H:\BuildBot\orx-slave\orx\tutorial\bin\04_Anim.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_e537914727b9378e463bdd3b1141e528_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_e537914727b9378e463bdd3b1141e528_ryuk.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_e537914727b9378e463bdd3b1141e528_ryuk
-
Size
90KB
-
MD5
e537914727b9378e463bdd3b1141e528
-
SHA1
d06a18e94ca1362ad3b249053a1d2ad84094f96b
-
SHA256
4b6677a3d16a1971ed13e7c60f6428f6d83fe6dfd20f50afe87b658bc222831a
-
SHA512
2ef7816f47e9dcbdff812f4b4b77bbdac615e4d1733e0bbc9a6587881e1443814e43474ecf2d86f7c48ffb6a0a3ff1cb2d9bed348eca6c71627d6a40530d81fc
-
SSDEEP
1536:UbvQomoY+GgpabmzdAUKRWekDupS4fQ6GwWpof0UVksWWRaYdc9dl3FePms:UbvrmoY+GgJzheWnuw4fQ6GV+0UVHTUM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-22_e537914727b9378e463bdd3b1141e528_ryuk
Files
-
2024-02-22_e537914727b9378e463bdd3b1141e528_ryuk.exe windows:6 windows x64 arch:x64
9498ea51ec8afbdfb441925639dc5ed8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
orx
orxViewport_CreateFromConfig
orxObject_GetName
orxObject_SetTargetAnim
orxObject_GetScale
orxObject_SetScale
orxObject_CreateFromConfig
orxParam_SetArgs
orxEvent_Send
orxEvent_RemoveHandler
orxEvent_AddHandler
orxInput_GetBindingName
orxInput_GetBinding
orxInput_IsActive
orxClock_FindFirst
orxClock_Register
orxClock_Update
orxSystem_GetVersionNumeric
orxSystem_GetVersionFullString
_orxDebug_GetFlags
_orxDebug_SetFlags
_orxDebug_Log
_orxDebug_Exit
_orxDebug_Init
orxModule_Exit
orxModule_Init
orxModule_AddOptionalDependency
orxModule_AddDependency
orxModule_Register
kernel32
TlsFree
RaiseException
CreateFileW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
GetStringTypeW
GetFileType
SetStdHandle
LCMapStringW
CompareStringW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwindEx
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
CloseHandle
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ