Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 15:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe
-
Size
12.9MB
-
MD5
350a68ff0a0b8bba7d845eb9be7b0814
-
SHA1
c9e8d94a7dbc89ac7b7beef25ef32e4bb7c618cb
-
SHA256
e525498694dc1677f2fc91ffe0b856edee852daaa7436938a62fee8a115e2ce2
-
SHA512
ce88cb7d6ff03381270b235b71f8802c2378c8b7477c1f118c384b50251baa66709472f63a43c6ddde1b864f4814c9bb72bd8e0fe8d73a68285853931ed2f842
-
SSDEEP
196608:jCNgsrBShc0uhxhGSJ47tOMS8FX91UidRk3i+RS5RqSQl0FP3oJ2o+/5Xp+/ffx+:YgssjuTp47tOC9tRMuG0J3oi5X8/k
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main 2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2136 2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe 2136 2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_350a68ff0a0b8bba7d845eb9be7b0814_ryuk.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2136