Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 11:22

General

  • Target

    2024-06-10_95948756c502c3252bfa54557895a515_cobalt-strike_ryuk.exe

  • Size

    298KB

  • MD5

    95948756c502c3252bfa54557895a515

  • SHA1

    77427418817c342455020ec2795e399d2ae02e23

  • SHA256

    46524d76d1cd5533a414460beca72b6b65e97b3daf02bfeacf935b4744910dd2

  • SHA512

    1722262f5f399551ac50b01ece0edc47c1857706e0a136c5243294035b183912350c59c216eaefe0c8535b24067cff611c16e48396d3c8747d2ff8c0b7051c71

  • SSDEEP

    6144:oz28bs9bZhZM3OD5jYn+9VeoJ7olgtlhn1nVTqbfp8an4v:i28bs9bLKetm824lhntVTqF0

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-10_95948756c502c3252bfa54557895a515_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-10_95948756c502c3252bfa54557895a515_cobalt-strike_ryuk.exe"
    1⤵
      PID:4804

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4804-2-0x00007FF6B33A0000-0x00007FF6B33E1000-memory.dmp

            Filesize

            260KB

          • memory/4804-5-0x00000224A3740000-0x00000224A3745000-memory.dmp

            Filesize

            20KB

          • memory/4804-3-0x00000224A3740000-0x00000224A3745000-memory.dmp

            Filesize

            20KB

          • memory/4804-0-0x00000224A3750000-0x00000224A3754000-memory.dmp

            Filesize

            16KB

          • memory/4804-6-0x00000224A1E80000-0x00000224A1E87000-memory.dmp

            Filesize

            28KB