C:\b\c\b\win_x64_archive\src\out\Release_x64\initialexe\chrome.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_33655ff0018cf981da7c2bf5631e448a_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_33655ff0018cf981da7c2bf5631e448a_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_33655ff0018cf981da7c2bf5631e448a_ryuk
-
Size
3.5MB
-
MD5
33655ff0018cf981da7c2bf5631e448a
-
SHA1
2f1ad5a9abdf9a964bf74bcee770e4d7053f3ad8
-
SHA256
381f531910839ded20ad0e060ef5a661d7df3bb4fc651b5019a116be7082e55b
-
SHA512
fa4aa59aca4653b1587a5bf1a2a8216f5131ffc2c07f236b8686fdd68e083bad6a72da771cdadd47f9bf454c0f3f3e48089c14647fd9ed7620f9281d9f7ae295
-
SSDEEP
49152:u8v72BDg78l86jytWuMo7bFdM3A/KW+SoWRMaTSDjKS5XHiWtA5OzKWBNnqtVKlg:ABb86MWro/FdM3A/4jWvig
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-29_33655ff0018cf981da7c2bf5631e448a_ryuk
Files
-
2024-02-29_33655ff0018cf981da7c2bf5631e448a_ryuk.exe windows:5 windows x64 arch:x64
b5cc74d8b6b30bf098fe81432fef2d17
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
chrome_elf
SignalChromeElf
advapi32
ImpersonateNamedPipeClient
GetUserNameW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
SystemFunction036
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
gdi32
CreateFontIndirectW
DeleteDC
DeleteObject
EnumFontFamiliesExW
GetCharABCWidthsW
GetFontData
GetGlyphOutlineW
GetOutlineTextMetricsW
GetFontUnicodeRanges
GetGlyphIndicesW
GetTextExtentPointI
AddFontMemResourceEx
RemoveFontMemResourceEx
SelectObject
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
GetTextMetricsW
SetWorldTransform
CreateDIBSection
ExtTextOutW
GetTextFaceW
GdiFlush
CreateCompatibleDC
kernel32
GetProcAddress
GetLastError
SetLastError
CreateEventW
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetComputerNameExW
ExitProcess
GetCurrentDirectoryW
CreateFileW
DeleteFileW
WriteFile
OutputDebugStringA
CloseHandle
GetCurrentProcessId
GetTickCount
GetModuleFileNameW
GetModuleHandleA
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
LocalFree
GetModuleHandleW
ExpandEnvironmentStringsW
GetVersionExW
GetNativeSystemInfo
TerminateProcess
GetExitCodeProcess
OpenProcess
FlushFileBuffers
GetFileInformationByHandle
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
GetProcessTimes
GetSystemInfo
VirtualQueryEx
IsDebuggerPresent
RaiseException
CreateThread
VirtualQuery
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateDirectoryW
GetFileAttributesW
GetLongPathNameW
FormatMessageA
QueryDosDeviceW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
MoveFileW
ReplaceFileW
UnregisterWaitEx
RegisterWaitForSingleObject
GetUserDefaultLangID
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetThreadId
HeapSetInformation
GetModuleHandleExW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetEvent
SetInformationJobObject
ResetEvent
CompareStringW
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
GetLocaleInfoW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
GetThreadLocale
GetTimeZoneInformation
ReleaseSemaphore
CreateSemaphoreW
TerminateJobObject
GetUserDefaultLCID
WriteProcessMemory
AssignProcessToJobObject
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
QueryFullProcessImageNameW
VirtualAllocEx
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
CreateProcessW
ReadProcessMemory
DebugBreak
lstrlenW
SearchPathW
VirtualProtect
LoadLibraryExA
Wow64GetThreadContext
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetVersion
DisconnectNamedPipe
ConnectNamedPipe
UnlockFileEx
LockFileEx
GetUserDefaultUILanguage
ResumeThread
GetEnvironmentVariableW
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetStdHandle
GetACP
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
GetProcessHeap
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
GetCPInfo
GetStringTypeW
LCMapStringW
EncodePointer
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetSystemDefaultLCID
psapi
GetMappedFileNameW
shell32
SHGetKnownFolderPath
SHGetSpecialFolderPathW
CommandLineToArgvW
SHGetFolderPathW
user32
FindWindowExW
GetWindowThreadProcessId
SendMessageTimeoutW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
SystemParametersInfoW
IsWindow
AllowSetForegroundWindow
usp10
ScriptShape
ScriptItemize
ScriptFreeCache
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winmm
timeGetTime
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
rpcrt4
UuidCreate
winhttp
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryHeaders
WinHttpReadData
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 463KB - Virtual size: 462KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ