C:\Users\docker\Documents\workspace\build-v2\common\hrkill\bin\usysdiag-helper-x64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_810cbd9531257a31559bac9de9be80d3_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_810cbd9531257a31559bac9de9be80d3_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_810cbd9531257a31559bac9de9be80d3_ryuk
-
Size
451KB
-
MD5
810cbd9531257a31559bac9de9be80d3
-
SHA1
bb1b1b7313afde614b24b85384070a8709a87072
-
SHA256
73fa079ef73ab53a048dfedaa3eed77104dd67aab4bd4dcebf55126b0c3aa29a
-
SHA512
46611a2cb9d580d97a804adc3f75cae50d4ef63c8b63ea69f1882d2531fa6669ce6f9254af92e8ba1dffbc0eceb147308cd0bfe90c66399a43568d015a20d013
-
SSDEEP
12288:agf0zQ1P33Q2Dx6ra86eRgC7CwBGmdFGe:/4Q1PHQza86EgC7CwBGIFh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-13_810cbd9531257a31559bac9de9be80d3_ryuk
Files
-
2024-02-13_810cbd9531257a31559bac9de9be80d3_ryuk.exe windows:5 windows x64 arch:x64
60d1eea8d98155fcb71a3e7a4edc00a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
CreateToolhelp32Snapshot
GetCommandLineW
WaitForSingleObject
CreateThread
ExitProcess
SetProcessWorkingSetSize
TlsSetValue
HeapFree
SetLastError
InitializeCriticalSectionAndSpinCount
GetQueuedCompletionStatus
LocalAlloc
GetCurrentThreadId
HeapSize
PostQueuedCompletionStatus
GetExitCodeThread
GetLastError
SetEvent
TlsAlloc
HeapReAlloc
RaiseException
GetSystemInfo
ResetEvent
HeapAlloc
DecodePointer
HeapDestroy
GetProcessHeap
Module32First
TlsFree
CreateEventA
CreateIoCompletionPort
VirtualQuery
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
OutputDebugStringA
SetConsoleCtrlHandler
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
Module32Next
VirtualQueryEx
OpenThread
TerminateThread
TerminateProcess
FreeLibrary
LoadLibraryA
GetCurrentDirectoryW
CreateFileA
GetCurrentDirectoryA
SetFilePointer
WriteFile
SearchPathW
ExpandEnvironmentStringsA
ReadFile
DeviceIoControl
IsBadReadPtr
SearchPathA
CreateFileW
GetProcAddress
GetModuleHandleA
GetTickCount
WideCharToMultiByte
DeleteCriticalSection
LocalFree
GetWindowsDirectoryW
CloseHandle
Sleep
MultiByteToWideChar
OpenProcess
InitializeCriticalSection
LeaveCriticalSection
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
GetCurrentProcess
GetLongPathNameW
EnterCriticalSection
VirtualAlloc
VirtualFree
VirtualProtect
GetFileAttributesA
TlsGetValue
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlPcToFileHeader
EncodePointer
RtlUnwindEx
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
GetCommandLineA
ExitThread
ResumeThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
GetACP
GetStringTypeW
GetCurrentThread
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
ReadConsoleW
user32
EnumDesktopWindows
GetParent
GetWindowRect
UnregisterClassA
OpenDesktopA
EnumWindowStationsA
GetWindowThreadProcessId
IsWindowVisible
CloseWindowStation
EnumDesktopsA
CloseDesktop
OpenWindowStationA
advapi32
RegSetValueExA
RegOpenKeyW
ConvertSidToStringSidW
OpenProcessToken
RegCloseKey
RegEnumKeyExA
RegQueryValueExW
RegSaveKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetSidSubAuthorityCount
GetSidSubAuthority
GetUserNameW
LookupAccountNameW
GetSidIdentifierAuthority
BuildExplicitAccessWithNameA
SetSecurityDescriptorDacl
SetEntriesInAclA
GetSecurityDescriptorDacl
RegGetKeySecurity
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetKeySecurity
RegSetValueExW
RegLoadKeyA
InitializeSecurityDescriptor
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
GetTokenInformation
shell32
CommandLineToArgvW
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
crypt32
CryptQueryObject
CertCloseStore
CryptMsgGetParam
CertFindCertificateInStore
CertGetNameStringW
CertFreeCertificateContext
CryptMsgClose
Sections
.text Size: 322KB - Virtual size: 321KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ