C:\Users\sungeun\svn\free_formed_data\trunk\windows\ffdp\x64\Debug\ffdpcmd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_2a179c6055be32dbe3131630a1bc8112_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_2a179c6055be32dbe3131630a1bc8112_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_2a179c6055be32dbe3131630a1bc8112_ryuk
-
Size
1.8MB
-
MD5
2a179c6055be32dbe3131630a1bc8112
-
SHA1
48c085eeef3b2b5154513fe84a91c2cf7accd8ca
-
SHA256
fc2eb76ed92c44390ec6fc724aeb8f1df8de60bbc567b048e5a17c398ab784b3
-
SHA512
b807e6d2601fe7fc87da60055f6dedfd14c1ef33e67aa6209ec0924fea13f5e925ac6be3fce6fa5ba3dcbfb9e576a9791266c8700730687979884c09c7d00b38
-
SSDEEP
24576:BnEBvzhv3KYABCV2oiu9DBzHk6KwOjzJiXTUGOBRcDXbk/Ya70dpkbI6Ny+htxTt:Bn8v3FABCV2T96KwO3Ue
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-14_2a179c6055be32dbe3131630a1bc8112_ryuk
Files
-
2024-03-14_2a179c6055be32dbe3131630a1bc8112_ryuk.exe windows:6 windows x64 arch:x64
7276242096fe3a74b22e1dec36beb9ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
lstrcmpiW
lstrlenW
LoadLibraryW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
CreateEventW
Sleep
TerminateThread
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFullPathNameW
GetTempPathW
GetExitCodeProcess
GetProcAddress
GetWindowsDirectoryW
GetModuleHandleW
CreateMailslotW
WideCharToMultiByte
DeleteFileW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
SetFileAttributesW
GetCurrentProcess
GetCurrentThread
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrcpyW
lstrcatW
CopyFileW
MoveFileExW
GetLogicalDriveStringsW
TlsFree
CreateSemaphoreW
FreeLibrary
GetVersionExW
GetExitCodeThread
CreateThread
OpenEventW
ReleaseSemaphore
DeviceIoControl
QueryDosDeviceW
GetDriveTypeW
CreateFileW
FormatMessageW
LocalFree
GetModuleFileNameW
OpenProcess
TerminateProcess
GetProcessHeap
HeapFree
HeapAlloc
GetCurrentThreadId
GetCurrentProcessId
CreateMutexW
WaitForSingleObject
ReleaseMutex
GetFileAttributesExW
GetDiskFreeSpaceW
GetSystemInfo
VirtualFree
GetLastError
VirtualAlloc
SetLastError
CloseHandle
WriteFile
ReadFile
MultiByteToWideChar
GetSystemDirectoryW
SetEndOfFile
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
HeapQueryInformation
HeapReAlloc
GetStringTypeW
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
VirtualQuery
InitializeCriticalSectionAndSpinCount
GetTickCount
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
LoadLibraryExW
EncodePointer
GetStdHandle
GetFileType
GetModuleFileNameA
GetModuleHandleExW
WriteConsoleW
GetConsoleMode
ReadConsoleInputW
SetConsoleMode
HeapSize
HeapValidate
ExitProcess
GetCommandLineA
GetCommandLineW
GetACP
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
SetConsoleCtrlHandler
GetDateFormatW
ReadConsoleW
advapi32
QueryServiceConfigW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetSecurityDescriptorLength
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
InitiateSystemShutdownW
LookupPrivilegeNameW
LookupPrivilegeValueW
FreeSid
EqualSid
AdjustTokenPrivileges
OpenThreadToken
RegOpenKeyW
RegEnumKeyExW
LsaNtStatusToWinError
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
GetTokenInformation
OpenProcessToken
shell32
SHFileOperationW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
setupapi
SetupDiGetActualSectionToInstallW
SetupDiSetClassInstallParamsW
SetupDiGetDeviceInstallParamsW
SetupDiSetDeviceRegistryPropertyW
SetupDiGetDeviceRegistryPropertyW
SetupDiCallClassInstaller
SetupDiGetINFClassW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdW
SetupDiCreateDeviceInfoW
SetupDiCreateDeviceInfoList
SetupIterateCabinetW
SetupGetSourceInfoW
SetupGetSourceFileLocationW
SetupGetIntField
SetupGetStringFieldW
SetupFindNextLine
SetupFindFirstLineW
SetupCloseInfFile
SetupOpenInfFileW
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 365KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ