Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_f69faa63c07f9db84a1c09f5a359dcaa_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_f69faa63c07f9db84a1c09f5a359dcaa_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_f69faa63c07f9db84a1c09f5a359dcaa_ryuk
-
Size
246KB
-
MD5
f69faa63c07f9db84a1c09f5a359dcaa
-
SHA1
9a5425fbf98ea48fc958573b52af13e5cddf2c89
-
SHA256
f663943b1596b5a8665d1bb3776b6a4c889320ba5ab2f217a5938af67e401883
-
SHA512
0b1af426784b07144bb436694439442c6108c1ab3ba0a90bf13c825c4d58ecf96b097359ef6d9b4679bfb3f9a715859888c94642ec62beddf4b87a47d773df0e
-
SSDEEP
6144:tlEs0Obb4pxpbM2VSOEaPwOLdwhSb/Enq6u:tlE2b4pxdM2hFZi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-04_f69faa63c07f9db84a1c09f5a359dcaa_ryuk
Files
-
2024-02-04_f69faa63c07f9db84a1c09f5a359dcaa_ryuk.exe windows:6 windows x64 arch:x64
6b5da2a06d654e094e84f2d2f4b9e432
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
LoadIconA
LoadCursorA
MessageBoxA
SetWindowTextA
ShowWindow
CreateWindowExA
RegisterClassExA
PostQuitMessage
DefWindowProcA
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
kernel32
CreateFileW
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
FindNextFileA
FindFirstFileExA
GetProcAddress
OpenProcess
TerminateProcess
CreateThread
Sleep
CloseHandle
MapViewOfFile
CreateFileMappingA
GetModuleHandleA
CreateToolhelp32Snapshot
Process32Next
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RaiseException
RtlUnwindEx
GetLastError
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameA
GetACP
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCommandLineA
GetCommandLineW
FindClose
advapi32
SystemFunction036
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ