Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe
-
Size
5.4MB
-
MD5
853341a37ee6cd6516e03ce1341c7889
-
SHA1
6ff55c00a1c09ccd6af7727d526e21ca969e0af0
-
SHA256
773760fd71d52457ba53a314f15dddb1a74e8b2f5a90e5e150dea48a21aa76df
-
SHA512
28b6ce445fd4b449880ecb56f6c70e7b16cc587f93581545f8ca1bae05b9b7b97fc2bc882d75b75c1dbe42db1377c3cee5402eefa3cea5c2d12d22494840f3e6
-
SSDEEP
98304:42K7dKBS4R1tQesBeOm2OYrrMkhYjpRun+MHwiQ2:4BISXBeL1TltRun+Mft
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-0-0x0000000001D30000-0x0000000001E9B000-memory.dmp mimikatz behavioral1/memory/2372-1-0x0000000001D30000-0x0000000001E9B000-memory.dmp mimikatz behavioral1/memory/2372-3-0x0000000001D30000-0x0000000001E9B000-memory.dmp mimikatz -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exepid process 2372 2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe 2372 2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe 2372 2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe 2372 2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe 2372 2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exedescription pid process Token: SeDebugPrivilege 2372 2024-11-08_853341a37ee6cd6516e03ce1341c7889_ryuk.exe