R:\depot_tools\src\out\Custom_x64\initialexe\chrome.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_ecc2fbee05e843878857bd883af8a358_ryuk.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-17_ecc2fbee05e843878857bd883af8a358_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_ecc2fbee05e843878857bd883af8a358_ryuk
-
Size
4.7MB
-
MD5
ecc2fbee05e843878857bd883af8a358
-
SHA1
3d1db00762aed66528102f45e10ffcbc07248f8f
-
SHA256
6ea649463229251b854a09fff91e797761f36bd2c62fddbbc28b2eda3e6084e6
-
SHA512
a0c01de4d8f87280ea37976484126b8f5e36b6adf82fa24c30aeacd6de1046544f2aa58d1339d8593b6a2ff940f3884562ed0c05c83a0b3c19d9aeb9edf1d662
-
SSDEEP
49152:1btqSrAskwC5+wOEf8rbsDUdY2IcF8luKVkhHjOzhoAkO+4HYfs23MLC8JCchjqC:fqz1578y+hF4HYLf3Bk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-17_ecc2fbee05e843878857bd883af8a358_ryuk
Files
-
2024-04-17_ecc2fbee05e843878857bd883af8a358_ryuk.exe windows:5 windows x64 arch:x64
388b8da9010eed9429df0fc29daf091f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
chrome_elf
SignalInitializeCrashReporting
GetInstallDetailsPayload
SignalChromeElf
advapi32
RegDisablePredefinedCache
GetSecurityInfo
SetEntriesInAclW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
GetTokenInformation
ConvertSidToStringSidW
OpenProcessToken
SystemFunction036
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
ImpersonateNamedPipeClient
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
gdi32
GetTextFaceW
EnumFontFamiliesExW
CreateCompatibleDC
SelectObject
GetFontUnicodeRanges
AddFontMemResourceEx
SetBkMode
SetTextColor
SetGraphicsMode
CreateDIBSection
ExtTextOutW
SetTextAlign
GetOutlineTextMetricsW
CreateFontIndirectW
RemoveFontMemResourceEx
DeleteObject
GetGlyphOutlineW
GetCharABCWidthsW
GetGlyphIndicesW
GetTextExtentPointI
GetFontData
DeleteDC
GetTextMetricsW
SetWorldTransform
GdiFlush
kernel32
FindNextFileW
FindClose
UnmapViewOfFile
GetFileInformationByHandle
CreateFileMappingW
MapViewOfFile
TlsSetValue
TlsAlloc
TlsGetValue
ExitProcess
ReleaseSRWLockExclusive
WriteFile
ExpandEnvironmentStringsW
CreateFileW
SetEndOfFile
DeleteFileW
MoveFileW
GetSystemDirectoryW
GetComputerNameExW
HeapCreate
HeapDestroy
GetLocalTime
GetCurrentDirectoryW
GetCurrentProcessId
GetTickCount
SetThreadPriority
QueryThreadCycleTime
Sleep
FileTimeToSystemTime
GetCurrentThread
QueryPerformanceFrequency
GetThreadPriority
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCommandLineW
GetModuleHandleW
GetVersionExW
TerminateProcess
OpenProcess
GetExitCodeProcess
SetFilePointerEx
FlushFileBuffers
RaiseException
HeapSetInformation
GetThreadId
IsDebuggerPresent
lstrlenW
VirtualQuery
AcquireSRWLockExclusive
LocalFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
RegisterWaitForSingleObject
UnregisterWaitEx
CreateDirectoryW
QueryDosDeviceW
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
ReplaceFileW
ResetEvent
FindFirstFileExW
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetWindowsDirectoryW
GetUserDefaultLangID
GetProcessTimes
GetModuleHandleExW
GetSystemInfo
VirtualQueryEx
LoadLibraryW
FlushViewOfFile
WakeAllConditionVariable
WakeConditionVariable
SleepConditionVariableSRW
GetFileSizeEx
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
FreeLibrary
ReleaseSRWLockShared
AcquireSRWLockShared
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateProcessW
InitOnceExecuteOnce
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTimeZoneInformation
RtlVirtualUnwind
OutputDebugStringW
LockFileEx
UnlockFileEx
SetConsoleCtrlHandler
TerminateJobObject
GetUserDefaultLCID
WriteProcessMemory
AssignProcessToJobObject
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHeaps
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
QueryFullProcessImageNameW
VirtualAllocEx
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
ReadProcessMemory
DebugBreak
SearchPathW
VirtualProtect
LoadLibraryExA
GetThreadContext
SuspendThread
SleepEx
GetVersion
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
IsWow64Process
GetFileInformationByHandleEx
DisconnectNamedPipe
ConnectNamedPipe
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
WriteConsoleW
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
IsValidLocale
GetStdHandle
ReadConsoleW
GetFullPathNameW
GetConsoleMode
GetConsoleCP
SetStdHandle
GetACP
PeekNamedPipe
GetDriveTypeW
RtlUnwindEx
RtlPcToFileHeader
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetStringTypeW
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
CreateThread
ReadFile
FormatMessageA
SetEvent
ResumeThread
CreateSemaphoreW
CloseHandle
ReleaseSemaphore
GetNativeSystemInfo
WideCharToMultiByte
MultiByteToWideChar
VirtualFree
VirtualAlloc
LoadLibraryExW
SetProcessShutdownParameters
SetCurrentDirectoryW
GetProcessId
GetCurrentProcess
WaitForSingleObject
DuplicateHandle
GetCurrentThreadId
CreateEventW
SetLastError
GetLastError
GetProcAddress
GetModuleHandleA
GetModuleFileNameW
TlsFree
Wow64GetThreadContext
GetThreadLocale
GetSystemDefaultLCID
SetInformationJobObject
GetProcessHandleCount
psapi
GetProcessMemoryInfo
GetMappedFileNameW
GetPerformanceInfo
shell32
CommandLineToArgvW
SHGetKnownFolderPath
SHGetFolderPathW
shlwapi
PathMatchSpecW
user32
GetMessageW
RegisterClassW
wsprintfW
GetWindowThreadProcessId
AllowSetForegroundWindow
IsWindow
SendMessageTimeoutW
SystemParametersInfoW
TranslateMessage
GetWindowLongPtrW
DefWindowProcW
FindWindowExW
DestroyWindow
SetWindowLongPtrW
CreateWindowExW
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
DispatchMessageW
PostMessageW
UnregisterClassW
usp10
ScriptItemize
ScriptFreeCache
ScriptShape
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
winhttp
WinHttpSetTimeouts
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpQueryHeaders
WinHttpCrackUrl
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpOpenRequest
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_text32 Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 630KB - Virtual size: 629KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 29B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CPADinfo Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ