C:\Users\Administrator\AppData\Local\Jenkins.jenkins\workspace\Framework\Source\Framework\x64\BuildServer\Launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_158aaaa85ea9380e23b1a1969ebe3874_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_158aaaa85ea9380e23b1a1969ebe3874_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_158aaaa85ea9380e23b1a1969ebe3874_ryuk
-
Size
1.4MB
-
MD5
158aaaa85ea9380e23b1a1969ebe3874
-
SHA1
965ac10b66758366685211919e0ed122aca4fbc5
-
SHA256
e4acda76083a4c880fc50a7eefc3c10fcd5f39bf5ef3fa3e3a2f95c00d423029
-
SHA512
d27e44e456ab9ffc57a873e3a5e2c9414355358ba705b9c9fbe471c1b49b2a12fc5a0622f8dc76b4fd491c279bfa91c09cbbddee4af5f6a80327dbe576a8a0cb
-
SSDEEP
24576:xc7GqE6DzMgIWQs3UR1g9BgXHjaOh+PBuK:xc7LEN9s3Mg9BgzaOgPX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-27_158aaaa85ea9380e23b1a1969ebe3874_ryuk
Files
-
2024-01-27_158aaaa85ea9380e23b1a1969ebe3874_ryuk.exe windows:6 windows x64 arch:x64
9870a5a5fc0b7f9cbf93192e671a9885
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d11
D3D11CreateDevice
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
CloseServiceHandle
ControlService
ConvertSidToStringSidA
GetTokenInformation
IsValidSid
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
RegCloseKey
RegCreateKeyW
RegDeleteTreeW
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegOpenKeyExW
RegQueryInfoKeyA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
kernel32
AddVectoredExceptionHandler
AllocConsole
CloseHandle
CompareStringW
CreateEventA
CreateEventExA
CreateEventW
CreateFileA
CreateFileW
CreateProcessW
CreateThread
CreateToolhelp32Snapshot
DecodePointer
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExitThread
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FreeConsole
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStringsW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileSizeEx
GetFileType
GetLastError
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDEPPolicy
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetSystemWow64DirectoryA
GetTempPathW
GetThreadTimes
GetUserDefaultLCID
GetVolumeInformationW
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
K32EnumDeviceDrivers
K32GetDeviceDriverBaseNameA
K32GetDeviceDriverFileNameW
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LocalFree
Module32First
Module32Next
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
ProcessIdToSessionId
QueryDosDeviceA
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
RemoveVectoredExceptionHandler
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
shell32
ShellExecuteA
shlwapi
PathCanonicalizeA
PathCanonicalizeW
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
comdlg32
GetOpenFileNameW
user32
CloseClipboard
CreateWindowExA
CreateWindowExW
DefWindowProcA
DestroyWindow
DispatchMessageA
EnumWindows
ExitWindowsEx
GetClientRect
GetClipboardData
GetDC
GetDesktopWindow
GetDlgItem
GetKeyNameTextA
GetMessageA
GetRawInputData
GetTopWindow
GetWindow
GetWindowLongPtrA
GetWindowRect
GetWindowTextA
GetWindowThreadProcessId
LoadCursorA
LoadIconA
MapVirtualKeyA
MessageBoxA
MessageBoxW
MoveWindow
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassExW
ReleaseDC
ScreenToClient
SendMessageA
SetForegroundWindow
SetProcessDPIAware
SetTimer
SetWindowLongPtrA
SetWindowPos
SetWindowTextA
ShowCursor
ShowWindow
ShowWindowAsync
TranslateMessage
UnregisterClassW
UpdateWindow
gdi32
GetDeviceCaps
GetStockObject
api-ms-win-shcore-scaling-l1-1-1
SetProcessDpiAwareness
ws2_32
WSACleanup
WSAGetLastError
WSAStartup
__WSAFDIsSet
closesocket
connect
getaddrinfo
ioctlsocket
recv
select
send
socket
dxgi
CreateDXGIFactory1
dbghelp
SymGetSymFromAddr64
SymInitialize
SymSetOptions
dwmapi
DwmExtendFrameIntoClientArea
setupapi
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
oleaut32
SysAllocString
SysFreeString
VariantClear
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ