Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_6cdd3a8c463f5f870e81ba0e6696ac1d_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_6cdd3a8c463f5f870e81ba0e6696ac1d_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_6cdd3a8c463f5f870e81ba0e6696ac1d_ryuk
-
Size
224KB
-
MD5
6cdd3a8c463f5f870e81ba0e6696ac1d
-
SHA1
c4e6b573b76b5bd8dbd028f397c58a208862030d
-
SHA256
3a8042f38dcb5d7bc0778ba9108f6d1408df3962ff9944e5a9a3ac7fe86de218
-
SHA512
4bb2f6705dac69e31eb7ed7a072625904bfaf8369f9b09b066fbde12a97fda0ae37d42ff377d178598ea4430def71b96568c3e51a54c42d21044163aebe481cb
-
SSDEEP
3072:nR0ake2ZWuw8nEhKYAQvlg8JVT2+Sj9Ho14j+xJQOUQPxbYjmt5qwqpM8s9Ov:Wc2ZZ1YXlZDTB2ZoWjuJR1JbYgIOnu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-15_6cdd3a8c463f5f870e81ba0e6696ac1d_ryuk
Files
-
2024-03-15_6cdd3a8c463f5f870e81ba0e6696ac1d_ryuk.exe windows:5 windows x64 arch:x64
5e8c3ca43e69f86835683a7555790257
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CopyFileA
MultiByteToWideChar
WideCharToMultiByte
SetEndOfFile
WriteConsoleW
HeapReAlloc
DeleteFileA
GetTimeZoneInformation
GetFileSizeEx
ReadConsoleW
ReadFile
DeleteFileW
GetProcessHeap
SetCurrentDirectoryA
GetTempPathA
WritePrivateProfileStringA
GetModuleFileNameA
GetTickCount
Sleep
HeapSize
GetLastError
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
WriteFile
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
MoveFileExW
SetFilePointerEx
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
GetFullPathNameW
SetStdHandle
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
RaiseException
shell32
FindExecutableW
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
user32
EnumWindows
GetWindowTextA
ole32
CoCreateInstance
CoInitialize
advapi32
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ