D:\Projects\Model Repos\Models\Battelle.TRA.HazardModels.MedMit.ITRA\Development\x64\Release\MedMitEntryTest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_ca58335271b395e6febcf3c7e83fed87_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_ca58335271b395e6febcf3c7e83fed87_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_ca58335271b395e6febcf3c7e83fed87_ryuk
-
Size
367KB
-
MD5
ca58335271b395e6febcf3c7e83fed87
-
SHA1
9c19ed56687c7e49701aca8f7d251f6078993215
-
SHA256
80ed917a13ce55e4120c5675dbd23f0bec2ce23953597e5a6914e4bacecc6a3f
-
SHA512
cd7153c26e926412d2077e720eddeb5fbdd972e51189ded75a6f7b59a5ec6a346f862e25e7129ca4bbf3ea41f030048d6b9d1e1170f626ca1cff8d3de8684411
-
SSDEEP
6144:KIEraCnl2cf7ubhyeynsIX9/cxLUfo7hjeND7FohfvV8nuaCH:KIE2i0cf7uWsIX9/noFvVl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-27_ca58335271b395e6febcf3c7e83fed87_ryuk
Files
-
2024-03-27_ca58335271b395e6febcf3c7e83fed87_ryuk.exe windows:6 windows x64 arch:x64
416163ecbc7f35f9dd386d1b0e8bb710
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
rmath
runif
set_seed
kernel32
RtlCaptureContext
ReadConsoleW
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
GetModuleFileNameW
ReadFile
WriteFile
CreateFileW
GetLastError
CloseHandle
SetLastError
SetEndOfFile
GetProcAddress
FindNextFileA
FindClose
LoadLibraryA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
HeapSize
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RaiseException
RtlUnwindEx
FreeLibrary
LoadLibraryExW
SetStdHandle
GetFileType
QueryPerformanceFrequency
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetProcessHeap
FindFirstFileExA
Sections
.text Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ