Analysis

  • max time kernel
    132s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 09:37

General

  • Target

    2024-05-26_7fd2ddf62c95b8cabf7ec8e6a2a50e19_cobalt-strike_ryuk.exe

  • Size

    946KB

  • MD5

    7fd2ddf62c95b8cabf7ec8e6a2a50e19

  • SHA1

    207e11a2b5ab11b9c8e93efb8b9d2a81687780ad

  • SHA256

    96afa8c7ff4a911443c5f13075214c779889363340d63650bd6d12c37494e0b1

  • SHA512

    d09a708f5250d94ecb7d01724e92444b405a8d8ff9f35804084920474481c83495043b05713136d79bda0d815e2db4bf1d3449737928fa6a3c074b06f8e6aeb1

  • SSDEEP

    24576:dTgnpwJ+RtVqIi2lObXobHAEW9INFJY0au:Z0dtw7x03jY0a

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-26_7fd2ddf62c95b8cabf7ec8e6a2a50e19_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-26_7fd2ddf62c95b8cabf7ec8e6a2a50e19_cobalt-strike_ryuk.exe"
    1⤵
      PID:2012

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2012-0-0x00000000035B0000-0x0000000003610000-memory.dmp

      Filesize

      384KB

    • memory/2012-10-0x0000000140000000-0x00000001400F6000-memory.dmp

      Filesize

      984KB

    • memory/2012-11-0x00000000035B0000-0x0000000003610000-memory.dmp

      Filesize

      384KB

    • memory/2012-6-0x00000000035B0000-0x0000000003610000-memory.dmp

      Filesize

      384KB