Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 16:57

General

  • Target

    2024-04-08_47d85051c287ac02f62451214dec3695_ryuk.exe

  • Size

    1.7MB

  • MD5

    47d85051c287ac02f62451214dec3695

  • SHA1

    841c903a61ed04393270dd84fffc7a9511007719

  • SHA256

    0d0ca3f990e70beecb20a0d35818bd730b5bcf2b395697357189ca2ab9be5e13

  • SHA512

    fea984826f670c8901d9636a95593d479f7f7bd33e097870a249ed91d4eb55dcb5a97fe7e99f7c539b37d5cedc223ff41b2d0f892e481920e3eeec63025bcd19

  • SSDEEP

    49152:5gtHUujpj7AewZMZhRdhEPDmg27RnWGj:6FhZZhGD527BWG

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_47d85051c287ac02f62451214dec3695_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_47d85051c287ac02f62451214dec3695_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2400-1-0x0000000140000000-0x00000001401B9000-memory.dmp

    Filesize

    1.7MB

  • memory/2400-0-0x00000000020D0000-0x0000000002130000-memory.dmp

    Filesize

    384KB

  • memory/2400-8-0x00000000020D0000-0x0000000002130000-memory.dmp

    Filesize

    384KB

  • memory/2400-11-0x00000000020D0000-0x0000000002130000-memory.dmp

    Filesize

    384KB

  • memory/2400-13-0x0000000140000000-0x00000001401B9000-memory.dmp

    Filesize

    1.7MB