E:\GIT\VROC_FWUpdateTool_V1.0.2_Reference\x64\MUP_Release\MUP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_d732cc1b9f976027ddc500002e57d4ed_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_d732cc1b9f976027ddc500002e57d4ed_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_d732cc1b9f976027ddc500002e57d4ed_ryuk
-
Size
2.6MB
-
MD5
d732cc1b9f976027ddc500002e57d4ed
-
SHA1
af3b92141f2910bcef9372ecb955e7a5c58c1335
-
SHA256
84661db49e35191e084190dc4eae97e5ee7088f431f9f9a2d99f43232b74f8cf
-
SHA512
3814ca40b067ac01153177bc7ff3aee352620bdd5dccb63e3b04b4f8c3c6a930125ce659ef95f001383b3b8cefe49c98875a5fdb2039086f012528eb236e9040
-
SSDEEP
24576:1rBCQZ9c2Oyd+XGBhfZgU2odXfiAXF4BiG4HrQhE/g43FKrfa5TO4J9QOPr2:1rBc08WTqzot/cS/pafgO4T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-10_d732cc1b9f976027ddc500002e57d4ed_ryuk
Files
-
2024-03-10_d732cc1b9f976027ddc500002e57d4ed_ryuk.exe windows:6 windows x64 arch:x64
f3fdbbf614b82c891d38deaaa4dd966a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCurrentProcess
FileTimeToLocalFileTime
GetFileAttributesExW
GetFileSizeEx
SystemTimeToTzSpecificLocalTime
GetUserDefaultLCID
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
WriteFile
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
GetFileType
EnumSystemLocalesW
IsValidLocale
ExitProcess
GetStdHandle
HeapQueryInformation
GetCommandLineA
RtlUnwindEx
RtlPcToFileHeader
GetCPInfo
LCMapStringW
GetStringTypeW
OutputDebugStringW
SetEndOfFile
GetVolumeInformationW
GetFullPathNameW
FlushFileBuffers
FindFirstFileW
FindClose
FileTimeToSystemTime
DeleteFileW
GlobalFlags
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
CompareStringW
GetCurrentProcessId
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
CreateEventW
SetEvent
LocalReAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FormatMessageW
GlobalFree
GlobalUnlock
GlobalFindAtomW
GlobalAddAtomW
GetProcAddress
GetSystemDirectoryW
EncodePointer
SetErrorMode
FindResourceW
lstrcmpW
lstrcmpA
GlobalDeleteAtom
GlobalLock
GlobalAlloc
SizeofResource
LockResource
LoadResource
LoadLibraryExW
FreeLibrary
GetVersionExW
GetCurrentThreadId
GetCurrentThread
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
LoadLibraryW
GetModuleHandleExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetLastError
OutputDebugStringA
GetACP
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
HeapFree
GetCommandLineW
GetModuleHandleW
LocalAlloc
LocalFree
MultiByteToWideChar
ReadFile
CloseHandle
GetLastError
DeviceIoControl
ReadConsoleW
CreateFileW
WriteConsoleW
user32
CheckMenuItem
SetWindowTextW
IsWindowEnabled
ShowWindow
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetLastActivePopup
GetTopWindow
GetClassNameW
GetClassLongPtrW
SetWindowLongPtrW
GetWindowLongPtrW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
EnableMenuItem
AdjustWindowRectEx
GetWindowRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
UpdateWindow
GetMenuItemCount
GetMenuItemID
GetSubMenu
MessageBoxW
wsprintfW
SetMenu
GetMenu
EnableWindow
GetCapture
GetKeyState
GetFocus
GetDlgCtrlID
GetDlgItem
IsIconic
IsWindowVisible
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetMenuItemInfoW
LoadBitmapW
GetMessageW
TranslateMessage
GetActiveWindow
GetCursorPos
SetCursor
ScreenToClient
GetWindowThreadProcessId
GetClientRect
SetRectEmpty
OffsetRect
GetParent
PostMessageW
PostQuitMessage
SendMessageW
GetScrollPos
GetWindowTextW
GetWindowLongW
GetWindow
RegisterWindowMessageW
DispatchMessageW
PeekMessageW
GetMessagePos
GetMessageTime
DefWindowProcW
CallWindowProcW
RegisterClassW
GetClassInfoW
GetClassInfoExW
CreateWindowExW
IsWindow
IsMenu
DestroyWindow
SetWindowPos
LoadCursorW
GetSysColorBrush
ClientToScreen
RealChildWindowFromPoint
SetTimer
KillTimer
InvalidateRect
DrawTextW
DrawTextExW
GrayStringW
TabbedTextOutW
GetDC
ReleaseDC
GetSystemMetrics
DestroyMenu
CharUpperW
GetForegroundWindow
gdi32
DeleteDC
Escape
GetClipBox
GetStockObject
PtVisible
RectVisible
RestoreDC
SaveDC
SelectObject
SetMapMode
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteObject
CreateBitmap
GetDeviceCaps
SetBkColor
SetTextColor
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteW
shlwapi
PathFindFileNameW
PathIsUNCW
PathStripToRootW
PathFindExtensionW
ole32
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
SysAllocString
VariantInit
VariantClear
VariantChangeType
SysFreeString
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetDevicePropertyW
SetupDiGetDeviceInterfaceDetailW
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 379KB - Virtual size: 378KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gehcont Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ