Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 02:43

General

  • Target

    2024-05-26_c6ef9010fce52cdcc2b8e65a1b498122_ryuk.exe

  • Size

    1.6MB

  • MD5

    c6ef9010fce52cdcc2b8e65a1b498122

  • SHA1

    0f744f88858555bda3e1aa3008b21d3508225892

  • SHA256

    6ff42a04c9ddf97abfbf9889eb45143b5631fcd3ae3bd4a560b45b9363a611f8

  • SHA512

    497f652f1fff94fa964b41a974b9a1d944eb4e8b2f757c89797b4eb0ecc1d65535f7c6aa082151505b3f9acd141684f0bea3916f56ee1f08900c5c3e3e6f81cb

  • SSDEEP

    24576:ZTfnpwJ+R5SRQ5UOOU62FBnO+E222YJbNEUQKGOb9:VfdT5UbU62FAQ228QKl9

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-26_c6ef9010fce52cdcc2b8e65a1b498122_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c6ef9010fce52cdcc2b8e65a1b498122_ryuk.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2032-0-0x0000000002310000-0x0000000002370000-memory.dmp

    Filesize

    384KB

  • memory/2032-8-0x0000000002310000-0x0000000002370000-memory.dmp

    Filesize

    384KB

  • memory/2032-7-0x0000000002310000-0x0000000002370000-memory.dmp

    Filesize

    384KB

  • memory/2032-6-0x0000000140000000-0x0000000140197000-memory.dmp

    Filesize

    1.6MB

  • memory/2032-13-0x0000000140000000-0x0000000140197000-memory.dmp

    Filesize

    1.6MB

  • memory/2032-12-0x0000000002310000-0x0000000002370000-memory.dmp

    Filesize

    384KB