/proc/self/cwd/blaze-out/win_x64-opt/bin/apps/drive/fs/distribution/win/installer/GoogleDriveFSSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_730bb7c131546083dc73141990f51950_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-01_730bb7c131546083dc73141990f51950_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-01_730bb7c131546083dc73141990f51950_ryuk
-
Size
7.9MB
-
MD5
730bb7c131546083dc73141990f51950
-
SHA1
3311082d8fc79560d1bb6fe62e50eb1e748b9bbf
-
SHA256
c7c7574924114a8927826297106c3ef1470f1bea218e0b9c0ebeecf25c85096f
-
SHA512
65dcae02d207ec7fe1ddd0ab69c25e25dea3e66bf199f489ca32cf7d30e7b5ddf83c5db42914dc4b395412fccb3ac5dc29b1daed7fceb410de56c91dcdeb3c4e
-
SSDEEP
98304:KonNNy5LzVX1IY5x0O3g7dHyq0BrPoVCSdHiXUxVuEbWhlohOu2Yzm8TF+5RSCl9:pQZD/oNdHiXUxVuEbWhlogu2YzlFEB3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-01_730bb7c131546083dc73141990f51950_ryuk
Files
-
2024-02-01_730bb7c131546083dc73141990f51950_ryuk.exe windows:6 windows x64 arch:x64
fb8e0ee4349b2d9e4c808f4b9e46a3c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
comctl32
InitCommonControlsEx
shell32
CommandLineToArgvW
SHGetKnownFolderPath
SHLoadNonloadedIconOverlayIdentifiers
shlwapi
PathCombineW
PathFileExistsW
PathFindFileNameA
PathIsDirectoryW
StrCmpIW
advapi32
AdjustTokenPrivileges
CloseServiceHandle
ControlService
CreateServiceW
ImpersonateLoggedOnUser
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
OpenServiceW
QueryServiceStatus
RegCloseKey
RegCreateKeyExW
RegDeleteKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegGetValueW
RegLoadKeyW
RegOpenKeyExA
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RegUnLoadKeyW
RevertToSelf
StartServiceW
kernel32
AcquireSRWLockExclusive
CloseHandle
CompareStringW
CreateDirectoryW
CreateEventW
CreateFileA
CreateFileMappingW
CreateFileW
CreateProcessW
CreateThread
CreateToolhelp32Snapshot
DecodePointer
DeleteCriticalSection
DeleteFileW
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FindResourceW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FlushInstructionCache
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableA
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoEx
GetLocaleInfoW
GetLogicalProcessorInformation
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetTickCount64
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetUserPreferredUILanguages
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeConditionVariable
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
InitializeSRWLock
InterlockedPopEntrySList
InterlockedPushEntrySList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadResource
LockResource
MapViewOfFile
MoveFileExW
MulDiv
MultiByteToWideChar
OpenProcess
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
Process32FirstW
Process32NextW
PulseEvent
QueryFullProcessImageNameW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ReleaseSRWLockExclusive
RemoveDirectoryW
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SetFilePointerEx
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SleepConditionVariableSRW
SwitchToThread
SystemTimeToTzSpecificLocalTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
WaitForSingleObject
WaitForSingleObjectEx
WakeAllConditionVariable
WakeConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrlenW
user32
AdjustWindowRectEx
CallWindowProcW
CheckDlgButton
DefWindowProcW
DialogBoxParamW
DispatchMessageA
DispatchMessageW
DrawTextW
EnableWindow
EndDialog
GetActiveWindow
GetClientRect
GetDC
GetDlgCtrlID
GetDlgItem
GetFocus
GetMenu
GetMessageA
GetMessageW
GetSysColor
GetSystemMetrics
GetWindowLongPtrW
GetWindowLongW
GetWindowRect
GetWindowTextW
IsDlgButtonChecked
IsWindow
IsWindowUnicode
LoadBitmapW
MapWindowPoints
MessageBoxW
MoveWindow
MsgWaitForMultipleObjectsEx
PeekMessageW
PostMessageW
ReleaseDC
ScreenToClient
SendMessageW
SetDlgItemTextW
SetFocus
SetRect
SetWindowLongPtrW
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassW
WaitForInputIdle
ole32
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
gdi32
AddFontMemResourceEx
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectW
DPtoLP
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectW
GetStockObject
GetTextExtentPoint32W
GetTextMetricsW
RemoveFontMemResourceEx
SelectObject
SetBkMode
SetTextColor
StretchBlt
setupapi
InstallHinfSectionW
SetupCloseInfFile
SetupFindFirstLineW
SetupGetStringFieldW
SetupOpenInfFileW
newdev
DiInstallDriverW
dbghelp
SymFromAddr
Exports
Exports
uprv_getICUData_bcp47
uprv_getICUData_currmeta
uprv_getICUData_custom
uprv_getICUData_matcher
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gxfg Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 441B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
flags_he Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
malloc_h Size: 1024B - Virtual size: 655B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
protodes Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168.2MB - Virtual size: 168.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ