Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-27_21a5ec2f23052da392b684c0c46885a1_ryuk_sliver.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-27_21a5ec2f23052da392b684c0c46885a1_ryuk_sliver.exe
Resource
win10v2004-20240226-en
Target
2024-02-27_21a5ec2f23052da392b684c0c46885a1_ryuk_sliver
Size
15.6MB
MD5
21a5ec2f23052da392b684c0c46885a1
SHA1
cb4fe2704c5e0d5b4dfd04621bc030feb92869bc
SHA256
2fd6718d0d0ef0b8d2478a20b6f90577cc327c1c41f1adc9ee06b2c65f851a82
SHA512
cf8db8d97d28250494fcdca66e99feed43067eb64e18f372447ab5af74967528967a3cb75d5f4815c8f5afe5250eef4337f453c979bc3f8b5248b7a8bbc1e129
SSDEEP
196608:V9xAt8357lrMuQLzwGbsRSggLFltykofRt1Sl9edtn+a9nBnR:V9xk8xOuEhbsRSggL/t3ofR6GdtnFnL
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
E:\Adlice\RogueKillerCMD\x64\RelWithDebInfo\roguekillercmd.pdb
GetFileType
GetVolumeInformationW
GetVolumePathNameW
QueryDosDeviceW
ReadFile
SetFilePointerEx
GetVolumeNameForVolumeMountPointW
lstrcmpiW
lstrlenW
IsBadReadPtr
IsBadWritePtr
lstrcmpA
lstrcpyW
RaiseException
CreateThread
OpenThread
WriteProcessMemory
CreateRemoteThread
Module32FirstW
Module32NextW
K32GetModuleInformation
DefineDosDeviceW
SetErrorMode
GetSystemTimes
GetSystemInfo
FormatMessageW
SetHandleInformation
PeekNamedPipe
CreateNamedPipeW
CancelIo
RtlCaptureContext
GetEnvironmentVariableW
OutputDebugStringA
GetVersionExA
GetModuleFileNameA
SetFilePointer
LoadLibraryExW
GlobalAlloc
GlobalFree
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
SwitchToFiber
DeleteFiber
CreateFiber
QueryPerformanceCounter
GetSystemTimeAsFileTime
ConvertFiberToThread
ConvertThreadToFiber
LoadLibraryA
ReadConsoleA
ReadConsoleW
FormatMessageA
InitializeCriticalSectionEx
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
CreateFileMappingA
SwitchToThread
GetDriveTypeW
GetDiskFreeSpaceW
FlushFileBuffers
LocalAlloc
DeviceIoControl
GetTickCount
GetVersionExW
VerSetConditionMask
SetThreadUILanguage
SetThreadLocale
GetThreadLocale
GetUserGeoID
GetGeoInfoW
GetLocaleInfoW
GetModuleFileNameW
Sleep
LoadLibraryW
LockFileEx
UnlockFile
HeapCompact
DeleteFileA
FlushViewOfFile
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapValidate
UnlockFileEx
InitializeCriticalSection
LockFile
AreFileApisANSI
VirtualQueryEx
CreateFileA
CreateMutexW
HeapCreate
GetFileSize
GetTickCount64
GetPrivateProfileStringW
HeapDestroy
FindResourceW
SizeofResource
LockResource
LoadResource
GetFileSizeEx
OutputDebugStringW
FreeLibrary
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetComputerNameW
GetSystemDirectoryW
GetTempPathW
GetTempFileNameW
DeleteCriticalSection
TryEnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjects
CreateEventW
ResetEvent
SetEvent
GetProcessHeap
HeapFree
HeapAlloc
Thread32Next
Thread32First
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
K32GetProcessImageFileNameW
K32GetModuleFileNameExW
K32GetModuleBaseNameW
TerminateJobObject
AssignProcessToJobObject
CreateJobObjectW
GetModuleHandleA
ReadProcessMemory
OpenProcess
GetProcessId
CreateProcessW
TerminateThread
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
GetProcessTimes
WaitForSingleObject
SetLastError
GetTimeFormatW
GetDateFormatW
SystemTimeToFileTime
FileTimeToSystemTime
TzSpecificLocalTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetSystemTime
CompareFileTime
CreateConsoleScreenBuffer
WriteConsoleW
SetConsoleMode
ReadConsoleInputW
GetNumberOfConsoleInputEvents
GetConsoleMode
SetConsoleWindowInfo
SetConsoleCursorInfo
SetConsoleCursorPosition
SetConsoleScreenBufferSize
SetConsoleActiveScreenBuffer
GetConsoleCursorInfo
CloseHandle
FillConsoleOutputCharacterW
WriteConsoleOutputW
ReadConsoleOutputW
WriteFile
MoveFileExW
MoveFileW
CopyFileW
SetFileAttributesW
RemoveDirectoryW
GetFileTime
GetFileAttributesExW
GetFileAttributesW
FindNextFileW
FindFirstFileW
CreateDirectoryW
BackupSeek
BackupRead
GetProcAddress
GetModuleHandleW
FindClose
DeleteFileW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
HeapSize
SetEndOfFile
GetFullPathNameA
SetStdHandle
CreateProcessA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
GetACP
GetCommandLineA
HeapReAlloc
FreeLibraryAndExitThread
ExitThread
ExitProcess
InterlockedPushEntrySList
RtlUnwindEx
RtlPcToFileHeader
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
CompareStringW
GetCPInfo
DecodePointer
EncodePointer
GetStringTypeW
CreateFileW
WideCharToMultiByte
MultiByteToWideChar
GetShortPathNameW
GetLongPathNameW
GetFullPathNameW
GetCurrentDirectoryW
ExpandEnvironmentStringsW
LocalFree
GetCommandLineW
SetConsoleCtrlHandler
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
GetStdHandle
GetLastError
VerifyVersionInfoA
CharNextW
LoadStringW
GetProcessWindowStation
SystemParametersInfoW
GetSystemMetrics
GetClassNameW
EnumChildWindows
FindWindowA
GetWindowTextW
IsWindowVisible
SendMessageW
GetWindowThreadProcessId
EnumWindows
GetUserObjectInformationW
MessageBoxW
SendMessageA
ord51
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
CoSetProxyBlanket
CoTaskMemFree
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
SysFreeString
SysStringLen
VariantInit
VariantClear
VarUI4FromStr
SysAllocString
ConvertSidToStringSidW
GetSecurityInfo
CreateProcessAsUserW
OpenProcessToken
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegQueryInfoKeyW
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
LookupAccountNameW
GetLengthSid
CopySid
ConvertStringSidToSidW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
GetExplicitEntriesFromAclW
RegSetKeySecurity
RegGetKeySecurity
LookupAccountSidW
IsValidSid
GetAce
SetEntriesInAclW
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
StartServiceW
SetServiceObjectSecurity
QueryServiceStatusEx
QueryServiceStatus
QueryServiceConfig2W
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
EnumServicesStatusW
EnumDependentServicesW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
RegQueryValueExW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetUserNameW
RegSetValueExW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
StrCmpIW
PathAppendW
PathCommonPrefixW
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathGetArgsW
PathGetDriveNumberW
PathIsDirectoryW
PathIsPrefixW
PathIsRelativeW
PathIsNetworkPathW
PathQuoteSpacesW
PathRemoveArgsW
PathRemoveBackslashW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
PathSearchAndQualifyW
PathUnquoteSpacesW
PathUnExpandEnvStringsW
StrFormatByteSizeW
AssocQueryStringW
StrDupW
PathAddBackslashW
NtUnloadDriver
NtLoadDriver
NtDeleteKey
RtlInitUnicodeString
RtlLookupFunctionEntry
RtlVirtualUnwind
NtDeleteValueKey
NtOpenKey
NtQuerySystemInformation
NtQueryKey
NtCreateKey
NtSetValueKey
InternetGetConnectedState
CreateEnvironmentBlock
GetProfilesDirectoryW
DestroyEnvironmentBlock
CryptCATAdminReleaseContext
WinVerifyTrust
CryptCATAdminAcquireContext
CryptCATAdminCalcHashFromFileHandle
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminReleaseCatalogContext
WNetGetConnectionW
WTSQueryUserToken
WTSEnumerateSessionsW
sendto
recvfrom
htonl
select
__WSAFDIsSet
htons
getpeername
socket
setsockopt
gethostname
connect
closesocket
bind
accept
WSASetLastError
send
recv
WSAGetLastError
WSACleanup
shutdown
ntohs
getsockopt
getsockname
inet_ntoa
listen
WSAStartup
BCryptDestroyHash
BCryptDeriveKeyPBKDF2
BCryptEncrypt
BCryptGenRandom
BCryptFinishHash
BCryptHashData
BCryptCreateHash
BCryptDestroyKey
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptGetProperty
BCryptSetProperty
freeaddrinfo
getaddrinfo
getnameinfo
inet_pton
WSAIoctl
CryptQueryObject
CertGetNameStringW
CertNameToStrW
CertFreeCertificateContext
CertOpenStore
CertCloseStore
CryptMsgGetParam
CryptMsgClose
CryptDecodeObject
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertFindCertificateInStore
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ