C:\dvs\p4\build\sw\rel\gpu_drv\r550\r552_19\drivers\ngx\updater\_out\wddm_amd64_release\nvngx_update.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_455f2087414cba27ed438f5ddb913050_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_455f2087414cba27ed438f5ddb913050_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_455f2087414cba27ed438f5ddb913050_ryuk
-
Size
1.6MB
-
MD5
455f2087414cba27ed438f5ddb913050
-
SHA1
4e6105341b567142bb502293ebefb4d13ea17e82
-
SHA256
f501d52b098bc75599b7896553a3eb0531be12ef38df3c8b89497de319d6fd10
-
SHA512
b92a1dfed3071fd190af66f734d1c58e46c76eccca1532e28f92ee0d3753a0c9618d4edfa9ebe4c492847b899f7adb566e18042538ed5e6c73be42bacfd0cb28
-
SSDEEP
49152:5op2mpNXefjM5Onna/TyqMghkR0HpUUN5I9+n3Y:qJ5OvRepUUN5I9+n3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-19_455f2087414cba27ed438f5ddb913050_ryuk
Files
-
2024-04-19_455f2087414cba27ed438f5ddb913050_ryuk.exe windows:6 windows x64 arch:x64
79e9d4c9fc46b089192f6826bcac59ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
VerSetConditionMask
GetModuleHandleW
FreeLibrary
VerifyVersionInfoW
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
DeleteCriticalSection
LoadLibraryW
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
WriteFile
SetFilePointer
CreateFileA
GetSystemDirectoryW
GetFileAttributesW
CreateFileW
GetModuleFileNameW
GetFullPathNameW
SetLastError
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
AllocConsole
GetConsoleWindow
GetCurrentProcessId
OutputDebugStringA
WriteConsoleA
GetStdHandle
SetConsoleTitleA
FormatMessageA
MoveFileExW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetProcessHeap
SetEndOfFile
GetFileAttributesExW
LocalFree
DeleteFileW
SetFileAttributesW
LocalAlloc
FindClose
RemoveDirectoryW
FindNextFileW
FindFirstFileW
CloseHandle
SetEvent
GetLastError
Sleep
ReleaseMutex
WaitForSingleObject
CreateMutexA
ReadFile
OpenEventA
GetTimeZoneInformation
SetStdHandle
HeapSize
SetFilePointerEx
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetCommandLineW
GetCommandLineA
HeapReAlloc
HeapFree
HeapAlloc
ExitThread
GetCurrentDirectoryW
SetEnvironmentVariableA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
FormatMessageW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionEx
QueryPerformanceFrequency
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
SleepEx
GetFileSizeEx
TryEnterCriticalSection
GetCurrentThreadId
EncodePointer
DecodePointer
GetCPInfo
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlPcToFileHeader
RaiseException
RtlUnwindEx
ExitProcess
GetModuleHandleExW
CreateDirectoryW
GetDriveTypeW
GetFileInformationByHandle
shlwapi
PathFileExistsW
user32
GetWindowThreadProcessId
advapi32
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
RegQueryValueExW
RegOpenKeyExW
InitializeSecurityDescriptor
ConvertStringSidToSidW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegCloseKey
SetEntriesInAclA
SetSecurityDescriptorDacl
CryptDestroyHash
shell32
SHGetKnownFolderPath
SHCreateDirectoryExW
ole32
CoTaskMemFree
bcrypt
BCryptGenRandom
normaliz
IdnToAscii
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
ws2_32
htons
WSAIoctl
setsockopt
WSACleanup
WSAStartup
WSASetLastError
ntohs
WSAGetLastError
htonl
socket
bind
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockopt
listen
recv
__WSAFDIsSet
select
WSAWaitForMultipleEvents
accept
getaddrinfo
freeaddrinfo
getpeername
connect
WSAResetEvent
getsockname
ioctlsocket
closesocket
Sections
.text Size: 780KB - Virtual size: 780KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE