Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 19:26

General

  • Target

    2024-06-24_23e87c41b5e10bb2b623bec0ec9ccfea_ryuk.exe

  • Size

    3.5MB

  • MD5

    23e87c41b5e10bb2b623bec0ec9ccfea

  • SHA1

    8c2625e33ddf71aadfc058b6e1420634d490d640

  • SHA256

    97a1040cfc118786061d4a0d0520b94aec6d31ee1e45883dbdb0748369732efb

  • SHA512

    46fcdf1f4101d1229632cf1dd2f5e417a546fb939f1547c552f11f7b33008e5db514df95e3ac49fda616e7f056b78b2daf7b9a401e0ca760947703908854294a

  • SSDEEP

    49152:YIl+D9L+BTrVAhVXqKGcjdZbvV+CYXl8aALdt91qGElo+yJF/QNZRqfUhRWdp3gR:OqBTgaKNjvBocAubE/

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-24_23e87c41b5e10bb2b623bec0ec9ccfea_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-24_23e87c41b5e10bb2b623bec0ec9ccfea_ryuk.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\2024-06-24_23e87c41b5e10bb2b623bec0ec9ccfea_ryuk.exe
      C:\Users\Admin\AppData\Local\Temp\2024-06-24_23e87c41b5e10bb2b623bec0ec9ccfea_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Next\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Next\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=beta --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=62.0.3331.10 --initial-client-data=0xc8,0xcc,0xd0,0xc0,0xd4,0x13fd5f4e8,0x13fd5f4f8,0x13fd5f508
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Next\Crash Reports\reports\a3afd835-7af6-4ec0-9554-129e631b602b.dmp

    Filesize

    146KB

    MD5

    1ece6692c96970496f4d20fd0e122e90

    SHA1

    ab5451f84da66b99539ec0e93eaf1df5de0cad71

    SHA256

    a5950fde4ff76ee322398a73afb8391cf131bacc5dc5763a24d61e8a59d6e067

    SHA512

    2fa649a69e79b91c21623d1fdd3263c44cae12caf19dbe484bccbcb7a3f64dce667bc0599d2d6c039ad367f3544be3c561a005b5dca5fb259431414cb3d384f3

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Next\Crash Reports\settings.dat

    Filesize

    40B

    MD5

    b596c3878b004f51632df5c09a96db89

    SHA1

    bc5d32475f42c0b3890ed8a90583a10f114fac77

    SHA256

    f30adcbefcff33eb42d833f0b84883baa7c6ffe935b133748bb8f8e34b1d7e09

    SHA512

    80d38dbda44a19f1b2d4ca7548865bf8e374cbde6bb3f08a378623c4d419e9950982e505dd23c8155bcf430eb94329dc91106826548d10aad162488f5d4c56c1