

    702ba6085641e8f88e68e75b9356368e

  • SHA1

    db04a9a7839a7ae2aa0d10c0688c566b067a7552

  • SHA256

    f1b9e064889aa3096a12e17df1c6c0fc2ca669cfb027db55635fc44b7b70fce1

  • SHA512

    7cd6dcb96ec8c69d3dbc8121b35d98d98ab85d12a02aa25ed7c7e28136404943a6e388b859ea51f44c1565663f7c910820daa17d67314599145cf5ff75b660bf

  • SSDEEP

    24576:jGBLWnsLA675EcvOWVacjEexQVnogfdqHByH1gu5sdLvK9OV+umJXeetXY:qFusnOWVacjxxQVnddqJBZK9G+umJXD9

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_702ba6085641e8f88e68e75b9356368e_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_702ba6085641e8f88e68e75b9356368e_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3048-0-0x0000000140000000-0x0000000140146000-memory.dmp

    Filesize

    1.3MB

  • memory/3048-1-0x0000000000310000-0x0000000000370000-memory.dmp

    Filesize

    384KB

  • memory/3048-7-0x0000000000310000-0x0000000000370000-memory.dmp

    Filesize

    384KB

  • memory/3048-8-0x0000000000310000-0x0000000000370000-memory.dmp

    Filesize

    384KB

  • memory/3048-12-0x0000000000310000-0x0000000000370000-memory.dmp

    Filesize

    384KB

  • memory/3048-14-0x0000000140000000-0x0000000140146000-memory.dmp

    Filesize

    1.3MB