Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 13:47

General

  • Target

    2024-08-17_756ef468f3b055f47c81c2d4cac7cc06_ryuk.exe

  • Size

    1.8MB

  • MD5

    756ef468f3b055f47c81c2d4cac7cc06

  • SHA1

    075ebf52eb79a5b227964435ffe03db76a69dd91

  • SHA256

    2073b1abb03741af1abba88e0ccd311a3ede19d89bcf1f029606e93545f59f69

  • SHA512

    ec40e5da7ba005f33a00afb38aaeb5ae4750ca2895dcc44fa56f7dac38dd65567c54e118f9d76e33fd2684b53b8ee6f70530a0aa3097bc85eb7fe9a870083c28

  • SSDEEP

    49152:jZH42U78NgjpUAQjqdURLDLy0cdakz1D15:ltNgjpMRL/mx5

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-17_756ef468f3b055f47c81c2d4cac7cc06_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-17_756ef468f3b055f47c81c2d4cac7cc06_ryuk.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    PID:724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/724-0-0x0000020BFAD00000-0x0000020BFAD06000-memory.dmp

    Filesize

    24KB

  • memory/724-1-0x0000020BFAD60000-0x0000020BFAD64000-memory.dmp

    Filesize

    16KB

  • memory/724-9-0x0000020BFAD20000-0x0000020BFAD25000-memory.dmp

    Filesize

    20KB

  • memory/724-5-0x0000020BFAD20000-0x0000020BFAD25000-memory.dmp

    Filesize

    20KB

  • memory/724-11-0x0000020BFAD60000-0x0000020BFAD64000-memory.dmp

    Filesize

    16KB

  • memory/724-14-0x0000020BFAD20000-0x0000020BFAD25000-memory.dmp

    Filesize

    20KB