Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_79da0e33f5d814f81743874ae30586a9_mimikatz_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-16_79da0e33f5d814f81743874ae30586a9_mimikatz_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_79da0e33f5d814f81743874ae30586a9_mimikatz_ryuk
-
Size
355KB
-
MD5
79da0e33f5d814f81743874ae30586a9
-
SHA1
5aa2901618d83670180dc00b825a36ae40d52417
-
SHA256
9f2533bba9e691b90d0e0d100c52c8eb47ad12288a3e35d94bcc5225deb5af3c
-
SHA512
eaa8dacfefdb51b658b19d0b14b4c2a764f90425a85adcb505d44377a9c6ee09521493943aca240a6d6fdcdfb82fa8281d0055f217763528cd5eb6239f9fa414
-
SSDEEP
6144:FggX6VNEPjLpSspdIDjCT8NudMYYkm+Itq55:yQ6bEbLphkwTHYkM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-16_79da0e33f5d814f81743874ae30586a9_mimikatz_ryuk
Files
-
2024-04-16_79da0e33f5d814f81743874ae30586a9_mimikatz_ryuk.exe windows:5 windows x64 arch:x64
9821690fd9c4c82e2395d66f1bbbe453
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ReleaseMutex
GetLastError
LockResource
LoadResource
GetStartupInfoA
CreateProcessA
HeapFree
Sleep
HeapAlloc
GetProcessHeap
GetTickCount
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetWindowsDirectoryA
DeleteCriticalSection
GetSystemDirectoryA
DeleteFileA
CreateThread
CreateDirectoryA
VirtualFree
VirtualAlloc
FreeConsole
ExitProcess
SetUnhandledExceptionFilter
GetFileAttributesW
GetFileAttributesA
CreateProcessW
GetFileTime
FindFirstFileW
FindNextFileW
FindClose
DeleteFileW
SetLastError
CreateFileW
WideCharToMultiByte
SetFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
SystemTimeToFileTime
UnmapViewOfFile
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
WaitForSingleObject
CreateMutexA
FindResourceA
SetFilePointer
GetCurrentProcess
SizeofResource
CloseHandle
CreateFileA
WriteFile
GetFileSizeEx
ReadFile
LocalFree
LocalAlloc
lstrcpyA
GetLocalTime
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
FindNextFileA
FindFirstFileExA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetCurrentThreadId
MultiByteToWideChar
IsValidCodePage
GetFileType
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
GetModuleFileNameA
GetCommandLineA
GetCommandLineW
GetACP
CompareStringW
LCMapStringW
user32
wsprintfA
wsprintfW
advapi32
SystemFunction036
CryptImportKey
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
CryptVerifySignatureA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptReleaseContext
ws2_32
bind
WSAIoctl
closesocket
select
listen
accept
send
socket
connect
recv
htonl
htons
gethostbyname
gethostname
__WSAFDIsSet
inet_addr
WSAStartup
setsockopt
iphlpapi
GetTcpTable
mpr
WNetAddConnection2A
WNetCancelConnection2A
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ