Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_8de60e93841291bbe0adde53f55f5538_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_8de60e93841291bbe0adde53f55f5538_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_8de60e93841291bbe0adde53f55f5538_ryuk
-
Size
3.2MB
-
MD5
8de60e93841291bbe0adde53f55f5538
-
SHA1
95fada11c99465da283ec0d9d3d724f7886e66c4
-
SHA256
07805551d2a6391e9d4dfe7710e04618861c1cbf3f366026e5a7304e0abb602d
-
SHA512
fe8d659a59e500e3850413c50deac703046135e72d2cb565c16df3b1acf834004bc669add30e4c101ceaf41d16323c901e37348efae2aff5fbd59df1a6b1807b
-
SSDEEP
49152:A+Qsks2Ah5smTXM4ISXYcbQIkHWXTVD8TnG9GPRBLFNZKqNTCrra4gw29jIVpv:V2x4ISoHIuWD8bFNZ7ErafwXj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-06_8de60e93841291bbe0adde53f55f5538_ryuk
Files
-
2024-01-06_8de60e93841291bbe0adde53f55f5538_ryuk.exe windows:6 windows x64 arch:x64
891ae7c13b4c02a5397116354d2fbe26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shell32
SHGetFolderPathW
ShellExecuteExW
DuplicateIcon
ExtractIconExW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wsock32
ntohl
select
ioctlsocket
recv
htonl
htons
send
socket
gethostbyname
WSAStartup
connect
gdiplus
GdipSetSmoothingMode
GdipDrawImageRectI
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipLoadImageFromStream
GdipCloneImage
GdipGetImageBounds
GdipSetCompositingQuality
kernel32
GetConsoleCP
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
WriteFile
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
DecodePointer
DeleteCriticalSection
lstrlenW
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
Sleep
WaitForSingleObject
ResetEvent
MulDiv
GetCommandLineW
GetLongPathNameW
GetModuleFileNameW
GetTempPathW
CreateMutexW
CreateEventW
CloseHandle
CreateThread
GetProcAddress
LocalFree
GetCurrentProcessId
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
SizeofResource
CreateFileW
GetFileAttributesW
LockResource
QueryPerformanceFrequency
LoadResource
FindResourceW
GetWindowsDirectoryW
FreeLibrary
QueryPerformanceCounter
LoadLibraryExW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetDateFormatW
GetVolumeInformationW
DeviceIoControl
GetVersionExW
LoadLibraryW
GlobalReAlloc
GetConsoleMode
TlsFree
TlsAlloc
GetSystemDirectoryW
GetStdHandle
ExitProcess
HeapReAlloc
GetModuleHandleExW
ExitThread
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
FindClose
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetFullPathNameW
GetDriveTypeW
RemoveDirectoryW
DeleteFileW
GetFileAttributesExW
GetCommandLineA
RtlUnwindEx
RtlPcToFileHeader
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
VirtualProtect
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
GetStartupInfoW
SetEvent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTickCount
GetSystemTimeAsFileTime
TlsSetValue
GetFileSizeEx
SetFilePointerEx
ReadFile
ReadConsoleW
SetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
WriteConsoleW
SetEndOfFile
GetSystemTime
TlsGetValue
GetStringTypeW
GetCurrentThread
WaitForSingleObjectEx
DuplicateHandle
TryEnterCriticalSection
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
EncodePointer
OutputDebugStringW
IsDebuggerPresent
user32
UnregisterClassW
GetClientRect
MoveWindow
SetWindowTextW
EndDialog
SendMessageW
ScreenToClient
CreateWindowExW
SetWindowLongPtrW
GetDC
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
BeginPaint
SetForegroundWindow
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
GetWindowThreadProcessId
PostMessageW
GetActiveWindow
DestroyIcon
DialogBoxIndirectParamW
FindWindowW
PostThreadMessageW
DialogBoxParamW
GetMessageW
CallWindowProcW
FillRect
GetWindowLongPtrW
RegisterClassExW
RedrawWindow
LoadCursorW
GetWindowDC
GetClassInfoExW
ReleaseDC
MessageBoxW
SetFocus
SetWindowLongW
GetWindowTextW
GetWindowLongW
CreateDialogParamW
GetWindow
DestroyWindow
SetWindowPos
MonitorFromWindow
ShowWindow
IsWindow
DispatchMessageW
GetMonitorInfoW
PeekMessageW
MapWindowPoints
GetParent
UpdateWindow
InvalidateRect
DefWindowProcW
GetWindowRect
gdi32
SetBkColor
GetStockObject
SelectObject
GetDeviceCaps
CreateSolidBrush
CreateFontW
DeleteDC
GetTextExtentPoint32W
DeleteObject
CreateFontIndirectW
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
IsTextUnicode
ole32
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
oleaut32
CreateErrorInfo
SysAllocStringByteLen
SysStringByteLen
SysAllocString
VariantClear
VariantInit
VariantCopy
SysFreeString
VariantChangeType
OleLoadPicture
Sections
.text Size: 513KB - Virtual size: 513KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ