Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_743b5233534ea58f35c1019b34355647_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_743b5233534ea58f35c1019b34355647_ryuk.exe
Resource
win10v2004-20231222-en
Target
2024-01-10_743b5233534ea58f35c1019b34355647_ryuk
Size
12.7MB
MD5
743b5233534ea58f35c1019b34355647
SHA1
56abfbf4cab6dee18a27ee3fed2b4a7f1e8e4d21
SHA256
e7dffd5c9886f72e10b75f70fc467f0630fc8e34a5623b8062154534893dbc45
SHA512
07e3fe7c8173aa603aad130fb366e2279efffed3d81dc7453486dbb924ef84ff05ce7db47fa3434f78bc405f590d36b52b6f10a30a3fde8cc56b46c53fd47ab9
SSDEEP
98304:G9bJrxkHb3Wi1JO+SGCYD1ntzMYiWNWRF+2LprjhlCPdEdZOf:G9bJrwKiLSG51ZKe
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetNumberFormatW
OpenEventW
ExpandEnvironmentStringsW
ReadConsoleW
WriteConsoleW
GetFileSizeEx
ReadFile
IsDebuggerPresent
DebugBreak
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
EnterCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
FreeLibrary
VerSetConditionMask
GetSystemDirectoryW
LocalFree
lstrlenW
FormatMessageW
GetModuleHandleW
VirtualQueryEx
VirtualFree
GetModuleHandleExW
GetModuleFileNameW
GetFileAttributesW
CreateThread
OutputDebugStringA
CreateFileA
WriteFile
RtlCaptureStackBackTrace
CompareStringW
GetTempPathW
GetFullPathNameW
GetLongPathNameW
GetWindowsDirectoryW
GetCurrentDirectoryW
GetComputerNameExW
GetEnvironmentVariableW
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetVolumePathNameW
LoadLibraryExW
GetCurrentThread
LocalAlloc
LocalSize
FindClose
MulDiv
SystemTimeToFileTime
DeleteFileW
FlushFileBuffers
SetFilePointerEx
SetEndOfFile
SetFilePointer
FoldStringW
GetSystemDirectoryA
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateDirectoryW
QueryPerformanceFrequency
QueryPerformanceCounter
GetLogicalDriveStringsW
QueryDosDeviceW
FindFirstVolumeW
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
GetFileInformationByHandle
FindVolumeClose
ConvertThreadToFiber
ConvertFiberToThread
CreateFiberEx
DeleteFiber
SwitchToFiber
OutputDebugStringW
GetSystemTime
GetOverlappedResult
ConnectNamedPipe
SetEnvironmentVariableW
CreateNamedPipeW
CancelIo
GetOEMCP
GetCPInfo
OpenEventA
CreateMutexA
OpenMutexA
CreateFileMappingA
OpenFileMappingA
CreateEventA
GetStringTypeW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
GetLocaleInfoW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
WaitForSingleObjectEx
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
FreeLibraryAndExitThread
HeapAlloc
HeapReAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
HeapSize
GetProcessHeap
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
CopyFileW
Thread32Next
SuspendThread
Thread32First
VirtualAlloc
GetLocalTime
SleepEx
GetVolumeInformationW
CreateHardLinkW
MoveFileExW
RemoveDirectoryW
DeviceIoControl
UnlockFileEx
LockFileEx
GetLogicalDrives
WaitNamedPipeW
WaitForMultipleObjectsEx
SwitchToThread
DeleteCriticalSection
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
GetFileType
Sleep
GetConsoleCP
ReadProcessMemory
GetExitCodeThread
CreateRemoteThread
FlushInstructionCache
VirtualProtectEx
WriteProcessMemory
GetProcAddress
ExitThread
LoadLibraryW
VirtualAllocEx
VirtualFreeEx
GetConsoleCursorInfo
SetConsoleTitleW
Module32NextW
Module32FirstW
SetConsoleMode
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
AllocConsole
GetStartupInfoW
SetCurrentDirectoryW
ReadConsoleOutputA
WriteConsoleOutputCharacterW
CreateConsoleScreenBuffer
IsDBCSLeadByteEx
GetCPInfoExW
GetACP
ResumeThread
SetConsoleScreenBufferSize
GetConsoleWindow
GetConsoleFontSize
GetCurrentConsoleFont
SetHandleInformation
CreateProcessW
CreateFileMappingW
AttachConsole
SetStdHandle
DuplicateHandle
FreeConsole
GetCommandLineW
MapViewOfFile
UnmapViewOfFile
GetStdHandle
SetConsoleCtrlHandler
MultiByteToWideChar
OpenThread
WideCharToMultiByte
WriteConsoleOutputW
SetConsoleCursorPosition
ScrollConsoleScreenBufferW
SetConsoleWindowInfo
GetCurrentThreadId
CreateFileW
ReadConsoleOutputW
WaitForMultipleObjects
ReadConsoleInputW
GetConsoleScreenBufferInfo
GetConsoleOutputCP
ReleaseMutex
AddConsoleAliasW
GetConsoleAliasesW
GetConsoleAliasesLengthW
GetConsoleAliasW
CreateMutexW
GetConsoleMode
GenerateConsoleCtrlEvent
ResetEvent
WriteConsoleInputW
GetNumberOfConsoleInputEvents
CreateEventW
SetEvent
SetLastError
GetExitCodeProcess
GetCurrentProcess
GetCurrentProcessId
TerminateThread
GetTickCount
TerminateProcess
OpenProcess
WaitForSingleObject
GetLastError
CloseHandle
LoadLibraryA
GetPropA
RemovePropA
GetDC
ReleaseDC
CharUpperW
MapVirtualKeyW
GetSystemMetrics
VkKeyScanW
CallWindowProcW
MapDialogRect
FindWindowW
CharLowerW
DestroyIcon
CharLowerBuffW
MessageBoxW
SendMessageW
wsprintfA
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
wsprintfW
AcquireCredentialsHandleW
AcquireCredentialsHandleA
AcceptSecurityContext
InitializeSecurityContextA
InitializeSecurityContextW
FreeContextBuffer
EnumerateSecurityPackagesA
QuerySecurityPackageInfoA
VerifySignature
MakeSignature
FreeCredentialsHandle
DeleteSecurityContext
inet_addr
gethostbyname
getservbyport
WSACleanup
WSAStartup
getservbyname
htons
gethostbyaddr
WSAGetLastError
inet_ntoa
WSASetLastError
ntohl
WSAStringToAddressW
htonl
ntohs
getpeername
shutdown
closesocket
WSAEnumProtocolsW
WSASocketW
WSCGetProviderPath
setsockopt
bind
getsockname
accept
ioctlsocket
WSAEventSelect
connect
WSAEnumNetworkEvents
WSAGetOverlappedResult
WSARecv
WSASend
listen
GetDeviceCaps
DeleteDC
GetUserNameW
CryptDestroyKey
RegNotifyChangeKeyValue
SetSecurityInfo
ConvertStringSidToSidW
GetAce
DecryptFileW
EncryptFileW
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
GetSecurityDescriptorControl
SetSecurityDescriptorControl
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetAclInformation
AddAuditAccessAceEx
AddAccessDeniedAceEx
AddAccessAllowedAceEx
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
GetSecurityInfo
GetNamedSecurityInfoW
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
EqualSid
GetLengthSid
CopySid
GetSidLengthRequired
InitializeSid
LookupAccountNameW
LookupAccountSidW
CoTaskMemAlloc
CoTaskMemFree
GetModuleInformation
CryptProtectData
CryptUnprotectData
GetTcpTable
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ