Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe
-
Size
362KB
-
MD5
e1f41ec421163416e4a4b8d51b2b304e
-
SHA1
7b352f0cda2fb678cf651ec38abc44406d26c394
-
SHA256
115b4221641e6b55100b17e0e1f335852017203abc2da4081b967c37b9d5f32a
-
SHA512
46bf1edb0576573a43ef0b51e462e1e54424f96c59b0bfcdef64fe5256561c6f6cd1156b3cc00c29e12ee941898b5b986e3f34bfef4a3bd8b7e5ae021ea5b3d8
-
SSDEEP
6144:phptWYnICsVgswYdkihd23gIcVNETvFY/yMviOBBSr+Bd9Wyda7sHW31cSqoI:jDnICsVgswYdkagg7ETv2ViOmwWyg7B6
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 572 cmd.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.execmd.exedescription pid process target process PID 2436 wrote to memory of 572 2436 2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe cmd.exe PID 2436 wrote to memory of 572 2436 2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe cmd.exe PID 2436 wrote to memory of 572 2436 2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe cmd.exe PID 572 wrote to memory of 2144 572 cmd.exe PING.EXE PID 572 wrote to memory of 2144 572 cmd.exe PING.EXE PID 572 wrote to memory of 2144 572 cmd.exe PING.EXE PID 572 wrote to memory of 2356 572 cmd.exe PING.EXE PID 572 wrote to memory of 2356 572 cmd.exe PING.EXE PID 572 wrote to memory of 2356 572 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe" & ping 127.0.0.1 -n 2 & del /q "C:\ProgramData\Microsoft Setup"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:2144 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:2356