D:\C-DEV\QLSI\bin\Intel C++ Compiler 16.0\Release\x64\SPM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_bea8b278d86bc6480b446481db1c11a2_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_bea8b278d86bc6480b446481db1c11a2_ryuk.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_bea8b278d86bc6480b446481db1c11a2_ryuk
-
Size
497KB
-
MD5
bea8b278d86bc6480b446481db1c11a2
-
SHA1
b70e24ae4b6feeb619b7d13f1b0ec8e0214921bb
-
SHA256
722ec0fab8ca24148b8d2df11f90b6c9cdc73c497df9312803b2f0f88c854245
-
SHA512
6800b137eb50e488ee6f53ee841c6418c101f3a60671e6bba6b0c948888f5e718a3252f6f19466798746133c1efa41a083a93dbe37363a06d35e411b954290db
-
SSDEEP
12288:/i3NryTVfB7KnDULYD8EM3quGfOlfBKCYuktLMEr:/i3ZmlB7KnDULYD8EM3e0fBKCYukLME
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-22_bea8b278d86bc6480b446481db1c11a2_ryuk
Files
-
2024-02-22_bea8b278d86bc6480b446481db1c11a2_ryuk.exe windows:6 windows x64 arch:x64
1a217bcffffc7b7954bcb38ce6160c65
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
libiomp5md
ord120
ord110
wsock32
WSAStartup
WSACleanup
inet_addr
bind
getsockname
listen
socket
gethostbyname
connect
send
__WSAFDIsSet
select
WSAGetLastError
recv
accept
setsockopt
getpeername
gethostname
shutdown
closesocket
kernel32
RaiseException
ReadConsoleW
ReadFile
SetEndOfFile
HeapReAlloc
HeapSize
CreateFileW
WriteConsoleW
SetFilePointerEx
SetStdHandle
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
CreateThread
WaitForSingleObjectEx
OutputDebugStringW
SetConsoleCtrlHandler
GetCommandLineW
GetCommandLineA
GetProcessHeap
Sleep
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
FormatMessageA
LoadLibraryA
GetThreadLocale
InitializeCriticalSection
LoadLibraryExA
LeaveCriticalSection
GetProcAddress
GetModuleHandleExA
GetEnvironmentVariableA
EnterCriticalSection
RtlUnwindEx
GetLastError
GetModuleFileNameW
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetModuleFileNameA
GetACP
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetCurrentThread
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CloseHandle
GetStringTypeW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
ws2_32
getaddrinfo
freeaddrinfo
advapi32
SystemFunction036
Sections
.text Size: 382KB - Virtual size: 382KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug_o Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ