C:\Users\sungeun\svn\free_formed_data\trunk\windows\ffdp\x64\Debug\ffdpcmd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_daaa2871484777b3ca3b59a1bdb74dbf_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_daaa2871484777b3ca3b59a1bdb74dbf_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_daaa2871484777b3ca3b59a1bdb74dbf_ryuk
-
Size
1.9MB
-
MD5
daaa2871484777b3ca3b59a1bdb74dbf
-
SHA1
74569eb573114478cf926c6d337f9fb180a659c9
-
SHA256
f068b1cc73ab561eaa1100c175887ce0b72a1e6f1ec63b19fef86bf54c544b2c
-
SHA512
5f777bc3a13f7344ce6b675ab1a862fca41fd1170a4916b5b3d391742328b839eae61d00c09505665c826712c06bc81b125765d6106cdc677e12e1005a4f4409
-
SSDEEP
24576:U5Be/6vTqnGmSQjHioYL0orQFugEGzWaTUGOBRczXbk/Ya70dpkbI6Ny+htxTg5C:U5w/k+GmSkHioY4EG0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-16_daaa2871484777b3ca3b59a1bdb74dbf_ryuk
Files
-
2024-04-16_daaa2871484777b3ca3b59a1bdb74dbf_ryuk.exe windows:6 windows x64 arch:x64
e189ed4b83abbc165d07e2ac50a94adf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
CreateEventW
Sleep
TerminateThread
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFullPathNameW
GetTempPathW
GetExitCodeProcess
GetSystemDirectoryW
GetWindowsDirectoryW
LoadLibraryW
CreateMailslotW
WideCharToMultiByte
DeleteFileW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
SetFileAttributesW
GetCurrentProcess
GetCurrentThread
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrcpyW
lstrcatW
CopyFileW
MoveFileExW
GetLogicalDriveStringsW
TlsFree
CreateSemaphoreW
lstrlenW
lstrcmpiW
GetProcAddress
FreeLibrary
GetVersionExW
GetExitCodeThread
CreateThread
OpenEventW
ReleaseSemaphore
DeviceIoControl
QueryDosDeviceW
GetDriveTypeW
CreateFileW
FormatMessageW
LocalFree
GetModuleFileNameW
OpenProcess
TerminateProcess
GetCurrentThreadId
GetCurrentProcessId
CreateMutexW
WaitForSingleObject
ReleaseMutex
GetFileAttributesExW
GetDiskFreeSpaceW
GetSystemInfo
VirtualFree
VirtualAlloc
SetLastError
CloseHandle
GetLastError
WriteFile
ReadFile
MultiByteToWideChar
GetModuleHandleW
SetEndOfFile
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
HeapQueryInformation
HeapReAlloc
GetStringTypeW
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
InitializeCriticalSectionAndSpinCount
GetTickCount
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
LoadLibraryExW
EncodePointer
GetStdHandle
GetFileType
GetModuleFileNameA
GetModuleHandleExW
WriteConsoleW
GetConsoleMode
ReadConsoleInputW
SetConsoleMode
HeapSize
HeapValidate
ExitProcess
GetCommandLineA
GetCommandLineW
GetACP
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
SetConsoleCtrlHandler
GetDateFormatW
ReadConsoleW
advapi32
GetSecurityDescriptorLength
ReportEventW
RegisterEventSourceW
DeregisterEventSource
StartServiceW
QueryServiceStatus
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
InitiateSystemShutdownW
LookupPrivilegeNameW
LookupPrivilegeValueW
FreeSid
EqualSid
AdjustTokenPrivileges
OpenThreadToken
RegOpenKeyW
RegEnumKeyExW
LsaNtStatusToWinError
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
GetTokenInformation
OpenProcessToken
shell32
SHFileOperationW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
setupapi
SetupDiGetActualSectionToInstallW
SetupDiSetClassInstallParamsW
SetupDiGetDeviceInstallParamsW
SetupDiSetDeviceRegistryPropertyW
SetupDiGetDeviceRegistryPropertyW
SetupDiCallClassInstaller
SetupDiGetINFClassW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdW
SetupDiCreateDeviceInfoW
SetupDiCreateDeviceInfoList
SetupIterateCabinetW
SetupGetSourceInfoW
SetupGetSourceFileLocationW
SetupGetIntField
SetupGetStringFieldW
SetupFindNextLine
SetupFindFirstLineW
SetupCloseInfFile
SetupOpenInfFileW
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 366KB - Virtual size: 365KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ