Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:49

General

  • Target

    2024-05-22_58232649e0e3bad4bf95e8d64abac4a6_ryuk.exe

  • Size

    1.7MB

  • MD5

    58232649e0e3bad4bf95e8d64abac4a6

  • SHA1

    2d1d2cc3e78d45cdf3775ee2c1db86e703ab95e9

  • SHA256

    b2bc10ca8d0e901e7ec571eee095512bfe2f9b003d605711281481fe7666d7e3

  • SHA512

    2ddb08717c88fd53b423f73995496b90f521a87ab137ef5158d6d58e52de11e679045575c9ab4a299113c2e200338a7b292af1b3c52b80c682503e57f5d85032

  • SSDEEP

    24576:iANw243R8S+LbzQkWWbCzLLB+lMP1NFzSRY:iew2s8FD5nb2LLPrFmRY

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_58232649e0e3bad4bf95e8d64abac4a6_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_58232649e0e3bad4bf95e8d64abac4a6_ryuk.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3000-0-0x00000000008E0000-0x0000000000940000-memory.dmp
    Filesize

    384KB

  • memory/3000-8-0x0000000140000000-0x00000001401AF000-memory.dmp
    Filesize

    1.7MB

  • memory/3000-9-0x00000000008E0000-0x0000000000940000-memory.dmp
    Filesize

    384KB

  • memory/3000-13-0x0000000140000000-0x00000001401AF000-memory.dmp
    Filesize

    1.7MB

  • memory/3000-12-0x00000000008E0000-0x0000000000940000-memory.dmp
    Filesize

    384KB