Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/11/2024, 10:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe
Resource
win7-20240729-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe
Resource
win10v2004-20241007-en
18 signatures
150 seconds
General
-
Target
2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe
-
Size
3.6MB
-
MD5
d38571e4500bd3936c55ab41b7d40c4b
-
SHA1
b7dfcd284dd985b92c4ab45e13bfc45dcf067ac5
-
SHA256
ec711f3d9eb360eb08ef30c0b315de37a59da35bd6e332d8f19d18fc480d9a3c
-
SHA512
324e71c33eab94097b4e0cc0b6d28d8bdbca1739282b6b1fafdbb440ba2ab69d256b4905046edd719bdf20192440d160193f983f2217ccaf4972b5617a2a592a
-
SSDEEP
24576:wiSVYduVRYxf0fXRBvmt/cGFCTYGTnEt3lKTtHttN0jhmtksrP1yspoz9J7FbQxa:0QusxfsH8OThTM+tHtEjhFs4Uv4rqYp
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1520 wrote to memory of 3052 1520 2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe 30 PID 1520 wrote to memory of 3052 1520 2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe 30 PID 1520 wrote to memory of 3052 1520 2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exeC:\Users\Admin\AppData\Local\Temp\2024-11-14_d38571e4500bd3936c55ab41b7d40c4b_ryuk.exe2⤵PID:3052
-