Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 18:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-07-10_fbc98f026d8cad0cac7da1c2c481b24a_ryuk.exe
Resource
win7-20240705-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-07-10_fbc98f026d8cad0cac7da1c2c481b24a_ryuk.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-07-10_fbc98f026d8cad0cac7da1c2c481b24a_ryuk.exe
-
Size
1.1MB
-
MD5
fbc98f026d8cad0cac7da1c2c481b24a
-
SHA1
72fa24cf1cc5f713d1cdbc1f3e790728049752b5
-
SHA256
d6e094c100f7110a72b3a44d482ff2c95ee37bee84b4cf6cdf712ed6de634abd
-
SHA512
03b751b6e0c33e7cd983ea5357be5a6c8a7ff36440333680c787c22221965c65b7bc56b2c22bff29c8971db20c24cb01ceb98d6da3f8717f6bd9532cf81c2904
-
SSDEEP
24576:X5KbPTHqKYfYGzhmPGKEVjj9C/32zX2rkXwyvvSdI5RNy7M:pKbPTHdYfVgPbEF9C/qX2ri93SdI5RNb
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-07-10_fbc98f026d8cad0cac7da1c2c481b24a_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1324 2024-07-10_fbc98f026d8cad0cac7da1c2c481b24a_ryuk.exe