Analysis
-
max time kernel
127s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-04_6437600494a03980059569b5f07b8116_cobalt-strike_hijackloader_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-04_6437600494a03980059569b5f07b8116_cobalt-strike_hijackloader_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-04_6437600494a03980059569b5f07b8116_cobalt-strike_hijackloader_ryuk.exe
-
Size
12.6MB
-
MD5
6437600494a03980059569b5f07b8116
-
SHA1
31118a9eada521fe7e9d5ff55fe78a42cae95e33
-
SHA256
9a577fbf21955f9f7995b06943f8e8842b5ab02112d1842c671252419d25aae0
-
SHA512
a2add5e8424fa6333fc79b0cbdc4410e63a92079d1454676e1f11f12cd8babacd49fb224ccc04eddcadd995365682fc8516d024f37d8fd96e29a5d96732638c2
-
SSDEEP
196608:tLn8SiCGurDz5o/VP7TyT8xw3y0Kl2OCxnSG:tb78urDz5o/xT1wi0U2b
Malware Config
Signatures
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-04_6437600494a03980059569b5f07b8116_cobalt-strike_hijackloader_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-04_6437600494a03980059569b5f07b8116_cobalt-strike_hijackloader_ryuk.exe"1⤵PID:4108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4424,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4444 /prefetch:81⤵PID:2156