Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_242f9c642b5a0138ee92ea36577a1cf1_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_242f9c642b5a0138ee92ea36577a1cf1_ryuk.exe
Resource
win10v2004-20240221-en
Target
2024-02-23_242f9c642b5a0138ee92ea36577a1cf1_ryuk
Size
669KB
MD5
242f9c642b5a0138ee92ea36577a1cf1
SHA1
94f7ac636a98b79e80cb9c007527d35cb1d6a076
SHA256
8038f9935a18f629ca3e6080099985a1770a3c74e07915180d6c7f344166f12d
SHA512
6308c74c0b36a3a7f98b1665b3f4405b971f7ef724f60617919b146dccc9652312d94ad953b7c8038f46e162304551a67ea0624f7a730d1bfdbab384d3237668
SSDEEP
12288:wu/SNaAOBWJhP9owHv2lsmox2+Ig4vUXkSndYFptOcuLg:JfFkJhP9nlf7IUXkSniFf
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PathFileExistsW
GetCurrentProcessId
GetCurrentThreadId
GetLastError
WaitForSingleObject
WriteFile
ReadFile
FindClose
GetModuleHandleW
CreateProcessW
GetTempPathW
CreateDirectoryW
CreateFileW
DeleteFileW
FindNextFileW
CopyFileW
MoveFileExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
GetCurrentProcess
Process32NextW
SetUnhandledExceptionFilter
ReleaseMutex
CreateMutexW
OutputDebugStringW
GetSystemDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetProcessHeap
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
HeapReAlloc
HeapFree
HeapAlloc
OpenProcess
LocalFree
LocalAlloc
SetEndOfFile
GlobalFree
GlobalAlloc
WritePrivateProfileStringW
GetPrivateProfileStringW
GetModuleFileNameW
LoadLibraryW
CloseHandle
GetProcAddress
FreeLibrary
SetStdHandle
WriteConsoleW
ReadConsoleW
HeapSize
Process32FirstW
LoadLibraryExW
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
RtlVirtualUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
wsprintfW
RegCreateKeyExW
RegDeleteValueW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ImpersonateLoggedOnUser
RevertToSelf
SHGetFolderPathW
SHGetSpecialFolderPathW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ