Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 12:34
Behavioral task
behavioral1
Sample
2024-12-26_f9086f2d3b627199fe2511b1e7ed3882_ismagent_ryuk_sliver.exe
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-12-26_f9086f2d3b627199fe2511b1e7ed3882_ismagent_ryuk_sliver.exe
Resource
win10v2004-20241007-en
2 signatures
150 seconds
General
-
Target
2024-12-26_f9086f2d3b627199fe2511b1e7ed3882_ismagent_ryuk_sliver.exe
-
Size
3.3MB
-
MD5
f9086f2d3b627199fe2511b1e7ed3882
-
SHA1
79fd4aa36ef64e1bcfe7723f59355dbd4c176bc9
-
SHA256
ed05bc36ed1f5934eab99877754fc948dbb02a9834b10759bdf74c0980f3c3d7
-
SHA512
4ca8b1ad482f99edd711417dafd76d98a73458499709ceb022e0bc7d20602387b19fcb6d3612a5fa5a92468c2396d34a3e5c7730d1c762e512ba81ba97104935
-
SSDEEP
49152:GX3YnLOQYsZfQ74C6SkgSbXP31+frjUYuHi7nT8poTMFvfuJ1kZ7NrjHQe85QU:GlRsZ47/QXoHUOfAoj1x6U
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2376 wmic.exe Token: SeSecurityPrivilege 2376 wmic.exe Token: SeTakeOwnershipPrivilege 2376 wmic.exe Token: SeLoadDriverPrivilege 2376 wmic.exe Token: SeSystemProfilePrivilege 2376 wmic.exe Token: SeSystemtimePrivilege 2376 wmic.exe Token: SeProfSingleProcessPrivilege 2376 wmic.exe Token: SeIncBasePriorityPrivilege 2376 wmic.exe Token: SeCreatePagefilePrivilege 2376 wmic.exe Token: SeBackupPrivilege 2376 wmic.exe Token: SeRestorePrivilege 2376 wmic.exe Token: SeShutdownPrivilege 2376 wmic.exe Token: SeDebugPrivilege 2376 wmic.exe Token: SeSystemEnvironmentPrivilege 2376 wmic.exe Token: SeRemoteShutdownPrivilege 2376 wmic.exe Token: SeUndockPrivilege 2376 wmic.exe Token: SeManageVolumePrivilege 2376 wmic.exe Token: 33 2376 wmic.exe Token: 34 2376 wmic.exe Token: 35 2376 wmic.exe Token: 36 2376 wmic.exe Token: SeIncreaseQuotaPrivilege 2376 wmic.exe Token: SeSecurityPrivilege 2376 wmic.exe Token: SeTakeOwnershipPrivilege 2376 wmic.exe Token: SeLoadDriverPrivilege 2376 wmic.exe Token: SeSystemProfilePrivilege 2376 wmic.exe Token: SeSystemtimePrivilege 2376 wmic.exe Token: SeProfSingleProcessPrivilege 2376 wmic.exe Token: SeIncBasePriorityPrivilege 2376 wmic.exe Token: SeCreatePagefilePrivilege 2376 wmic.exe Token: SeBackupPrivilege 2376 wmic.exe Token: SeRestorePrivilege 2376 wmic.exe Token: SeShutdownPrivilege 2376 wmic.exe Token: SeDebugPrivilege 2376 wmic.exe Token: SeSystemEnvironmentPrivilege 2376 wmic.exe Token: SeRemoteShutdownPrivilege 2376 wmic.exe Token: SeUndockPrivilege 2376 wmic.exe Token: SeManageVolumePrivilege 2376 wmic.exe Token: 33 2376 wmic.exe Token: 34 2376 wmic.exe Token: 35 2376 wmic.exe Token: 36 2376 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2376 2340 2024-12-26_f9086f2d3b627199fe2511b1e7ed3882_ismagent_ryuk_sliver.exe 83 PID 2340 wrote to memory of 2376 2340 2024-12-26_f9086f2d3b627199fe2511b1e7ed3882_ismagent_ryuk_sliver.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-26_f9086f2d3b627199fe2511b1e7ed3882_ismagent_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-26_f9086f2d3b627199fe2511b1e7ed3882_ismagent_ryuk_sliver.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2376
-