C:\b\c\b\win_x64_archive\src\out\Release_x64\initialexe\chrome.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_87c4e5b74e2790ce325e7f8302038125_ryuk.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-09_87c4e5b74e2790ce325e7f8302038125_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_87c4e5b74e2790ce325e7f8302038125_ryuk
-
Size
1.1MB
-
MD5
87c4e5b74e2790ce325e7f8302038125
-
SHA1
b3964c18871bddab578c646bdb9814d6068d3d5a
-
SHA256
097fd0f7cd78398c1fd934d318910ae1505a0971608dcebabf9aaeb81511c932
-
SHA512
49a329c38c6e0475ad3bc0701f894e217c5e33f23929de17453fc259dff1c23862e9695aade3b151c50294e9b2fef94b2c2b4408812974fb7021fe3211a5450c
-
SSDEEP
24576:3T2X9R7gmVRkGB9H8XEWjn40C4F4lbilS5H3:DE9R7gmVRkGB9H5Qug4lbilO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-09_87c4e5b74e2790ce325e7f8302038125_ryuk
Files
-
2024-04-09_87c4e5b74e2790ce325e7f8302038125_ryuk.exe windows:5 windows x64 arch:x64
073df254d91fa5ec9bc0661422333e11
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
chrome_elf
SignalChromeElf
advapi32
ImpersonateNamedPipeClient
GetUserNameW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
SystemFunction036
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
kernel32
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
VirtualAlloc
VirtualFree
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
GetComputerNameExW
LocalFree
ExitProcess
GetCurrentDirectoryW
CreateFileW
DeleteFileW
WriteFile
OutputDebugStringA
CloseHandle
GetCurrentProcessId
GetTickCount
GetModuleFileNameW
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetCurrentThread
SetThreadPriority
GetThreadPriority
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
ExpandEnvironmentStringsW
GetVersionExW
GetNativeSystemInfo
TerminateProcess
GetExitCodeProcess
OpenProcess
FlushFileBuffers
GetFileInformationByHandle
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
IsDebuggerPresent
RaiseException
CreateThread
VirtualQuery
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateDirectoryW
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
CreateEventW
UnregisterWaitEx
RegisterWaitForSingleObject
GetUserDefaultLangID
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetThreadId
GetModuleHandleExW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetEvent
SetInformationJobObject
SetLastError
FindClose
FindFirstFileExW
FindNextFileW
LoadResource
LockResource
SizeofResource
FindResourceW
ResetEvent
GetProcessTimes
GetSystemInfo
VirtualQueryEx
GetEnvironmentVariableW
SetEnvironmentVariableW
OutputDebugStringW
CompareStringW
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
RtlAddFunctionTable
RtlDeleteFunctionTable
CreateRemoteThread
VirtualProtect
GetWindowsDirectoryW
LockFileEx
UnlockFileEx
GetStdHandle
GetFileType
SetHandleInformation
SleepEx
CreateProcessW
GetVersion
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
InitializeCriticalSection
ReadProcessMemory
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetThreadContext
AssignProcessToJobObject
FreeLibrary
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
DebugBreak
lstrlenW
SearchPathW
SuspendThread
ResumeThread
Wow64GetThreadContext
GetThreadLocale
GetSystemDefaultLCID
ReleaseSemaphore
CreateSemaphoreW
LoadLibraryExA
DisconnectNamedPipe
ConnectNamedPipe
GetUserDefaultUILanguage
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
HeapSize
GetTimeZoneInformation
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
GetProcessHeap
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetLocaleInfoW
LCMapStringW
EncodePointer
GetStringTypeW
GetLastError
GetProcAddress
GetModuleHandleA
GetCommandLineA
LoadLibraryW
GetTempPathW
GetSystemDirectoryW
shell32
SHGetKnownFolderPath
SHGetFolderPathW
SHGetSpecialFolderPathW
CommandLineToArgvW
user32
FindWindowExW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
GetWindowThreadProcessId
AllowSetForegroundWindow
IsWindow
SendMessageTimeoutW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winmm
timeGetTime
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
rpcrt4
UuidCreate
winhttp
WinHttpAddRequestHeaders
WinHttpSetTimeouts
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSendRequest
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpOpen
Exports
Exports
ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetHandleVerifier
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
RegisterNonABICompliantCodeRange
SetCrashKeyValueImpl
UnregisterNonABICompliantCodeRange
Sections
.text Size: 730KB - Virtual size: 729KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
CPADinfo Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ