Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 20:12

General

  • Target

    2024-06-01_933964a2ad5d53dc5c0059e1723d4daf_cobalt-strike_ryuk.exe

  • Size

    796KB

  • MD5

    933964a2ad5d53dc5c0059e1723d4daf

  • SHA1

    d5a1ecde55813a4946d0d5198674ca076bc227d7

  • SHA256

    611592169b2b74321ce3cea8d73d3d9430a49750b38a751d597e2761d685f742

  • SHA512

    9342e6961264008422918e003621942568bbe9908d9835286ff25d0e0639783cd139563ebadc2a30a02e3c20d0bf1c23dc075a4c815a0b12cf8c0c69a9f5eec2

  • SSDEEP

    12288:LXDCAZzP/w24lhOMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:6ANw243rSkQ/7Gb8NLEbeZ

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-01_933964a2ad5d53dc5c0059e1723d4daf_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-01_933964a2ad5d53dc5c0059e1723d4daf_cobalt-strike_ryuk.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1636

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1636-0-0x00000000008F0000-0x0000000000950000-memory.dmp

          Filesize

          384KB

        • memory/1636-7-0x00000000008F0000-0x0000000000950000-memory.dmp

          Filesize

          384KB

        • memory/1636-6-0x0000000140000000-0x00000001400CF000-memory.dmp

          Filesize

          828KB

        • memory/1636-8-0x00000000008F0000-0x0000000000950000-memory.dmp

          Filesize

          384KB

        • memory/1636-13-0x0000000140000000-0x00000001400CF000-memory.dmp

          Filesize

          828KB

        • memory/1636-12-0x00000000008F0000-0x0000000000950000-memory.dmp

          Filesize

          384KB