Analysis

  • max time kernel
    11s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 14:48

General

  • Target

    2024-08-05_7595d9a29c759a93653f05f745c5931d_cobalt-strike_ryuk.exe

  • Size

    946KB

  • MD5

    7595d9a29c759a93653f05f745c5931d

  • SHA1

    fa408d5002c11a99a91aef53c58fde71906bfc35

  • SHA256

    cd9dea7f60bc854ba5ff928d4aea9b20718af1a6de62921bece2c35bb6444557

  • SHA512

    221c1587504b897d9acffcb4309079d3f90e2f7a1f71dcce21121e67a2ff063b829599041c78c7c2dcfecf358c02ffaf065e15fb25fc08558ed530a8b6fbfc38

  • SSDEEP

    24576:KTgnpwJ+RNRmlh8t0D+7y8G2G9yL0cMoThTR9PyuLzpQo:y0dNm+brLC2hTR9quLB

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-05_7595d9a29c759a93653f05f745c5931d_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-05_7595d9a29c759a93653f05f745c5931d_cobalt-strike_ryuk.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-0-0x0000000140000000-0x00000001400F6000-memory.dmp

    Filesize

    984KB

  • memory/2344-7-0x00000000022F0000-0x0000000002350000-memory.dmp

    Filesize

    384KB

  • memory/2344-1-0x00000000022F0000-0x0000000002350000-memory.dmp

    Filesize

    384KB

  • memory/2344-8-0x00000000022F0000-0x0000000002350000-memory.dmp

    Filesize

    384KB

  • memory/2344-10-0x00000000022F0000-0x0000000002350000-memory.dmp

    Filesize

    384KB

  • memory/2344-12-0x0000000140000000-0x00000001400F6000-memory.dmp

    Filesize

    984KB