Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 01:54

General

  • Target

    2024-12-30_8a22ce5556ad5616fb1e6bc833e98b3c_cobalt-strike_ryuk.exe

  • Size

    3.1MB

  • MD5

    8a22ce5556ad5616fb1e6bc833e98b3c

  • SHA1

    ffd3e2ff7a4dc46b58783a60dbe80ca9706318b9

  • SHA256

    dd030f49d69a154e37e6287b0359ff7a19fd336a8352cc07dc4acb3c3641e7c7

  • SHA512

    9c37cb5939fb442684976a143a15d8633eed7e3fa9a4e3c44ca8a9d2b6420ae9a660b2c10da1921c200fd168489546c87004dcc19677de9b652d2ef855376088

  • SSDEEP

    24576:qiils10EyDGbEbXLmTVpREQl/18LphqeVX9batzh3QCzjXuBL+Yn:UG1SmTxflcWNmf

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-30_8a22ce5556ad5616fb1e6bc833e98b3c_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-30_8a22ce5556ad5616fb1e6bc833e98b3c_cobalt-strike_ryuk.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\2024-12-30_8a22ce5556ad5616fb1e6bc833e98b3c_cobalt-strike_ryuk.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-12-30_8a22ce5556ad5616fb1e6bc833e98b3c_cobalt-strike_ryuk.exe"
      2⤵
        PID:1896

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1896-0-0x000007FFFFFD5000-0x000007FFFFFD6000-memory.dmp

      Filesize

      4KB