Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 00:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-05_00ff22aa1cd8e42f276b2db1a2ed8be8_ryuk.exe
Resource
win7-20240215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-05-05_00ff22aa1cd8e42f276b2db1a2ed8be8_ryuk.exe
-
Size
1.4MB
-
MD5
00ff22aa1cd8e42f276b2db1a2ed8be8
-
SHA1
97918e8479f30f764845776b840f0be3d8660578
-
SHA256
279df02e660ac75812f61c5eacf72d83166d2db6bbc5f137a4ed057593d15547
-
SHA512
b6711c1626beae2938b8f5c60a2a57512e1f85d0d9eed36fdceab346278da06434d580a0f3de558eb01ce1fc15107c72a93a6d85b47010c84df21d2a2f5feb8c
-
SSDEEP
24576:2hzbfJ004vKs0fyft6f/VbIlZxs/KNLwopf341vCMvXXKw4ny8RJba3tNkI27d:wzbB00rseyVuhLK1/fKaw61IGd
Malware Config
Extracted
Family
bumblebee
Botnet
asd1234
rc4.plain
Signatures
-
Detects executables referencing combination of virtualization drivers 3 IoCs
resource yara_rule behavioral2/memory/3892-1-0x000002C46EF00000-0x000002C46F114000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb behavioral2/memory/3892-2-0x000002C46EF00000-0x000002C46F114000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb behavioral2/memory/3892-3-0x000002C46EF00000-0x000002C46F114000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb -
Detects executables referencing virtualization MAC addresses 3 IoCs
resource yara_rule behavioral2/memory/3892-1-0x000002C46EF00000-0x000002C46F114000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb behavioral2/memory/3892-2-0x000002C46EF00000-0x000002C46F114000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb behavioral2/memory/3892-3-0x000002C46EF00000-0x000002C46F114000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_00ff22aa1cd8e42f276b2db1a2ed8be8_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-05_00ff22aa1cd8e42f276b2db1a2ed8be8_ryuk.exe"1⤵PID:3892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4244 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:4920