Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 18:23
Behavioral task
behavioral1
Sample
2024-11-22_3931c76c8a973e678bb6ca443824d5ca_ismagent_ryuk_sliver.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-22_3931c76c8a973e678bb6ca443824d5ca_ismagent_ryuk_sliver.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-22_3931c76c8a973e678bb6ca443824d5ca_ismagent_ryuk_sliver.exe
-
Size
3.3MB
-
MD5
3931c76c8a973e678bb6ca443824d5ca
-
SHA1
739af76299d2177710c98e0567e04bfaec3e7364
-
SHA256
2e9c83ebcc6263491cd99dd61839fd42817b633a956741e65eed5b4fcc0e20a9
-
SHA512
9201e24808cbb349355639b73f530d2c73e731ddbc22de7de5c97c2dcb5c41cdf5dadae8f5af7ef0cea1ce45dd0b68cd2f58a2a58b867b8600153b0058021daf
-
SSDEEP
49152:dX3YnLOQYsZfQ74C6SkgSbXP31+frjUYuHi7nT8poTMFvfuJ1kZ7NrjHQe85QD1:dlRsZ47/QXoHUOfAoj1x6B
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3672 wmic.exe Token: SeSecurityPrivilege 3672 wmic.exe Token: SeTakeOwnershipPrivilege 3672 wmic.exe Token: SeLoadDriverPrivilege 3672 wmic.exe Token: SeSystemProfilePrivilege 3672 wmic.exe Token: SeSystemtimePrivilege 3672 wmic.exe Token: SeProfSingleProcessPrivilege 3672 wmic.exe Token: SeIncBasePriorityPrivilege 3672 wmic.exe Token: SeCreatePagefilePrivilege 3672 wmic.exe Token: SeBackupPrivilege 3672 wmic.exe Token: SeRestorePrivilege 3672 wmic.exe Token: SeShutdownPrivilege 3672 wmic.exe Token: SeDebugPrivilege 3672 wmic.exe Token: SeSystemEnvironmentPrivilege 3672 wmic.exe Token: SeRemoteShutdownPrivilege 3672 wmic.exe Token: SeUndockPrivilege 3672 wmic.exe Token: SeManageVolumePrivilege 3672 wmic.exe Token: 33 3672 wmic.exe Token: 34 3672 wmic.exe Token: 35 3672 wmic.exe Token: 36 3672 wmic.exe Token: SeIncreaseQuotaPrivilege 3672 wmic.exe Token: SeSecurityPrivilege 3672 wmic.exe Token: SeTakeOwnershipPrivilege 3672 wmic.exe Token: SeLoadDriverPrivilege 3672 wmic.exe Token: SeSystemProfilePrivilege 3672 wmic.exe Token: SeSystemtimePrivilege 3672 wmic.exe Token: SeProfSingleProcessPrivilege 3672 wmic.exe Token: SeIncBasePriorityPrivilege 3672 wmic.exe Token: SeCreatePagefilePrivilege 3672 wmic.exe Token: SeBackupPrivilege 3672 wmic.exe Token: SeRestorePrivilege 3672 wmic.exe Token: SeShutdownPrivilege 3672 wmic.exe Token: SeDebugPrivilege 3672 wmic.exe Token: SeSystemEnvironmentPrivilege 3672 wmic.exe Token: SeRemoteShutdownPrivilege 3672 wmic.exe Token: SeUndockPrivilege 3672 wmic.exe Token: SeManageVolumePrivilege 3672 wmic.exe Token: 33 3672 wmic.exe Token: 34 3672 wmic.exe Token: 35 3672 wmic.exe Token: 36 3672 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3672 1752 2024-11-22_3931c76c8a973e678bb6ca443824d5ca_ismagent_ryuk_sliver.exe 83 PID 1752 wrote to memory of 3672 1752 2024-11-22_3931c76c8a973e678bb6ca443824d5ca_ismagent_ryuk_sliver.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_3931c76c8a973e678bb6ca443824d5ca_ismagent_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-22_3931c76c8a973e678bb6ca443824d5ca_ismagent_ryuk_sliver.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3672
-