Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_4df9b76724d525170deded024ecffcd0_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_4df9b76724d525170deded024ecffcd0_ryuk.exe
Resource
win10v2004-20240221-en
Target
2024-02-25_4df9b76724d525170deded024ecffcd0_ryuk
Size
1.1MB
MD5
4df9b76724d525170deded024ecffcd0
SHA1
69de31c6010e0cb7e54197d5aa49a3c0b639f465
SHA256
11981dfffe077b7c079b5666727c4b9901f332bc5c07b1f2f2856d41ac9389e9
SHA512
35f23369d23c6a50ba8f80eb25787f25f9542666c5cf3523378f9d9f55708267a0455c5e39f4a770016d8d51e6619eb3012159daf49130add6a7d9b43ab3ca34
SSDEEP
24576:xSdhdGSkESwRX2o6wmBdDEw1d9YBYvxD+tsImw6LHHY:k3dxSir6wmBdDrQBqD+yIOY
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\b\build\slave\win64-pgo\build\src\out\Release_x64\initialexe\chrome.exe.pdb
SignalChromeElf
SignalInitializeCrashReporting
ImpersonateNamedPipeClient
GetUserNameW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegQueryInfoKeyW
RegCloseKey
SystemFunction036
RegDisablePredefinedCache
RevertToSelf
GetLengthSid
SetKernelObjectSecurity
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetKernelObjectSecurity
SetSecurityInfo
OpenProcessToken
ConvertStringSidToSidW
SetTokenInformation
GetAce
GetSecurityDescriptorSacl
ConvertSidToStringSidW
CreateProcessAsUserW
SetThreadToken
GetTokenInformation
DuplicateTokenEx
DuplicateToken
CreateRestrictedToken
EqualSid
LookupPrivilegeValueW
CopySid
CreateWellKnownSid
GetSecurityInfo
SetEntriesInAclW
GetModuleHandleA
GetProcAddress
SetLastError
GetCurrentThreadId
CreateEventW
GetLastError
GetCurrentProcess
GetProcessId
WaitForSingleObject
DuplicateHandle
SetProcessShutdownParameters
SetCurrentDirectoryW
LoadLibraryExW
VirtualFree
VirtualAlloc
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetComputerNameExW
GetModuleHandleW
GetVersionExW
GetNativeSystemInfo
ExpandEnvironmentStringsW
GetCommandLineW
LocalFree
Sleep
FileTimeToSystemTime
QueryPerformanceFrequency
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
CreateFileW
DeleteFileW
CloseHandle
GetCurrentDirectoryW
GetCurrentProcessId
FormatMessageA
GetTickCount
TerminateProcess
OpenProcess
GetExitCodeProcess
ReadFile
GetFileSizeEx
SetEndOfFile
GetFileInformationByHandle
SetFilePointerEx
FlushFileBuffers
RaiseException
CreateThread
IsDebuggerPresent
GetSystemInfo
GetProcessTimes
VirtualQueryEx
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetUserDefaultLangID
RegisterWaitForSingleObject
UnregisterWaitEx
CreateDirectoryW
QueryDosDeviceW
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
UnmapViewOfFile
SetFileAttributesW
ReplaceFileW
CreateFileMappingW
MapViewOfFile
MoveFileW
GetThreadId
GetSystemDefaultLCID
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
GetModuleHandleExW
HeapSetInformation
SizeofResource
LockResource
LoadResource
FindResourceW
FindFirstFileW
FindFirstFileExW
FindNextFileW
FindClose
VirtualQuery
LoadLibraryW
SetEvent
ResetEvent
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
CompareStringW
InitializeCriticalSectionAndSpinCount
DecodePointer
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
LockFileEx
GetFileType
GetUserDefaultLCID
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
TerminateJobObject
SetHandleInformation
GetProcessHandleCount
SignalObjectAndWait
ProcessIdToSessionId
WriteProcessMemory
AssignProcessToJobObject
VirtualProtectEx
QueryFullProcessImageNameW
VirtualAllocEx
VirtualFreeEx
CreateProcessW
CreateRemoteThread
CreateJobObjectW
CreateNamedPipeW
CreateMutexW
lstrlenW
DebugBreak
ReadProcessMemory
SearchPathW
VirtualProtect
FreeLibrary
LoadLibraryExA
GetThreadContext
SuspendThread
Wow64GetThreadContext
CreateSemaphoreW
ReleaseSemaphore
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
ConnectNamedPipe
GetVersion
DisconnectNamedPipe
GetUserDefaultUILanguage
ResumeThread
GetEnvironmentVariableW
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
WriteConsoleW
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
GetStdHandle
ExitProcess
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
GetProcessHeap
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
GetThreadLocale
UnlockFileEx
RtlCaptureContext
GetMappedFileNameW
SHGetFolderPathW
ShellExecuteExW
SHGetKnownFolderPath
SHGetSpecialFolderPathW
CommandLineToArgvW
FindWindowExW
GetThreadDesktop
CreateDesktopW
SetProcessWindowStation
GetProcessWindowStation
CreateWindowStationW
CloseWindowStation
CloseDesktop
GetWindowThreadProcessId
AllowSetForegroundWindow
SendMessageTimeoutW
IsWindow
GetUserObjectInformationW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
timeGetTime
WTSFreeMemory
WTSQuerySessionInformationW
UuidCreate
CreateEnvironmentBlock
DestroyEnvironmentBlock
WinHttpConnect
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpReadData
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ