Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 05:24
Behavioral task
behavioral1
Sample
2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe
-
Size
398KB
-
MD5
0d9d6b9514db21df74aff5e7d9a66c6f
-
SHA1
622b49e0bfd5c2524776936d70a3c0366030b6ba
-
SHA256
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff
-
SHA512
51cad109f958bccee8c322e7d1ec0182d317bf44a59288159c418995a6dc0b6274039f8f1232bd6268e5b335358d1fb8eac5bc9f2270d4125f03e6178a4d005e
-
SSDEEP
12288:EnmOeWHehSjfhiPsxOticWgeEqq1sdeYo5H:EnmQISbA0wicWR
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1468 systeminfo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2380 1252 2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe 30 PID 1252 wrote to memory of 2380 1252 2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe 30 PID 1252 wrote to memory of 2380 1252 2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe 30 PID 2380 wrote to memory of 1468 2380 cmd.exe 32 PID 2380 wrote to memory of 1468 2380 cmd.exe 32 PID 2380 wrote to memory of 1468 2380 cmd.exe 32 PID 1252 wrote to memory of 2836 1252 2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe 35 PID 1252 wrote to memory of 2836 1252 2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe 35 PID 1252 wrote to memory of 2836 1252 2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe 35 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-17_0d9d6b9514db21df74aff5e7d9a66c6f_cobalt-strike_ryuk.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1252 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c systeminfo > "C:\Users\Admin\AppData\Local\Temp\8C982B7Es.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:1468
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1252 -s 3722⤵PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD508e87789b76547158121bc83baafa5d2
SHA1535e5ee32320e4b23b96d22c5f2d9c9fba7b41ac
SHA2562a075cf80d06527ff2e0eba96aceeffedfff29c437efbe8e5c657fff9aea7e17
SHA5129b0fd2c9276cfc17392c3ca59a4a4354a63f2466cd5a71419bc98ad294f817d4f1bdccdc7308eb00863be73d3c527a3e78f3ae18f45f8681bd15bbd0bd25682d