Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 12:32

General

  • Target

    2024-04-24_a48d1c1634217889597291c07afe3fc7_ryuk.exe

  • Size

    2.6MB

  • MD5

    a48d1c1634217889597291c07afe3fc7

  • SHA1

    04c925000ee18edf712cd4597e61098e18f39c31

  • SHA256

    f7bc2a68dc6c3ed770a943e4b0be12fae96ad58bee68ef9d4974831608fa2791

  • SHA512

    8864a9ba94ef43898851590e9362a4e2b258b01e26be974dcaa1d0ee4df40a65713156768cb503082ba4e6c955341462ef734dd1157805430afd5866a29d9cea

  • SSDEEP

    24576:FW4PxFpIhD1NIPitXD4nHoKzCVqYa8sqfqwJAW1kFGj:BPrpIVIPitqHoKp8snTM

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-24_a48d1c1634217889597291c07afe3fc7_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-24_a48d1c1634217889597291c07afe3fc7_ryuk.exe"
    1⤵
      PID:3020

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3020-0-0x00007FF6CFBE0000-0x00007FF6CFF5D000-memory.dmp

      Filesize

      3.5MB