Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 22:41 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_04994c8ef5e395b648eb5eebd4a92eae_ryuk.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-24_04994c8ef5e395b648eb5eebd4a92eae_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-24_04994c8ef5e395b648eb5eebd4a92eae_ryuk.exe
-
Size
17.0MB
-
MD5
04994c8ef5e395b648eb5eebd4a92eae
-
SHA1
5eeacb49918f01fb81523f5373601f5a34a46a80
-
SHA256
5a1505f4844d9e3664aa1059c4766cb224e08b71449e73d32cf7479d7a4e2418
-
SHA512
3abba32226f481104592abd378bd18bb344fb0f1864be56c3ae42b041ce666e62d38503058b4d9a2f235f09a0f60a25db0d1905502401d1115b85b17200060ee
-
SSDEEP
393216:BEWGlFtLhZnVnadkEvYLEwARa/FkAnq+LbPvmu:BNGlF1n1aGEQIwARa/+AnRyu
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 2024-06-24_04994c8ef5e395b648eb5eebd4a92eae_ryuk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_04994c8ef5e395b648eb5eebd4a92eae_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_04994c8ef5e395b648eb5eebd4a92eae_ryuk.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3792 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:876
Network
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request71.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request164.189.21.2.in-addr.arpaIN PTRResponse164.189.21.2.in-addr.arpaIN PTRa2-21-189-164deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request82.90.14.23.in-addr.arpaIN PTRResponse82.90.14.23.in-addr.arpaIN PTRa23-14-90-82deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request89.16.208.104.in-addr.arpaIN PTRResponse
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
71.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
164.189.21.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
82.90.14.23.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
89.16.208.104.in-addr.arpa