Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2024 11:43

General

  • Target

    2024-06-10_2d8ab675fef0cc8be67791756a1e9585_cobalt-strike_ryuk.exe

  • Size

    298KB

  • MD5

    2d8ab675fef0cc8be67791756a1e9585

  • SHA1

    ee898cc2396d2036ff2070476861734e1105bbff

  • SHA256

    7ec09a0caa48381c3ff4655364782d926bd0663da9e303043d189aa08c819ebe

  • SHA512

    e5740ee68a26ccbfc54f3bedac5cb314f48798b2ff7d727769981dee60b7d657dbb248b6a4f7867614348466fd9aa4c912de6abfb91b4f565e4ede735a30ff08

  • SSDEEP

    6144:yO3uwis9fqGKMxY+DjH9QsOgcVJ7olgtlhn659Ao3W:5+wis9fXfG+3Sj24lhn6Hm

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-10_2d8ab675fef0cc8be67791756a1e9585_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-10_2d8ab675fef0cc8be67791756a1e9585_cobalt-strike_ryuk.exe"
    1⤵
      PID:1636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1636-5-0x000001C83E7D0000-0x000001C83E7D5000-memory.dmp

      Filesize

      20KB

    • memory/1636-4-0x00007FF7E98C0000-0x00007FF7E9901000-memory.dmp

      Filesize

      260KB

    • memory/1636-8-0x000001C83E7D0000-0x000001C83E7D5000-memory.dmp

      Filesize

      20KB

    • memory/1636-2-0x000001C83E7E0000-0x000001C83E7E4000-memory.dmp

      Filesize

      16KB

    • memory/1636-1-0x000001C83E7D0000-0x000001C83E7D5000-memory.dmp

      Filesize

      20KB

    • memory/1636-0-0x000001C83E7B0000-0x000001C83E7B7000-memory.dmp

      Filesize

      28KB