Analysis

  • max time kernel
    17s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 10:29

General

  • Target

    2024-07-09_94e006e6c7f83f83426f6387270b6e6c_ryuk.exe

  • Size

    1.8MB

  • MD5

    94e006e6c7f83f83426f6387270b6e6c

  • SHA1

    61f90a0b75ed5b1b1902132547fdf6f708d60dbd

  • SHA256

    a0a723daf23fab09ed0dc394f535bb01285623064cd5836f2373b64a65658ecf

  • SHA512

    c5edd7e4531e2b4de7e7dee6db5409f0f515cd89a283c3f99b61b5b766101828ef104e42967dc6b3ea108da550e191920811d44ee86d193bccc20ed23580f27d

  • SSDEEP

    24576:UTmnpwJ+R7TNjx+mZCkt76f/24pN+XNqNG6hditW:cqdHf9Ckt7c20+9qNxUW

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-09_94e006e6c7f83f83426f6387270b6e6c_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-09_94e006e6c7f83f83426f6387270b6e6c_ryuk.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1908-0-0x00000000008E0000-0x0000000000940000-memory.dmp

    Filesize

    384KB

  • memory/1908-3-0x0000000140000000-0x00000001401D6000-memory.dmp

    Filesize

    1.8MB

  • memory/1908-13-0x00000000008E0000-0x0000000000940000-memory.dmp

    Filesize

    384KB

  • memory/1908-12-0x0000000140000000-0x00000001401D6000-memory.dmp

    Filesize

    1.8MB

  • memory/1908-9-0x00000000008E0000-0x0000000000940000-memory.dmp

    Filesize

    384KB