Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 23:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-25_c4c7f75dedebb3cc6cc435c048539802_ryuk.exe
Resource
win7-20240220-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-25_c4c7f75dedebb3cc6cc435c048539802_ryuk.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-05-25_c4c7f75dedebb3cc6cc435c048539802_ryuk.exe
-
Size
2.2MB
-
MD5
c4c7f75dedebb3cc6cc435c048539802
-
SHA1
8c50725b79fd2b0394d6f5ae06684d228e2847a9
-
SHA256
56a4db8c134a82eb791661f6fec370d4af66532d5c44facf673d3eab9b99cd9c
-
SHA512
92574d4465900abd9e945f15776992c9bf40b31f29b8a3e8ccf116565fe6636a92b1a1b7c2f9ed74655292e8f5de4248db665f5970613972aad3d9ef7754ae95
-
SSDEEP
49152:3Nl7soq7sQCc1kyG2xHywRfHIO2Ts4bvD8isGcnlQHPxi:3D2311kaxp9qQnlS
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-05-25_c4c7f75dedebb3cc6cc435c048539802_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4740 2024-05-25_c4c7f75dedebb3cc6cc435c048539802_ryuk.exe