C:\Users\sungeun\svn\free_formed_data\trunk\windows\ffdp\x64\Debug\ffdpcmd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_9b9c037d4eea4ecb931ce58de092937e_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_9b9c037d4eea4ecb931ce58de092937e_ryuk.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_9b9c037d4eea4ecb931ce58de092937e_ryuk
-
Size
1.9MB
-
MD5
9b9c037d4eea4ecb931ce58de092937e
-
SHA1
917544a84ed72e84264bd78f9996b52ef549ee5c
-
SHA256
6750af690b81883587ec403e047a8890b4d186230d028dd791d36d1eaed6e3c1
-
SHA512
2fdc9bd4e42e783e6ff2cc7d686f362b30ce4817eb33c8b7f14b3023404414dd4600a783b061338a6203540f12085a5896d82eb06fb1174fb4f1026c79a481d3
-
SSDEEP
24576:/TQ9e3Bm5mjPnxelAxm40J75MqmUeEDLq8oKx7aTUGOBRcsXbk/Ya70dpkbI6NyW:/Dw5m7nxrxm40IEPqF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-23_9b9c037d4eea4ecb931ce58de092937e_ryuk
Files
-
2024-02-23_9b9c037d4eea4ecb931ce58de092937e_ryuk.exe windows:6 windows x64 arch:x64
c9236aba9483ff4068583a892942f2d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
lstrlenW
LoadLibraryW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
TerminateThread
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFullPathNameW
GetTempPathW
GetExitCodeProcess
GetSystemDirectoryW
GetWindowsDirectoryW
lstrcmpiW
CreateMailslotW
WideCharToMultiByte
DeleteFileW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
SetFileAttributesW
GetCurrentProcess
GetCurrentThread
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrcpyW
lstrcatW
CopyFileW
MoveFileExW
GetLogicalDriveStringsW
TlsFree
CreateSemaphoreW
GetProcAddress
FreeLibrary
GetVersionExW
GetExitCodeThread
OpenEventW
ReleaseSemaphore
DeviceIoControl
QueryDosDeviceW
GetDriveTypeW
CreateFileW
FormatMessageW
LocalFree
GetModuleFileNameW
OpenProcess
TerminateProcess
GetCurrentThreadId
GetCurrentProcessId
GetFileAttributesExW
GetDiskFreeSpaceW
CreateThread
CreateEventW
CreateMutexW
WaitForSingleObject
ReleaseMutex
SetEvent
GetSystemInfo
VirtualFree
VirtualAlloc
SetLastError
CloseHandle
GetLastError
WriteFile
ReadFile
MultiByteToWideChar
GetModuleHandleW
SetEndOfFile
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
HeapQueryInformation
HeapReAlloc
GetStringTypeW
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
InitializeCriticalSectionAndSpinCount
GetTickCount
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
LoadLibraryExW
EncodePointer
GetStdHandle
GetFileType
GetModuleFileNameA
GetModuleHandleExW
WriteConsoleW
GetConsoleMode
ReadConsoleInputW
SetConsoleMode
HeapSize
HeapValidate
ExitProcess
GetCommandLineA
GetCommandLineW
GetACP
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
SetConsoleCtrlHandler
GetDateFormatW
ReadConsoleW
advapi32
GetSecurityDescriptorLength
ReportEventW
RegisterEventSourceW
DeregisterEventSource
StartServiceW
QueryServiceStatus
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
InitiateSystemShutdownW
LookupPrivilegeNameW
LookupPrivilegeValueW
FreeSid
EqualSid
AdjustTokenPrivileges
OpenThreadToken
RegOpenKeyW
RegEnumKeyExW
LsaNtStatusToWinError
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
GetTokenInformation
OpenProcessToken
shell32
SHFileOperationW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
setupapi
SetupDiGetActualSectionToInstallW
SetupDiSetClassInstallParamsW
SetupDiGetDeviceInstallParamsW
SetupDiSetDeviceRegistryPropertyW
SetupDiGetDeviceRegistryPropertyW
SetupDiCallClassInstaller
SetupDiGetINFClassW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdW
SetupDiCreateDeviceInfoW
SetupDiCreateDeviceInfoList
SetupIterateCabinetW
SetupGetSourceInfoW
SetupGetSourceFileLocationW
SetupGetIntField
SetupGetStringFieldW
SetupFindNextLine
SetupFindFirstLineW
SetupCloseInfFile
SetupOpenInfFileW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 375KB - Virtual size: 375KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ