Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 08:31

General

  • Target

    2024-06-14_7b41d129acf5f22a5439a22651005b72_cobalt-strike_ryuk.exe

  • Size

    298KB

  • MD5

    7b41d129acf5f22a5439a22651005b72

  • SHA1

    7f53c80f54e9a674e62b88575e84dcc6aeaa8dd7

  • SHA256

    6e1d60bb4ae78adb26f2518ac80685c4fe349ca457dbbfe921e50083d543d5f2

  • SHA512

    d78b39b8cf91609add3575f08d6c6adae9f757021bbf1014dab578709dd37a1353f0cc853afd0af278046431e179a23c7e345ad7c879c4776ea9582d8b13f028

  • SSDEEP

    6144:UEVA8Us9v9RJrM+GDbXXOq5aDjJ7olgtlhn71lL8xDDd4Vzeu:FVA8Us9v1wHnuR24lhn7L8x94Zeu

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-14_7b41d129acf5f22a5439a22651005b72_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-14_7b41d129acf5f22a5439a22651005b72_cobalt-strike_ryuk.exe"
    1⤵
      PID:840

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/840-4-0x00007FF68B000000-0x00007FF68B041000-memory.dmp

            Filesize

            260KB

          • memory/840-1-0x0000014FBE7D0000-0x0000014FBE7D7000-memory.dmp

            Filesize

            28KB

          • memory/840-0-0x0000014FBE810000-0x0000014FBE814000-memory.dmp

            Filesize

            16KB

          • memory/840-3-0x0000014FBE800000-0x0000014FBE805000-memory.dmp

            Filesize

            20KB

          • memory/840-7-0x0000014FBE800000-0x0000014FBE805000-memory.dmp

            Filesize

            20KB

          • memory/840-6-0x0000014FBE810000-0x0000014FBE814000-memory.dmp

            Filesize

            16KB