Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 10:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-17_aea6984ad954081d1b0bc12e542a1a7b_ryuk.exe
Resource
win7-20240319-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-17_aea6984ad954081d1b0bc12e542a1a7b_ryuk.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-04-17_aea6984ad954081d1b0bc12e542a1a7b_ryuk.exe
-
Size
2.2MB
-
MD5
aea6984ad954081d1b0bc12e542a1a7b
-
SHA1
2761f5cdc58c7d503a296d8660e5761f21eb190a
-
SHA256
9fa7521c9fb6a089fd2aaae7e042abdf3c436b0233c1724f753426d6c93c09ca
-
SHA512
af5547d57a21c46f91fd25cc6cd4d38bebf8931047c9d71f64e6fc6ec43bbd4c6338c331b58eb9e687c6710625feb135257c9d3c49c64f1d2fe47e56bc2d0265
-
SSDEEP
49152:PNl7soq7sQCc1kyG2xHywRfHIO2Ts4bvDC/ouy8grLLesK:vD2311kaxp9qZ1Ms
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-04-17_aea6984ad954081d1b0bc12e542a1a7b_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1768 2024-04-17_aea6984ad954081d1b0bc12e542a1a7b_ryuk.exe