C:\b\c\b\win_archive\src\out\Release\nacl_win64\nacl64.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_9786ac9dbf7b7c966de53c3e3edb9b35_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-04_9786ac9dbf7b7c966de53c3e3edb9b35_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_9786ac9dbf7b7c966de53c3e3edb9b35_ryuk
-
Size
5.0MB
-
MD5
9786ac9dbf7b7c966de53c3e3edb9b35
-
SHA1
a81176fc8d887db4129b9b9c5357295034dde3cc
-
SHA256
dcb1b1b9946bfb288ebf48a55277028e9a7ba976372a632a849adbd1d37635ea
-
SHA512
9b09efeea271c143155695dfa0584351cf5681a6a90b606c875698625a8b71ba6a1c23e12646b05676ab88102b2c8e1dfcaed9023e080bd7277cb39bf87f4702
-
SSDEEP
49152:4ysxHMW6nW3mumWlUnJlT83+vDWSz3EEJMShUNtMUrbBunts8JckcDrdypBvFS/3:UmnzvKhEGSCNtMUrbByP2PFkIofY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-04_9786ac9dbf7b7c966de53c3e3edb9b35_ryuk
Files
-
2024-02-04_9786ac9dbf7b7c966de53c3e3edb9b35_ryuk.exe windows:5 windows x64 arch:x64
7730b48e1650ac28d876f26706080a13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
SystemFunction036
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
dbghelp
SymGetSearchPathW
SymInitialize
SymGetLineFromAddr64
SymSetOptions
SymFromAddr
SymSetSearchPathW
gdi32
GetOutlineTextMetricsW
GdiFlush
GetTextFaceW
ExtTextOutW
CreateDIBSection
SetWorldTransform
GetTextMetricsW
SetTextAlign
SetTextColor
SetGraphicsMode
CreateCompatibleDC
CreateFontIndirectW
DeleteDC
DeleteObject
EnumFontFamiliesExW
GetCharABCWidthsW
GetFontData
GetGlyphOutlineW
GetFontUnicodeRanges
GetGlyphIndicesW
GetTextExtentPointI
AddFontMemResourceEx
RemoveFontMemResourceEx
SelectObject
SetBkMode
kernel32
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCommandLineA
TransactNamedPipe
DuplicateHandle
GetCurrentProcess
GetStdHandle
GetLongPathNameW
CloseHandle
GetLastError
SetLastError
ResumeThread
IsProcessInJob
QueryInformationJobObject
GetModuleFileNameW
GetModuleHandleW
GetModuleHandleExW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
DebugActiveProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
CreateNamedPipeW
WaitNamedPipeW
LocalFree
ConnectNamedPipe
ExitProcess
GetModuleHandleA
FormatMessageW
VirtualFree
UnmapViewOfFile
GetSystemInfo
VirtualAlloc
VirtualProtect
CreateEventW
ContinueDebugEvent
WaitForDebugEvent
SetEvent
TerminateProcess
SuspendThread
GetThreadContext
SetThreadContext
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
ReadFile
WriteFile
SetHandleInformation
OpenProcess
GetCurrentThread
GetProcAddress
SetThreadPriority
VirtualQuery
GetCommandLineW
GetCurrentDirectoryW
DeleteFileW
OutputDebugStringA
GetTickCount
FormatMessageA
GetProcessId
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetThreadPriority
GetSystemTimeAsFileTime
QueryThreadCycleTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
SystemTimeToFileTime
WaitForSingleObject
GetExitCodeProcess
IsDebuggerPresent
RaiseException
CreateThread
CreateProcessW
AssignProcessToJobObject
SetInformationJobObject
AttachConsole
AllocConsole
FreeLibrary
LoadLibraryW
lstrcmpiA
GetVersionExW
GetNativeSystemInfo
HeapSetInformation
GetProcessTimes
CreateFileMappingW
MapViewOfFile
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableSRW
ResetEvent
WaitForMultipleObjects
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
GetThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateDirectoryW
GetFileAttributesW
GetFileAttributesExW
QueryDosDeviceW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
MoveFileExW
GetUserDefaultLangID
ExpandEnvironmentStringsW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
GetSystemPowerStatus
FlushFileBuffers
GetFileInformationByHandle
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
SetFileTime
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
UnregisterWaitEx
RegisterWaitForSingleObject
ReleaseSRWLockShared
AcquireSRWLockShared
GetModuleHandleExA
RtlAddFunctionTable
RtlDeleteFunctionTable
CreateRemoteThread
GetSystemDirectoryW
GetWindowsDirectoryW
GetNamedPipeInfo
CancelIo
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
InitOnceExecuteOnce
RtlVirtualUnwind
VirtualProtectEx
QueryFullProcessImageNameW
InitializeCriticalSection
DeleteCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualAllocEx
VirtualFreeEx
CreateJobObjectW
DebugBreak
lstrlenW
SearchPathW
WideCharToMultiByte
GetEnvironmentVariableW
SetEnvironmentVariableW
OutputDebugStringW
MultiByteToWideChar
GetLocaleInfoW
GetTimeZoneInformation
CreateFileA
ReleaseSemaphore
CreateSemaphoreW
FlushInstructionCache
LockFileEx
UnlockFileEx
MapViewOfFileEx
SwitchToThread
GetThreadTimes
GetSystemTime
DisconnectNamedPipe
SetNamedPipeHandleState
PeekNamedPipe
GetNamedPipeHandleStateW
IsValidCodePage
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
FreeLibraryAndExitThread
ExitThread
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetACP
GetFullPathNameA
GetFullPathNameW
GetConsoleMode
GetConsoleCP
SetStdHandle
GetDriveTypeW
GetProcessHeap
LoadLibraryExW
RtlPcToFileHeader
RtlUnwindEx
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GetStringTypeW
ole32
CoUninitialize
CoInitializeEx
CoTaskMemFree
CoCreateGuid
psapi
GetMappedFileNameW
shell32
CommandLineToArgvW
SHGetKnownFolderPath
SHGetFolderPathW
user32
wsprintfW
MessageBoxW
DefWindowProcW
UnregisterClassW
RegisterClassExW
CreateWindowExW
DestroyWindow
CloseDesktop
CloseWindowStation
CreateDesktopW
GetThreadDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
SystemParametersInfoW
usp10
ScriptFreeCache
ScriptItemize
ScriptShape
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
winmm
timeGetTime
timeEndPeriod
timeGetDevCaps
timeBeginPeriod
ws2_32
setsockopt
send
select
recv
ntohs
listen
htons
shutdown
getsockname
closesocket
bind
accept
socket
gethostbyname
WSAGetLastError
WSACloseEvent
WSACreateEvent
WSAEventSelect
WSAStartup
htonl
WSACleanup
userenv
DestroyEnvironmentBlock
GetProfileType
CreateEnvironmentBlock
Exports
Exports
ClearBreakpadPipeEnvironmentVariable
ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
GetHandleVerifier
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
RegisterNonABICompliantCodeRange
SetCrashKeyValueImpl
TerminateProcessWithoutDump
UnregisterNonABICompliantCodeRange
_ovly_debug_event
nacl_global_xlate_base
nacl_thread_ids
nacl_user
Sections
.text Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 25B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ