Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_20d15a04c1daa887b4522ad1a29702ab_ryuk.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-10_20d15a04c1daa887b4522ad1a29702ab_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_20d15a04c1daa887b4522ad1a29702ab_ryuk.exe
-
Size
1.8MB
-
MD5
20d15a04c1daa887b4522ad1a29702ab
-
SHA1
dea0bc41b6698ce53395505d3819ad47313315a2
-
SHA256
fc30b3ac95df9e3c57e3099bb6d576231bc66cee27a815a86424416fd068704e
-
SHA512
62e9620ae75c11e6723942fc19d0a589a68d296e810dd468479b36a7c476ec265ecafb3f6d3de0031dabc75f6b3324c701072a2c9043fcfe2e6ad56388e1c519
-
SSDEEP
49152:EKX0DzOswXefymHQlIuQaxxH5wNaTT7VT:mXNOefjqImXH6kP7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3272 alg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-04-10_20d15a04c1daa887b4522ad1a29702ab_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2364 2024-04-10_20d15a04c1daa887b4522ad1a29702ab_ryuk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_20d15a04c1daa887b4522ad1a29702ab_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_20d15a04c1daa887b4522ad1a29702ab_ryuk.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:3272
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD5263aa1a2408a24bc6be19455097eb4a2
SHA1c31408276a17b96a6cf5d39d4c09a2e264f8b51e
SHA25603e9fe262879fb3eebfae445534a128c07181d3dea0846c9634ff32d3d853183
SHA5127447357cd41d828b5b2746b5b54b993b781973ff4711a9de7d9205944fcbeb011a25919b69f8f4411b6467cf4f4e9ed4277a0cb407d7716083ba5e5b7dfb0cdc