Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 12:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-06-01_fe554513777c439b24b93a94532db73f_ryuk.exe
Resource
win10v2004-20240426-en
2 signatures
150 seconds
General
-
Target
2024-06-01_fe554513777c439b24b93a94532db73f_ryuk.exe
-
Size
2.1MB
-
MD5
fe554513777c439b24b93a94532db73f
-
SHA1
37b446a4f0480661db7721c4108e08c23d4a0424
-
SHA256
c52d0d86deb302e8d78d7fcd2236bb6f884609344aa9e683624c06e847d50e42
-
SHA512
a63b15b0a52812021855aab4c1d583fa0af4d2ed668af66cdb31256ac7e31e2928015e1dabd8f371e12b619240054e7091ccbaa6e6941178428b476f2ce9184a
-
SSDEEP
49152:NikKqNuKuNgEBV/wtjUNqE76CHHwbSFP4suIRbDv:NiekgEBVnfbFPHn3
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-06-01_fe554513777c439b24b93a94532db73f_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4044 2024-06-01_fe554513777c439b24b93a94532db73f_ryuk.exe