Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 03:45

General

  • Target

    2024-04-22_ffcaa19f6d73ea2a51a0cfed409af3a2_ryuk.exe

  • Size

    1.8MB

  • MD5

    ffcaa19f6d73ea2a51a0cfed409af3a2

  • SHA1

    be50de77358dc7f06f1c9eff78f015e611164bad

  • SHA256

    1af3ab1429a898909d706827e6755e2228c97b01dd1b1d2e2a3e33d953024126

  • SHA512

    8dac00a12c6ddb024944e1a40c71abb579d331d85c0542e29550af152f3e29cdc93da688b6db25f2fc0d3da0b27792ce6a0b4548a5a1acaaf8b2872700b74abc

  • SSDEEP

    24576:UwgPtfuoSpbk8K8zuRou4XVa+LWGZYacBemN6fIHq47hXgTmIo/phP3+7f:Uwg1XSpQ8LVu4sOtmNeeZlXXdphPu7

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_ffcaa19f6d73ea2a51a0cfed409af3a2_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_ffcaa19f6d73ea2a51a0cfed409af3a2_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2412-0-0x0000000000440000-0x00000000004A0000-memory.dmp

    Filesize

    384KB

  • memory/2412-1-0x0000000140000000-0x00000001401DC000-memory.dmp

    Filesize

    1.9MB

  • memory/2412-8-0x0000000000440000-0x00000000004A0000-memory.dmp

    Filesize

    384KB

  • memory/2412-10-0x0000000000440000-0x00000000004A0000-memory.dmp

    Filesize

    384KB

  • memory/2412-12-0x0000000140000000-0x00000001401DC000-memory.dmp

    Filesize

    1.9MB