Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 11:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http:///home/petik/shadowserver/malware/2024-05-31_71f169e443476233d4b5c799297c4460_ryuk
Resource
win10v2004-20240426-en
General
-
Target
http:///home/petik/shadowserver/malware/2024-05-31_71f169e443476233d4b5c799297c4460_ryuk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3360 msedge.exe 3360 msedge.exe 3668 msedge.exe 3668 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4604 3668 msedge.exe 82 PID 3668 wrote to memory of 4604 3668 msedge.exe 82 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3412 3668 msedge.exe 83 PID 3668 wrote to memory of 3360 3668 msedge.exe 84 PID 3668 wrote to memory of 3360 3668 msedge.exe 84 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85 PID 3668 wrote to memory of 4676 3668 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http:///home/petik/shadowserver/malware/2024-05-31_71f169e443476233d4b5c799297c4460_ryuk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2576 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1980 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9994969453068054337,12262191217372497514,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD5b92c011504fba22d5e47365fcd116f73
SHA1305ff3e27c1e3af9896728734f7fbaf85b67ead6
SHA256a1f424a9863bed9848e51d58fc769cb4df6819b66f1f21fcd26c6d1c12995d18
SHA51250dd63a37d9f34ba74f800e997abd42bb90e4fca2ffd8c8d27841a2959483b4059ee2d24f32ed854cce7b3e665ee853d51087aa97baaba9af491feb1a2aa72f6
-
Filesize
5KB
MD5aa12f84d75e709c24954e5a47bac2eda
SHA1fb4bb28643fb04a22c77d318757dc38de7d7a7b0
SHA256380495acb7d4b2804a0c4221e11970d98472dfec2873ae53b97a8d39726f556c
SHA512b0ce110a0fbe925e90f7bcd63cc6e6ff8188061f9213152d80b9e65827e0c6f4762c987edb257efced51fb2bf9ff3df8642a9962f5811c3f703b749e87379051
-
Filesize
6KB
MD5a1c4b84eb4ff3829d867898baa54dcf1
SHA1a3c3f57f882c68b8ffcd10518573f62e71849a5c
SHA256a5a95222cddf3fdc1487b15c30bfd6cb078b4ee66c93997bd7407444f64795bf
SHA5129bf1f492cb0cab85f4cfa082bbb9731d33d0a60a00fe5505b4ed9a0d5394c2a4989e84ade8f05c7058f50db75d6f62ede30c07d57e6c1f4617b1d668bf350e7b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b51d7b2a0e8e2798c2fdaaa71fba88a7
SHA107d0c3818ba356f6200b256994c05c7189aad335
SHA256019204ac35c33d408b923fba66d0d0624fbd1027eb0e79fcf585ce84c31b59a7
SHA512a6b9eb02800951fe8c5986eea0fc4ec9c3c9eda58a6407ba5ff849466db8018664044e93cdb460b18a1afd08a51f0586cebc0927167a9410e96040238f75cfdb