Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 23:21
Behavioral task
behavioral1
Sample
2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe
Resource
win7-20231129-en
General
-
Target
2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe
-
Size
2.9MB
-
MD5
0f199baaa2378448502c71cc553f0c45
-
SHA1
58cae81efd680ab12624e4afdd36c996ec7ebdf8
-
SHA256
06eeea67da42a6fc54b4f0dc845dba6e86dbc967491741d559506871cb06086b
-
SHA512
5cdfff0aa550d1d0f8713ab444b1337b1025dfaa3d33beea29a996c27fe7ce1ac3ae694e5bca024f77277612b14c874229086681d94fbeb480c6d4f236ea2394
-
SSDEEP
49152:/xziQCveAr+JfGTr25Ohf2s8n/QDHT4TgjIgrajGlkI08:liPveO+QTrp2sLjT49grvOI0
Malware Config
Extracted
stealc
http://89.105.201.132
-
url_path
/c44a765f550f6a2f.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exedescription pid process target process PID 948 set thread context of 2536 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.execmd.exepid process 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe 2536 cmd.exe 2536 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.execmd.exepid process 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe 2536 cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.execmd.exedescription pid process target process PID 948 wrote to memory of 2536 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe cmd.exe PID 948 wrote to memory of 2536 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe cmd.exe PID 948 wrote to memory of 2536 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe cmd.exe PID 948 wrote to memory of 2536 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe cmd.exe PID 948 wrote to memory of 2536 948 2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe cmd.exe PID 2536 wrote to memory of 2256 2536 cmd.exe explorer.exe PID 2536 wrote to memory of 2256 2536 cmd.exe explorer.exe PID 2536 wrote to memory of 2256 2536 cmd.exe explorer.exe PID 2536 wrote to memory of 2256 2536 cmd.exe explorer.exe PID 2536 wrote to memory of 2256 2536 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_0f199baaa2378448502c71cc553f0c45_ryuk.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:2256
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD50194b1947fa04252465c87512d0a50c6
SHA1619db8871f675a345fc9c1b4f1f01147a4685b51
SHA25676f113b658afc74684ff08c1fef66d23b383dcda565bc0f99ff6cbc5776d3a7a
SHA512fe8bc5c73841f5dd79a022a3147578f0aa8ea8665c0aedef0e3706431a87522c8d057eda334fe74fa12469564382c334242dfb7c70f28cc39e31294c5efe27c6