E:\B\T\5bc3d680-27b3-4503-acd6-978c38c16475\UBF_1\build\x64\Release\McAWFwk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_7f495109a5c5f330f5b84443baacffe6_ryuk.exe
Resource
win7-20240215-en
General
-
Target
2024-03-12_7f495109a5c5f330f5b84443baacffe6_ryuk
-
Size
1.1MB
-
MD5
7f495109a5c5f330f5b84443baacffe6
-
SHA1
ed48bd531d2fb09d94159a238c30e917c4e9dc8e
-
SHA256
a0620dd879128bb8b781a6642d11a9182e040bca416a5d41749732ec7e11ba7e
-
SHA512
64d32368f67cc1d5b7b107ec039986593d56277a5beda816f90c93f0794641032d0f1c4d9d6a0b3f160001ca8b99dce38b9239700ff7aab6241b081c66e257a2
-
SSDEEP
24576:+H2scOT2GvaeNFgIdEFLEj4jft2rR8FfBhRJUEbDk1ulUE:+WscOTpvtyKExXt2r4PRSEk1ul
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-12_7f495109a5c5f330f5b84443baacffe6_ryuk
Files
-
2024-03-12_7f495109a5c5f330f5b84443baacffe6_ryuk.exe windows:6 windows x64 arch:x64
3b02054fc33146cc8532afca2bee9555
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
psapi
GetModuleInformation
EnumProcessModules
GetModuleFileNameExW
wintrust
WinVerifyTrust
crypt32
CryptMsgUpdate
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertGetCertificateChain
CryptQueryObject
CertGetNameStringW
CertGetCertificateContextProperty
CertFreeCertificateContext
CryptDecodeObject
CryptMsgOpenToDecode
CryptMsgClose
CryptMsgGetParam
CertCloseStore
CertGetSubjectCertificateFromStore
kernel32
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
GetCurrentThreadId
CloseHandle
GetLastError
CreateMutexW
GetModuleFileNameW
SetEvent
CreateEventW
OpenEventW
LocalFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetLongPathNameW
Sleep
GetVersionExW
FormatMessageW
DecodePointer
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
CreateThread
LoadLibraryExW
InitializeCriticalSectionEx
SetLastError
QueryFullProcessImageNameW
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentProcessId
OpenProcess
GetWindowsDirectoryW
GlobalFindAtomW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetFullPathNameW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentDirectoryW
OutputDebugStringW
LocalAlloc
CreateFileW
LockFileEx
UnlockFileEx
GlobalAddAtomW
CopyFileW
MoveFileW
MoveFileExW
ReplaceFileW
DeleteFileA
SetFileAttributesA
GetTempPathA
GetTempFileNameA
VirtualQuery
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
FindClose
FindFirstFileW
RemoveDirectoryW
ReleaseMutex
WriteFile
SetFilePointer
GetFileAttributesW
GetLocalTime
GetModuleHandleExW
VerifyVersionInfoW
VerSetConditionMask
lstrlenW
WritePrivateProfileStringW
WritePrivateProfileStructW
CreateDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
EncodePointer
RtlPcToFileHeader
IsDebuggerPresent
SetEndOfFile
WriteConsoleW
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
GetStdHandle
ExitProcess
GetFileType
GetConsoleCP
ReadConsoleW
GetConsoleMode
ReadFile
SetFilePointerEx
VirtualAlloc
RtlUnwindEx
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
GetSystemInfo
VirtualProtect
LoadLibraryExA
RtlCaptureContext
user32
CreateWindowExW
TranslateMessage
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjectsEx
DefWindowProcW
RegisterClassW
DestroyWindow
shell32
SHGetKnownFolderPath
CommandLineToArgvW
SHCreateDirectoryExW
ole32
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CLSIDFromString
StringFromGUID2
CoUninitialize
CoRegisterClassObject
CoRevokeClassObject
StringFromCLSID
CoTaskMemFree
CoGetClassObject
oleaut32
CreateStdDispatch
LoadTypeLi
VariantInit
SysAllocString
VARIANT_UserFree
VARIANT_UserUnmarshal
VARIANT_UserMarshal
VARIANT_UserSize
shlwapi
PathFileExistsA
PathAddExtensionA
PathRemoveFileSpecW
PathStripToRootW
PathFindFileNameA
PathAppendW
PathFileExistsW
PathQuoteSpacesW
SHDeleteKeyW
PathRemoveExtensionA
PathRemoveFileSpecA
PathFindExtensionW
rpcrt4
NdrStubForwardingFunction
NdrStubCall2
NdrCStdStubBuffer2_Release
NdrCStdStubBuffer_Release
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
NdrOleFree
NdrOleAllocate
IUnknown_QueryInterface_Proxy
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_CountRefs
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Disconnect
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_QueryInterface
Sections
.text Size: 335KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE