Analysis

  • max time kernel
    93s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 12:06

General

  • Target

    2024-09-14_0dde44f612f8b1b70d9fb69a2761cf25_cobalt-strike_ryuk.exe

  • Size

    1.9MB

  • MD5

    0dde44f612f8b1b70d9fb69a2761cf25

  • SHA1

    7f1fce317f95820bcc2708a95935f363580e5d91

  • SHA256

    4ee243d26a552e2c30b778f5ee521898479260d70951c199042426e02c31f0bf

  • SHA512

    fa65cb24eb104ed6cec8ea6be5c645db3d2f2e640872957bcfeda367a9014e42e054fd2df8822822c899a9bc641b571a180ffcf88837291e23ad8267c8e88cca

  • SSDEEP

    49152:3lOVDTtQY6SoNtaUJ67UnHpclbwbWAaJiwmqTjcoNkQ/qoLEw:oqSUHxqPFrqo4w

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-14_0dde44f612f8b1b70d9fb69a2761cf25_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-14_0dde44f612f8b1b70d9fb69a2761cf25_cobalt-strike_ryuk.exe"
    1⤵
      PID:3312

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3312-0-0x0000000140000000-0x0000000140201000-memory.dmp

            Filesize

            2.0MB

          • memory/3312-7-0x00000000007D0000-0x0000000000830000-memory.dmp

            Filesize

            384KB

          • memory/3312-9-0x00000000007D0000-0x0000000000830000-memory.dmp

            Filesize

            384KB

          • memory/3312-1-0x00000000007D0000-0x0000000000830000-memory.dmp

            Filesize

            384KB

          • memory/3312-12-0x0000000140000000-0x0000000140201000-memory.dmp

            Filesize

            2.0MB