Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 12:54

General

  • Target

    2024-04-09_73450a74116a9bcad297943f2d69eb92_ryuk.exe

  • Size

    2.9MB

  • MD5

    73450a74116a9bcad297943f2d69eb92

  • SHA1

    d4cfef561fbbe07e2bf504119627947a735a404c

  • SHA256

    06b4d7d4c09c2d53dfde3c0a48a2285881f19c6fa7db98e670ccd225c003f2b7

  • SHA512

    9fc42855c60a9f6c62257695a81768e68a4b208a9527c78db8d4c5f2f349ce2396393961e67b8a4fa499d1f8025f1b7dc13b51f2a0c5f73e9e2c49f19f020197

  • SSDEEP

    49152:/X6HAEkDJ8+N2eixHC7Wrs3sPW1qeCKRJ9R:g+4P4CKnH

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-09_73450a74116a9bcad297943f2d69eb92_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-09_73450a74116a9bcad297943f2d69eb92_ryuk.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads