Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 06:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-28_a9d735bd554b557b0cbd3fac8e406341_ryuk.exe
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
General
-
Target
2024-04-28_a9d735bd554b557b0cbd3fac8e406341_ryuk.exe
-
Size
2.3MB
-
MD5
a9d735bd554b557b0cbd3fac8e406341
-
SHA1
6ea876fa955de07814ea66979bf330c710afce18
-
SHA256
83f073c408792d7c7b9e92faa1ccd55da0adf3e43798ba451c839ada64a928b2
-
SHA512
08ab553eac63f5c9b321202ae48cf1f57b1a482edc39d4bedca13cbb1cec8c231ce792980215b74b2ced1b7ca9536672ab8b0583fa4977bdbf7e5190a51c3e7c
-
SSDEEP
49152:nosQHMmpQAaR824OnqDPqFmhlyjsrrJLp2lUEFP4+Po6kk:j4O2P5JLQlVt4ib
Malware Config
Extracted
Family
gozi
Signatures
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_a9d735bd554b557b0cbd3fac8e406341_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_a9d735bd554b557b0cbd3fac8e406341_ryuk.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵PID:1352