Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_a60244c64ce6080a7965d780970e37bd_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-23_a60244c64ce6080a7965d780970e37bd_ryuk.exe
Resource
win10v2004-20231215-en
Target
2024-01-23_a60244c64ce6080a7965d780970e37bd_ryuk
Size
3.4MB
MD5
a60244c64ce6080a7965d780970e37bd
SHA1
e0502440acf407d2a89b440f91d4127be0d7566b
SHA256
70a1ccbc632b12e89810717a7b884a964a3a24c14fc43a618564a2f1b17ec0de
SHA512
57fd2339b4719e3f45bb114a8e2b10146df6757f4e87b18a2776815c944e5babc594c3ee575bf10dee5dc0b6840534c050c54c4b570dbb6c9369bf2198815086
SSDEEP
49152:sl9ragrKXv0jtPzuigM4SJ2eCZhgiszKKr7lcjUF6RyqoFad:sS8t4eCwQKr764cyqaad
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
MultiByteToWideChar
SizeofResource
LockResource
LoadResource
FindResourceW
SetLastError
GetLastError
WideCharToMultiByte
GetSystemDefaultLCID
GetSystemTime
FindFirstFileW
FindClose
FileTimeToSystemTime
CloseHandle
GetCommandLineW
Sleep
GetCurrentProcessId
DeleteFileW
GetModuleFileNameW
CreateDirectoryW
CreateMutexW
WaitForSingleObject
ReleaseMutex
GetProcAddress
GetModuleHandleW
SetFileAttributesW
FindNextFileW
RemoveDirectoryW
CopyFileW
CreateFileW
GetFileTime
SystemTimeToTzSpecificLocalTime
GetTempPathW
GetExitCodeProcess
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
GetTickCount
CreateThread
FormatMessageW
CreateEventW
OpenEventW
HeapFree
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
GetStdHandle
FileTimeToLocalFileTime
FlushFileBuffers
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
SystemTimeToFileTime
AllocConsole
WriteConsoleW
GetComputerNameW
GetSystemInfo
GetVersionExW
GetTimeZoneInformation
VirtualProtect
VirtualQuery
FreeLibrary
LoadLibraryExA
GlobalAlloc
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
LocalFree
MulDiv
GetCurrentThread
LoadLibraryExW
GlobalDeleteAtom
lstrcmpA
lstrcmpW
CompareStringA
OutputDebugStringA
FreeResource
GetModuleHandleExW
LoadLibraryW
CreateActCtxW
ActivateActCtx
DeactivateActCtx
FindActCtxSectionStringW
QueryActCtxW
SetEvent
SetThreadPriority
ResumeThread
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GlobalAddAtomW
LocalAlloc
EncodePointer
GetSystemDirectoryW
GlobalFindAtomW
GlobalGetAtomNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetCurrentDirectoryW
CompareStringW
GetLocaleInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GlobalFlags
GetFileSize
GetFullPathNameW
GetVolumeInformationW
LockFile
UnlockFile
DuplicateHandle
GetCurrentProcess
lstrcmpiW
GetFileAttributesW
GetFileAttributesExW
GetFileSizeEx
lstrcpyW
SetErrorMode
GetWindowsDirectoryW
FindResourceExW
VerSetConditionMask
VerifyVersionInfoW
GetTempFileNameW
GetProfileIntW
SearchPathW
GetUserDefaultLCID
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ResetEvent
WaitForSingleObjectEx
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
FindFirstFileExW
GetOEMCP
IsValidCodePage
GetConsoleCP
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
GetDateFormatW
ReadConsoleW
GetConsoleMode
SetFilePointerEx
ExitProcess
QueryPerformanceFrequency
VirtualAlloc
GetFileType
SetStdHandle
HeapQueryInformation
FreeLibraryAndExitThread
ExitThread
GetCommandLineA
GetACP
RtlUnwindEx
RtlPcToFileHeader
lstrlenW
lstrcatW
WinExec
GetCPInfo
GetStringTypeW
LCMapStringW
OutputDebugStringW
DocumentPropertiesW
OpenPrinterW
ClosePrinter
abs
sin
ceil
floor
cos
sqrt
toupper
isupper
islower
tolower
wcspbrk
memcmp
labs
__C_specific_handler
_strnicmp
strlen
wcslen
_wtol
iswdigit
wcsncmp
wcsncpy
memcpy
wcstombs
mbstowcs
wcsncat
wcsrchr
LdrUnloadDll
LdrGetProcedureAddress
LdrLoadDll
RtlInitString
RtlInitUnicodeString
atoi
wcscspn
wcsspn
wcschr
iswspace
atol
_wcsicmp
_wtoi
isdigit
strchr
isspace
strncmp
isalpha
wcsstr
memmove
strrchr
towlower
towupper
iswalpha
memset
wcscmp
strcmp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ