Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 14:02

General

  • Target

    2024-03-28_8c0e7c1346cdea5c1320b18b27c6b45f_ryuk.exe

  • Size

    24.1MB

  • MD5

    8c0e7c1346cdea5c1320b18b27c6b45f

  • SHA1

    15257d48d2181c704e705b708ea46f674aff63d1

  • SHA256

    ea5facf90f52579491c5425bccd43df0f7a1962aa73a5ab5bc6a71d3a993a2de

  • SHA512

    5ac6aad77cea0fe3a19225b0ca269bc7b8afa2f3bcbfd2a4bce4b9532a1562c187199b8109cd8fde31340fedaf61f88b25558d2ac5156f1007ee0a2cfdaa1b91

  • SSDEEP

    393216:BGsKlSb1cqhKK/ZaFO+Whpylu5xHADAMBu+xFN:DcqhKK0sJU

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_8c0e7c1346cdea5c1320b18b27c6b45f_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_8c0e7c1346cdea5c1320b18b27c6b45f_ryuk.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/412-0-0x000001604E100000-0x000001604E101000-memory.dmp

          Filesize

          4KB

        • memory/412-1-0x000001604E100000-0x000001604E101000-memory.dmp

          Filesize

          4KB

        • memory/412-2-0x000001604E100000-0x000001604E101000-memory.dmp

          Filesize

          4KB

        • memory/412-4-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-3-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-5-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-9-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-11-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-10-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-12-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-13-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-14-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-15-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-16-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-18-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-19-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-17-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-20-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-21-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-22-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-23-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-24-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB

        • memory/412-25-0x000001604EB70000-0x000001604EB72000-memory.dmp

          Filesize

          8KB