Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe
-
Size
1.3MB
-
MD5
63ad42e03aca6ce447fb447e21aeb385
-
SHA1
e2c27342d3b7e39033e0a1819cfb74a9db5ea330
-
SHA256
ebd3a506c226e98dcedc1b882a11addd25ded8ee5110249b5b1a391e4d77d327
-
SHA512
5bed3a9d943142056db6a4ab08450d3f052fba47826f4141ff725128d741dc0a19a3675d6c2c546030d8700ba765647b0659e7384a712c0400fa077dcb14f1e9
-
SSDEEP
24576:xi0naRHr6XCh+V/KNGdsYqpHidVzdYUpesp:xjnaRL6XCIp6GdsYcidH
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4748 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe Token: SeDebugPrivilege 4356 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe Token: SeDebugPrivilege 2864 2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
C:\Users\Admin\AppData\Local\Temp\2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-14_63ad42e03aca6ce447fb447e21aeb385_ryuk.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864