Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2025, 10:12

General

  • Target

    2025-03-07_5869c28a56a5d7bdf8c4607f1e35ed5e_ryuk.exe

  • Size

    664KB

  • MD5

    5869c28a56a5d7bdf8c4607f1e35ed5e

  • SHA1

    0db07a13d1942c0fdfe7157255fe52ce02bc5503

  • SHA256

    b1357f5beda53b518bbfa230edf95261787367b6b380395d34c145ae8c6276dd

  • SHA512

    28f3a40768de3d949b3349a5d941f019fb37c7cd0b97bbd73a58945ababdbbe370483f4362bb1a4e264ca23a5fdf9a1ff76167bae3992497a6eb3de4e650352e

  • SSDEEP

    12288:Cs9QxOwSoCU5qJSr1e10UwmBbcPc0Dsg1AQeHUzTshz+Qzewim:2nSoCU5qJSr1e10wIPc0Dsg1heeTWEwz

Malware Config

Signatures

  • Azov

    A wiper seeking only damage, first seen in 2022.

  • Azov family
  • Renames multiple (458) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-07_5869c28a56a5d7bdf8c4607f1e35ed5e_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-07_5869c28a56a5d7bdf8c4607f1e35ed5e_ryuk.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:3700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt

    Filesize

    2KB

    MD5

    78ede93114e65f9160fd03d3357c56e6

    SHA1

    88d531b101e57655f1d0d26c6b3257aa2468d460

    SHA256

    c97412fbf88da8f91099a52888dea4c3f222cd95af3e681e3271cbca8b6b7bb5

    SHA512

    074a4c741273902ccacb6f573b96d8accedb2ee405dbd04350cdbf54d180c1fd577a4e90c2aae26bf72f3782403f4494db6e3501a04cfd9d7d81a6bc14884b9d

  • memory/3700-3-0x000001E8DD9A0000-0x000001E8DD9A5000-memory.dmp

    Filesize

    20KB

  • memory/3700-2-0x000001E8DD7B0000-0x000001E8DD7B7000-memory.dmp

    Filesize

    28KB

  • memory/3700-14-0x000001E8DD9A0000-0x000001E8DD9A5000-memory.dmp

    Filesize

    20KB

  • memory/3700-9-0x000001E8DD9B0000-0x000001E8DD9B4000-memory.dmp

    Filesize

    16KB

  • memory/3700-10-0x000001E8DD9A0000-0x000001E8DD9A5000-memory.dmp

    Filesize

    20KB

  • memory/3700-4-0x00007FF7D6230000-0x00007FF7D62C7000-memory.dmp

    Filesize

    604KB

  • memory/3700-0-0x000001E8DD9B0000-0x000001E8DD9B4000-memory.dmp

    Filesize

    16KB