C:\Projects\DTTrunk\ui\Helper\x64\Release\DTHelper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_cdd6b5d72e19e230735a30c906d4760c_ryuk.exe
Resource
win7-20240221-en
General
-
Target
2024-03-11_cdd6b5d72e19e230735a30c906d4760c_ryuk
-
Size
1.6MB
-
MD5
cdd6b5d72e19e230735a30c906d4760c
-
SHA1
d8602058b745ca463aae77edc810d0c6a4ee4988
-
SHA256
358abfa881bafdfc9d4454e43284ef48b89e9d3881907ebafb99b8b4d11df541
-
SHA512
da55892810ae5ae45f6c7ee24a1297fc3fcbfbe838c5a8bad5b437a71c84cabe78f3656ba21c20f34c7cf185d220049316e7c39ab25b9a1894c3ec1737ea5d6e
-
SSDEEP
24576:XsY3SYvT0Djsf9nz4mloFQnpXUMPQDR6q79dA:T3S1DYf5zaCpXxPuR6E9dA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-11_cdd6b5d72e19e230735a30c906d4760c_ryuk
Files
-
2024-03-11_cdd6b5d72e19e230735a30c906d4760c_ryuk.exe windows:6 windows x64 arch:x64
4a9299e4b66a563289f9776eeca3c433
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
VerSetConditionMask
FindClose
FindNextFileW
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
GetExitCodeProcess
GetSystemTimeAsFileTime
LocalFree
DeleteCriticalSection
VerifyVersionInfoW
MultiByteToWideChar
WideCharToMultiByte
FindResourceW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetLastError
RaiseException
FindResourceExW
InitializeCriticalSectionEx
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
LoadLibraryW
GetModuleHandleW
FreeLibrary
WaitForSingleObject
GetModuleFileNameW
WriteFile
CloseHandle
DisconnectNamedPipe
ReadFile
CreateFileW
WaitNamedPipeW
GetProcAddress
LCMapStringW
GetStringTypeW
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
SetLastError
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RtlUnwindEx
TlsAlloc
user32
DestroyWindow
AllowSetForegroundWindow
LoadIconW
SendMessageW
CreateWindowExW
MessageBoxW
advapi32
GetTokenInformation
OpenProcessToken
RegCloseKey
RegSetValueExW
RegCreateKeyExW
SystemFunction036
shell32
ord680
ShellExecuteExW
SHChangeNotify
ole32
CoCreateInstance
CoInitializeSecurity
oleaut32
SysFreeString
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.3MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE