Analysis

  • max time kernel
    93s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2024, 18:12

General

  • Target

    2024-04-08_e8d8d3b6e50395a1cf318d98230147da_ryuk.exe

  • Size

    2.1MB

  • MD5

    e8d8d3b6e50395a1cf318d98230147da

  • SHA1

    f89db5889f20bfefca3a01a74e4194c27b80ff27

  • SHA256

    2ab317783e06af7aeca440b6246765622907cc626645100f128518257405a25b

  • SHA512

    b0877c033bd665e01ecf6407d0c3c44258d8cc5b54026299c801057191c1c968b34c22a2feb255ad4dbca2bfeca08419db1145711f46f62f34bc18736029807a

  • SSDEEP

    49152:nsOwbb13nyb+g2nxDv1PZ1LTb8Dmg27RnWGj:nI13yb+Z3YD527BWG

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_e8d8d3b6e50395a1cf318d98230147da_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_e8d8d3b6e50395a1cf318d98230147da_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4556-0-0x00000000008D0000-0x0000000000930000-memory.dmp

    Filesize

    384KB

  • memory/4556-1-0x0000000140000000-0x0000000140235000-memory.dmp

    Filesize

    2.2MB

  • memory/4556-8-0x00000000008D0000-0x0000000000930000-memory.dmp

    Filesize

    384KB

  • memory/4556-11-0x00000000008D0000-0x0000000000930000-memory.dmp

    Filesize

    384KB

  • memory/4556-13-0x0000000140000000-0x0000000140235000-memory.dmp

    Filesize

    2.2MB