Analysis Overview
SHA256
d9cfd351fbc9d993ef075986312088c16b8bdfd980993bf27b9851dca25e820b
Threat Level: Shows suspicious behavior
The file 2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk was found to be: Shows suspicious behavior.
Malicious Activity Summary
Adds Run key to start application
Enumerates connected drives
Unsigned PE
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-11 14:56
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-11 14:56
Reported
2024-06-11 14:58
Platform
win7-20240508-en
Max time kernel
121s
Max time network
122s
Command Line
Signatures
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk.exe | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\A: | C:\Users\Admin\AppData\Local\Temp\2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk.exe | N/A |
| File opened (read-only) | \??\B: | C:\Users\Admin\AppData\Local\Temp\2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk.exe | N/A |
| File opened (read-only) | \??\E: | C:\Users\Admin\AppData\Local\Temp\2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk.exe"
Network
Files
memory/2060-0-0x0000000000110000-0x0000000000114000-memory.dmp
memory/2060-5-0x000000013F860000-0x000000013F8A1000-memory.dmp
memory/2060-10-0x0000000000100000-0x0000000000105000-memory.dmp
memory/2060-8-0x0000000000100000-0x0000000000105000-memory.dmp
memory/2060-4-0x0000000000110000-0x0000000000114000-memory.dmp
memory/2060-3-0x0000000000100000-0x0000000000105000-memory.dmp
memory/2060-2-0x00000000000E0000-0x00000000000E7000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-11 14:56
Reported
2024-06-11 14:58
Platform
win10v2004-20240508-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-11_62b9a1caf8fa6eba964f177d49578409_cobalt-strike_ryuk.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/2944-0-0x000001BD21D20000-0x000001BD21D24000-memory.dmp
memory/2944-3-0x000001BD21D10000-0x000001BD21D15000-memory.dmp
memory/2944-2-0x00007FF76B890000-0x00007FF76B8D1000-memory.dmp
memory/2944-6-0x000001BD21D10000-0x000001BD21D15000-memory.dmp
memory/2944-5-0x000001BD21D20000-0x000001BD21D24000-memory.dmp
memory/2944-7-0x000001BD21CE0000-0x000001BD21CE7000-memory.dmp