Analysis
-
max time kernel
118s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 10:21
Behavioral task
behavioral1
Sample
2025-02-08_7441b42e85f28e6687b2638a12ff5bc5_ismagent_ryuk_sliver.exe
Resource
win7-20241010-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2025-02-08_7441b42e85f28e6687b2638a12ff5bc5_ismagent_ryuk_sliver.exe
Resource
win10v2004-20250207-en
5 signatures
150 seconds
General
-
Target
2025-02-08_7441b42e85f28e6687b2638a12ff5bc5_ismagent_ryuk_sliver.exe
-
Size
3.2MB
-
MD5
7441b42e85f28e6687b2638a12ff5bc5
-
SHA1
b4e98e722d72bb6ef3eb68b77c605b1b7b0c2481
-
SHA256
7ac85e4c2ea87c8e69b05f5d16947ced622fbf6ee73e69ec4cdd712f8dcf2cc5
-
SHA512
3e08a85307fe7591297831d959582ab33250980ebef34143168e9625d84ab0403dfc1f6a138be40d5eaf3bebf428adb85eba76fb6586b6c713a28b7707c42562
-
SSDEEP
49152:AX3YnLOQYsZfQ74C6SkgSbXP31+frjUYuHi7nT8poTMFvfuJ1kZ7NrjHQe4:AlRsZ47/QXoHUOfAoj1n
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2492 wmic.exe Token: SeSecurityPrivilege 2492 wmic.exe Token: SeTakeOwnershipPrivilege 2492 wmic.exe Token: SeLoadDriverPrivilege 2492 wmic.exe Token: SeSystemProfilePrivilege 2492 wmic.exe Token: SeSystemtimePrivilege 2492 wmic.exe Token: SeProfSingleProcessPrivilege 2492 wmic.exe Token: SeIncBasePriorityPrivilege 2492 wmic.exe Token: SeCreatePagefilePrivilege 2492 wmic.exe Token: SeBackupPrivilege 2492 wmic.exe Token: SeRestorePrivilege 2492 wmic.exe Token: SeShutdownPrivilege 2492 wmic.exe Token: SeDebugPrivilege 2492 wmic.exe Token: SeSystemEnvironmentPrivilege 2492 wmic.exe Token: SeRemoteShutdownPrivilege 2492 wmic.exe Token: SeUndockPrivilege 2492 wmic.exe Token: SeManageVolumePrivilege 2492 wmic.exe Token: 33 2492 wmic.exe Token: 34 2492 wmic.exe Token: 35 2492 wmic.exe Token: SeIncreaseQuotaPrivilege 2492 wmic.exe Token: SeSecurityPrivilege 2492 wmic.exe Token: SeTakeOwnershipPrivilege 2492 wmic.exe Token: SeLoadDriverPrivilege 2492 wmic.exe Token: SeSystemProfilePrivilege 2492 wmic.exe Token: SeSystemtimePrivilege 2492 wmic.exe Token: SeProfSingleProcessPrivilege 2492 wmic.exe Token: SeIncBasePriorityPrivilege 2492 wmic.exe Token: SeCreatePagefilePrivilege 2492 wmic.exe Token: SeBackupPrivilege 2492 wmic.exe Token: SeRestorePrivilege 2492 wmic.exe Token: SeShutdownPrivilege 2492 wmic.exe Token: SeDebugPrivilege 2492 wmic.exe Token: SeSystemEnvironmentPrivilege 2492 wmic.exe Token: SeRemoteShutdownPrivilege 2492 wmic.exe Token: SeUndockPrivilege 2492 wmic.exe Token: SeManageVolumePrivilege 2492 wmic.exe Token: 33 2492 wmic.exe Token: 34 2492 wmic.exe Token: 35 2492 wmic.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2492 2892 2025-02-08_7441b42e85f28e6687b2638a12ff5bc5_ismagent_ryuk_sliver.exe 31 PID 2892 wrote to memory of 2492 2892 2025-02-08_7441b42e85f28e6687b2638a12ff5bc5_ismagent_ryuk_sliver.exe 31 PID 2892 wrote to memory of 2492 2892 2025-02-08_7441b42e85f28e6687b2638a12ff5bc5_ismagent_ryuk_sliver.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-08_7441b42e85f28e6687b2638a12ff5bc5_ismagent_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-08_7441b42e85f28e6687b2638a12ff5bc5_ismagent_ryuk_sliver.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2492
-