Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe
-
Size
362KB
-
MD5
e1f41ec421163416e4a4b8d51b2b304e
-
SHA1
7b352f0cda2fb678cf651ec38abc44406d26c394
-
SHA256
115b4221641e6b55100b17e0e1f335852017203abc2da4081b967c37b9d5f32a
-
SHA512
46bf1edb0576573a43ef0b51e462e1e54424f96c59b0bfcdef64fe5256561c6f6cd1156b3cc00c29e12ee941898b5b986e3f34bfef4a3bd8b7e5ae021ea5b3d8
-
SSDEEP
6144:phptWYnICsVgswYdkihd23gIcVNETvFY/yMviOBBSr+Bd9Wyda7sHW31cSqoI:jDnICsVgswYdkagg7ETv2ViOmwWyg7B6
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.execmd.exedescription pid process target process PID 4036 wrote to memory of 2256 4036 2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe cmd.exe PID 4036 wrote to memory of 2256 4036 2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe cmd.exe PID 2256 wrote to memory of 1128 2256 cmd.exe PING.EXE PID 2256 wrote to memory of 1128 2256 cmd.exe PING.EXE PID 2256 wrote to memory of 364 2256 cmd.exe PING.EXE PID 2256 wrote to memory of 364 2256 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\2024-05-22_e1f41ec421163416e4a4b8d51b2b304e_ryuk.exe" & ping 127.0.0.1 -n 2 & del /q "C:\ProgramData\Microsoft Setup"2⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:1128 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:364