Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 13:49

General

  • Target

    2024-06-02_12a1425b24e8e5ed889bc2211831e18a_ryuk.exe

  • Size

    1.6MB

  • MD5

    12a1425b24e8e5ed889bc2211831e18a

  • SHA1

    16e99ae3a8afcfcfe14a0865b0bc4fb8e6d836ac

  • SHA256

    b2a2ecc0612a6a0fa51cbaf4bff6efe75b4340a81a5d00a5b919a5a7c3f72b0b

  • SHA512

    568497a1d412cd962fa90863dfc55e3d2616616dcab1c6e2b1fccd7bc6aead875accb93b37c9f7b51af6975af20467c036b3b4d43d65a5de12698b743bd0641b

  • SSDEEP

    24576:46V6dC/AyqGizWCaFbyMDVv7DxAZquHPH9k:46cTGizWCaFbbzDOQ0K

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-02_12a1425b24e8e5ed889bc2211831e18a_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-02_12a1425b24e8e5ed889bc2211831e18a_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4628-0-0x0000000140000000-0x0000000140199000-memory.dmp

    Filesize

    1.6MB

  • memory/4628-7-0x0000000000840000-0x00000000008A0000-memory.dmp

    Filesize

    384KB

  • memory/4628-1-0x0000000000840000-0x00000000008A0000-memory.dmp

    Filesize

    384KB

  • memory/4628-13-0x0000000000840000-0x00000000008A0000-memory.dmp

    Filesize

    384KB

  • memory/4628-12-0x0000000140000000-0x0000000140199000-memory.dmp

    Filesize

    1.6MB