Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 04:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-30_409ff90fb4f423f5a3a4bc2a6fd2a5ec_ryuk.exe
Resource
win7-20240419-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-30_409ff90fb4f423f5a3a4bc2a6fd2a5ec_ryuk.exe
Resource
win10v2004-20240426-en
0 signatures
150 seconds
General
-
Target
2024-04-30_409ff90fb4f423f5a3a4bc2a6fd2a5ec_ryuk.exe
-
Size
2.1MB
-
MD5
409ff90fb4f423f5a3a4bc2a6fd2a5ec
-
SHA1
e12d49097318673e093c87f73ec1b72254bdc1df
-
SHA256
fe6cc6f7087dcab6a51919b8e1d1fff74962e1ec3a724e09988cd4d52c1a4b32
-
SHA512
e0633fc1c4db654dea825c41f322007363ac460b1d44f804238dd8f69bc4f194153cb2dd63f72cdf89ffa159ce3313f7a4622b34ac01572936628a5405767e2a
-
SSDEEP
49152:Ea/3xXBSZ4K5MJ1LvTMxbfsYBYSgxu9+fw4TWgDUYmvFur31yAipQCtXxc0H:mZ4K5MJabfsYNkU7dG1yfpVBlH
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-04-30_409ff90fb4f423f5a3a4bc2a6fd2a5ec_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3000 2024-04-30_409ff90fb4f423f5a3a4bc2a6fd2a5ec_ryuk.exe