Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_e9aa923fd8d58ea0ac43242104c3710e_cobalt-strike_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_e9aa923fd8d58ea0ac43242104c3710e_cobalt-strike_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-29_e9aa923fd8d58ea0ac43242104c3710e_cobalt-strike_ryuk.exe
-
Size
796KB
-
MD5
e9aa923fd8d58ea0ac43242104c3710e
-
SHA1
dc93a94968e246a4fdedf34d9ae2b65a7f112993
-
SHA256
400d262ffb593695699d4dddf62670d4915c5c913f08d44b3ef5318dc10d0dda
-
SHA512
611894579ac09056e5e68db475ffbb91723dc0de48bc10f9e4406df71a84529852be16a6c2e0a9892b4e7e0ccb920d3a8b184e472012317267001f9c970e0230
-
SSDEEP
12288:GXDCAZzP/w24lh23Dbif4YAJ93y1NrLiLtJ8nBxu7DCOzRq8DvQgqAbhI:RANw2432Hofe3y1sInB2COzRq8DvFqt
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-03-29_e9aa923fd8d58ea0ac43242104c3710e_cobalt-strike_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2084 2024-03-29_e9aa923fd8d58ea0ac43242104c3710e_cobalt-strike_ryuk.exe