Analysis
-
max time kernel
92s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 17:55
Behavioral task
behavioral1
Sample
2025-02-01_9c3d5b4ddca7f12476e4c316bba931c3_ismagent_ryuk_sliver.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-01_9c3d5b4ddca7f12476e4c316bba931c3_ismagent_ryuk_sliver.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-02-01_9c3d5b4ddca7f12476e4c316bba931c3_ismagent_ryuk_sliver.exe
-
Size
3.4MB
-
MD5
9c3d5b4ddca7f12476e4c316bba931c3
-
SHA1
adc9764ba395eb8bc2e1f0841601d9b58758df65
-
SHA256
8555e6cb018381d622450d89778ff410ca545e59c9ec898dcedc32cf01785482
-
SHA512
085a07550e548e00688610c34a2ded479d14a7bab4788d4e64b7f8d224b4cfd05ea425d35fa08ea39d61af43a1e1a689a2b5c8e62330fc066f25736cd6106313
-
SSDEEP
49152:jX3YnLOQYsZfQ74C6SkgSbXP31+frjUYuHi7nT8poTMFvfuJ1kZ7NrjHQe55bfxC:jlRsZ47/QXoHUOfAoj1gxfE
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1428 wmic.exe Token: SeSecurityPrivilege 1428 wmic.exe Token: SeTakeOwnershipPrivilege 1428 wmic.exe Token: SeLoadDriverPrivilege 1428 wmic.exe Token: SeSystemProfilePrivilege 1428 wmic.exe Token: SeSystemtimePrivilege 1428 wmic.exe Token: SeProfSingleProcessPrivilege 1428 wmic.exe Token: SeIncBasePriorityPrivilege 1428 wmic.exe Token: SeCreatePagefilePrivilege 1428 wmic.exe Token: SeBackupPrivilege 1428 wmic.exe Token: SeRestorePrivilege 1428 wmic.exe Token: SeShutdownPrivilege 1428 wmic.exe Token: SeDebugPrivilege 1428 wmic.exe Token: SeSystemEnvironmentPrivilege 1428 wmic.exe Token: SeRemoteShutdownPrivilege 1428 wmic.exe Token: SeUndockPrivilege 1428 wmic.exe Token: SeManageVolumePrivilege 1428 wmic.exe Token: 33 1428 wmic.exe Token: 34 1428 wmic.exe Token: 35 1428 wmic.exe Token: 36 1428 wmic.exe Token: SeIncreaseQuotaPrivilege 1428 wmic.exe Token: SeSecurityPrivilege 1428 wmic.exe Token: SeTakeOwnershipPrivilege 1428 wmic.exe Token: SeLoadDriverPrivilege 1428 wmic.exe Token: SeSystemProfilePrivilege 1428 wmic.exe Token: SeSystemtimePrivilege 1428 wmic.exe Token: SeProfSingleProcessPrivilege 1428 wmic.exe Token: SeIncBasePriorityPrivilege 1428 wmic.exe Token: SeCreatePagefilePrivilege 1428 wmic.exe Token: SeBackupPrivilege 1428 wmic.exe Token: SeRestorePrivilege 1428 wmic.exe Token: SeShutdownPrivilege 1428 wmic.exe Token: SeDebugPrivilege 1428 wmic.exe Token: SeSystemEnvironmentPrivilege 1428 wmic.exe Token: SeRemoteShutdownPrivilege 1428 wmic.exe Token: SeUndockPrivilege 1428 wmic.exe Token: SeManageVolumePrivilege 1428 wmic.exe Token: 33 1428 wmic.exe Token: 34 1428 wmic.exe Token: 35 1428 wmic.exe Token: 36 1428 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3656 wrote to memory of 1428 3656 2025-02-01_9c3d5b4ddca7f12476e4c316bba931c3_ismagent_ryuk_sliver.exe 84 PID 3656 wrote to memory of 1428 3656 2025-02-01_9c3d5b4ddca7f12476e4c316bba931c3_ismagent_ryuk_sliver.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-01_9c3d5b4ddca7f12476e4c316bba931c3_ismagent_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-01_9c3d5b4ddca7f12476e4c316bba931c3_ismagent_ryuk_sliver.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1428
-