Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_d48b7f8400e34c7eec0de729f634acd6_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-17_d48b7f8400e34c7eec0de729f634acd6_ryuk.exe
Resource
win10v2004-20240412-en
Target
2024-04-17_d48b7f8400e34c7eec0de729f634acd6_ryuk
Size
2.6MB
MD5
d48b7f8400e34c7eec0de729f634acd6
SHA1
52a986a0ac57474721475e241b4dfd4816587dab
SHA256
37dea0900635957f4a23c147ce2d1e1b8a88839f218eb0c8018fddf38bf8d638
SHA512
6bde206699a861ad5472c99c0f904481cca4a4299e0a17730db5bb3ed7909652409ac2864413588aa36cd5fc6d09b01f650e751058a4b54a175bd0560c371892
SSDEEP
49152:FLYRGtQphRQpelH8O0Gawt+/tfFROdIDo25y7:FL462RQoHzID07
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
wa_3rd_party_host_64.pdb
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetLastError
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
LoadLibraryA
WaitForSingleObjectEx
DeleteFileA
DeleteFileW
HeapReAlloc
CloseHandle
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
GetProcAddress
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
GetTickCount64
SizeofResource
GetModuleHandleExW
GetModuleFileNameW
LocalAlloc
FreeResource
LockResource
LoadResource
FindResourceW
SetErrorMode
LoadLibraryExW
InitializeCriticalSectionEx
RaiseException
Sleep
GetWindowsDirectoryW
GetEnvironmentStringsW
GetCurrentDirectoryW
SetCurrentDirectoryW
FindFirstFileW
FindNextFileW
FindClose
FileTimeToSystemTime
GetFileTime
GetVolumeNameForVolumeMountPointW
GetLogicalDriveStringsW
GetDriveTypeW
DeviceIoControl
GetSystemWindowsDirectoryW
lstrcpyW
GetModuleHandleW
WaitForMultipleObjects
CreateEventW
SetEvent
CreateNamedPipeW
DisconnectNamedPipe
OpenProcess
CreateThread
WaitNamedPipeW
ConnectNamedPipe
GetExitCodeProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CreateDirectoryW
GetCurrentProcess
CreateProcessW
CopyFileW
SetLastError
lstrcpynW
GetLocaleInfoW
TerminateProcess
GetTempFileNameW
ExpandEnvironmentStringsW
GetVersionExW
GetTimeZoneInformation
GetSystemDirectoryW
ReleaseMutex
CreateMutexA
VirtualAlloc
VirtualFree
VirtualQuery
WriteConsoleW
ReadConsoleW
SetStdHandle
MultiByteToWideChar
HeapSize
HeapValidate
UnmapViewOfFile
GetCurrentThreadId
GetFileAttributesW
CreateFileW
WaitForSingleObject
CreateMutexW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
AreFileApisANSI
InitializeCriticalSection
LeaveCriticalSection
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
WriteFile
GetFullPathNameW
EnterCriticalSection
HeapFree
HeapCreate
TryEnterCriticalSection
ReadFile
DecodePointer
FreeEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetEnvironmentVariableW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetCommandLineA
GetStdHandle
ExitProcess
ExitThread
RtlUnwindEx
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
GetModuleHandleA
FreeLibraryAndExitThread
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ResetEvent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
GetStringTypeW
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetNativeSystemInfo
QueryPerformanceFrequency
RtlPcToFileHeader
EncodePointer
QueueUserWorkItem
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetCPInfo
CreateTimerQueue
GetThreadTimes
LoadLibraryExA
PostThreadMessageW
wsprintfW
RegQueryValueExW
EqualSid
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
QueryServiceStatus
OpenServiceW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
CloseServiceHandle
OpenSCManagerW
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
AccessCheck
GetFileSecurityW
DuplicateToken
MapGenericMask
LookupPrivilegeValueW
AdjustTokenPrivileges
RegSaveKeyW
OpenProcessToken
CoSetProxyBlanket
CoUninitialize
CoInitializeEx
CoCreateInstance
IIDFromString
CLSIDFromString
CoAddRefServerProcess
CoReleaseServerProcess
OleRun
GetErrorInfo
VariantTimeToSystemTime
VariantClear
SafeArrayCreateVector
SafeArrayCreate
SafeArrayLock
VariantCopy
SafeArrayPutElement
SysAllocString
SysFreeString
SafeArrayGetDim
SysStringLen
SysAllocStringLen
SafeArrayDestroy
VariantInit
SafeArrayGetElement
SafeArrayUnlock
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
StrStrIW
HttpSendRequestW
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetReadFile
HttpOpenRequestW
QHChangeOnAccessScanState
QHEnableOnAccessScan
QHFreeThreatHistoryListA
QHFreeThreatHistoryListW
QHGetAppLanguageA
QHGetAppLanguageW
QHGetDigitalCertSignerA
QHGetDigitalCertSignerW
QHGetEngineVersionA
QHGetEngineVersionW
QHGetExpDate
QHGetLastFullScanTime
QHGetProductInstallDirA
QHGetProductInstallDirW
QHGetSASQHStatus
QHGetSigDatabaseDirA
QHGetSigDatabaseDirW
QHGetSigDatabaseTime
QHGetSigDatabaseVersionA
QHGetSigDatabaseVersionW
QHGetThreatHistoryA
QHGetThreatHistoryW
QHInitUpdate
QHInitiateFileScanA
QHInitiateFileScanW
QHInitiateFolderScanA
QHInitiateFolderScanW
QHInitiateFullScan
QHIsAVInstalled
QHIsFullScanRunning
QHIsLicenseExpired
QHIsOnAccessScanEnabled
QHIsUpdateInProgress
QHOpenScanner
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ