C:\Jenkins\workspace\3DxWinCore-branches-17-4\demo\puzzle\bin\win64x64\release\puzzle.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_28773f4d05236f1e9027926090c4688f_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_28773f4d05236f1e9027926090c4688f_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_28773f4d05236f1e9027926090c4688f_ryuk
-
Size
299KB
-
MD5
28773f4d05236f1e9027926090c4688f
-
SHA1
ec2067d9e844852767e19408a704b6198cbf3319
-
SHA256
fee7ff5016e358716f528b6a88fc79075615c0fb6f7e534087996b560acc4a86
-
SHA512
f973902723ff3434b3bc88789a009cf48363cb1721095ed92369343c10e84e9cf1d05400cbea358665a8640999983efbbf66dbf6ff2d7192812fa357d3fc0c97
-
SSDEEP
6144:+wN0irwsD9QFN8WdplWcSwi7F/1zTB9H:H0iksDuFHAVxH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-09_28773f4d05236f1e9027926090c4688f_ryuk
Files
-
2024-03-09_28773f4d05236f1e9027926090c4688f_ryuk.exe windows:6 windows x64 arch:x64
4cde215534737c9dc0fb22014811fd93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
gdi32
BitBlt
GetStockObject
CreateCompatibleDC
CreatePen
MoveToEx
LineTo
Polygon
CreateCompatibleBitmap
CreateSolidBrush
DeleteObject
SelectObject
Rectangle
kernel32
GetLastError
InitializeCriticalSectionEx
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
GetModuleHandleW
SetLastError
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
ExitProcess
CloseHandle
CreateFileW
FreeLibrary
LoadLibraryW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
SetStdHandle
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
LCMapStringW
GetFileType
GetACP
WriteFile
GetStdHandle
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
GetModuleHandleExW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwindEx
RtlPcToFileHeader
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WriteConsoleW
CreateEventW
DecodePointer
RaiseException
DeleteCriticalSection
SetEvent
GetCommandLineA
GetCurrentProcess
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
user32
PostThreadMessageW
CreateWindowExW
DestroyWindow
SendMessageW
SetWindowTextW
UpdateWindow
ShowWindow
SetClassLongPtrW
RegisterClassW
PostQuitMessage
wsprintfW
DispatchMessageW
TranslateMessage
GetMessageW
LoadCursorW
DefWindowProcW
LoadIconW
GetDesktopWindow
InvalidateRect
EndPaint
BeginPaint
GetWindowRect
ole32
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ