C:\MeshAgent\MeshAgent\Release\MeshService64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_de2e46d35028603c288692aa2124f340_ryuk_sliver.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-21_de2e46d35028603c288692aa2124f340_ryuk_sliver.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-21_de2e46d35028603c288692aa2124f340_ryuk_sliver
-
Size
2.8MB
-
MD5
de2e46d35028603c288692aa2124f340
-
SHA1
eaaafa430f0468039f1b4a63723a3cd712780bf0
-
SHA256
ff7174aa2007a0f32d575a5352d12b3dc22d7fffca1efa1a11a8581dfc00f641
-
SHA512
a734e73032a3cba27279a5c17ec1d2f4463deea407167434a3e88892dad5da20e1da4df685d1858ebb15184725c4c9b0f42b42f6df6dd5f2163f2a869fb99b05
-
SSDEEP
49152:H+YGxQU4yDLLErDl7VqnGe8HPjfuXagSMr9MGnsj6zsmZRMFvfXTk8f5LA:PGF/EFj3gR9awZwkqA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-21_de2e46d35028603c288692aa2124f340_ryuk_sliver
Files
-
2024-04-21_de2e46d35028603c288692aa2124f340_ryuk_sliver.exe windows:6 windows x64 arch:x64
b471ff76f5ba19d7fc0fec75f7cd6032
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
dbghelp
SymFromAddr
StackWalk64
SymInitialize
SymFunctionTableAccess64
SymGetLineFromAddr64
SymGetModuleBase64
MiniDumpWriteDump
iphlpapi
GetAdaptersAddresses
SendARP
ConvertLengthToIpv4Mask
GetAdaptersInfo
ws2_32
gethostname
ntohs
ntohl
WSAGetLastError
ioctlsocket
recv
send
getsockname
WSASocketW
htonl
listen
closesocket
bind
accept
__WSAFDIsSet
setsockopt
socket
sendto
getsockopt
recvfrom
connect
shutdown
htons
select
WSACloseEvent
WSACreateEvent
WSAStartup
WSAEventSelect
WSAResetEvent
GetAddrInfoW
FreeAddrInfoW
WSASetLastError
WSACleanup
WSAIoctl
crypt32
CertAddEncodedCertificateToStore
CryptMsgClose
CryptMsgUpdate
CryptExportPublicKeyInfo
CertCreateSelfSignCertificate
CertFreeCertificateContext
CryptMsgOpenToEncode
CertAddCertificateContextToStore
PFXExportCertStore
CryptSignAndEncodeCertificate
CertCloseStore
CertStrToNameA
CryptMsgGetParam
CryptEncodeObject
CertSetCertificateContextProperty
CertFindCertificateInStore
CryptMsgCalculateEncodedLength
CertOpenStore
CertStrToNameW
CertDeleteCertificateFromStore
CertGetCertificateContextProperty
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CryptAcquireCertificatePrivateKey
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
version
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetFileVersionInfoA
gdiplus
GdipLoadImageFromStream
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
ncrypt
NCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptGenRandom
NCryptOpenStorageProvider
BCryptOpenAlgorithmProvider
NCryptFreeObject
NCryptCreatePersistedKey
NCryptFinalizeKey
kernel32
InitializeSListHead
GetStartupInfoW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetFullPathNameW
GetStdHandle
WriteFile
LoadLibraryExA
GetModuleFileNameW
GetSystemPowerStatus
OpenProcess
Sleep
GetLastError
CloseHandle
SetCurrentDirectoryW
GetProcAddress
CreateProcessW
FreeLibrary
WideCharToMultiByte
WaitForSingleObject
GetCurrentThreadId
GetModuleHandleA
CreateThread
QueueUserAPC
OpenThread
ReadFile
GetVersionExA
SleepEx
SetSystemPowerState
GetModuleHandleExW
SetThreadExecutionState
HeapFree
HeapAlloc
GetProcessHeap
SystemTimeToFileTime
GetSystemTime
FileTimeToSystemTime
QueryPerformanceFrequency
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
ReleaseSemaphore
CreateSemaphoreA
CancelIo
FindFirstFileW
FindNextFileW
RemoveDirectoryW
GetFinalPathNameByHandleW
GetDriveTypeA
SetFilePointer
FindFirstVolumeA
FindClose
CreateFileW
GetVolumePathNamesForVolumeNameA
GetFileAttributesExW
ReadDirectoryChangesW
FindNextVolumeA
FindVolumeClose
GetDiskFreeSpaceExA
CreateEventA
MultiByteToWideChar
GetModuleHandleExA
LoadLibraryA
WaitForMultipleObjectsEx
CreateNamedPipeA
DisconnectNamedPipe
CreateFileA
CancelIoEx
LocalFree
IsProcessorFeaturePresent
SetConsoleOutputCP
IsDebuggerPresent
GetTempPathW
CancelSynchronousIo
SetEvent
WaitForSingleObjectEx
ResetEvent
GetCurrentDirectoryW
GetThreadId
SetEnvironmentVariableA
GetCurrentProcessId
GetEnvironmentStrings
FreeEnvironmentStringsA
CopyFileW
RtlCaptureContext
SuspendThread
ResumeThread
DuplicateHandle
GetCurrentThread
GetOverlappedResult
GetThreadContext
GetTickCount
TerminateProcess
WTSGetActiveConsoleSessionId
GetExitCodeProcess
DeleteFileW
GetModuleFileNameA
SetConsoleCtrlHandler
FreeConsole
SetLastError
EncodePointer
GetModuleHandleW
SwitchToFiber
DeleteFiber
CreateFiber
GetSystemTimeAsFileTime
ConvertFiberToThread
ConvertThreadToFiber
GetEnvironmentVariableW
GetConsoleMode
ReadConsoleA
ReadConsoleW
SetConsoleMode
CreateDirectoryW
GetConsoleCP
MoveFileExW
GetTimeZoneInformation
SetStdHandle
GetDriveTypeW
PeekNamedPipe
GetCommandLineA
GetCommandLineW
GetACP
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
SetFilePointerEx
GetStringTypeW
HeapReAlloc
FlushFileBuffers
WriteConsoleW
GetCPInfo
FindFirstFileExW
IsValidCodePage
GetOEMCP
SetUnhandledExceptionFilter
RtlLookupFunctionEntry
RtlVirtualUnwind
ConnectNamedPipe
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
RaiseException
HeapSize
SetEndOfFile
RtlPcToFileHeader
GetCurrentProcess
GetFileType
user32
GetWindowPlacement
ShowWindow
SetWindowPlacement
SetWindowTextA
GetDlgItem
EnableWindow
MessageBeep
ExitWindowsEx
GetUserObjectInformationA
CloseWindowStation
EnumDisplayMonitors
GetSystemMetrics
SetThreadDesktop
GetThreadDesktop
CloseDesktop
OpenWindowStationA
OpenDesktopA
GetMonitorInfoA
SetProcessWindowStation
OpenInputDesktop
SendMessageA
FindWindowA
DialogBoxParamA
DispatchMessageA
LoadCursorA
DestroyWindow
GetDC
PostMessageA
GetIconInfo
GetCursorInfo
MapVirtualKeyA
GetForegroundWindow
DefWindowProcA
CreateWindowExA
TranslateMessage
UnregisterClassA
DrawIconEx
SetWinEventHook
RegisterClassExA
UnhookWinEvent
SetForegroundWindow
ReleaseDC
SendInput
SetProcessDPIAware
EndDialog
GetProcessWindowStation
MessageBoxW
GetUserObjectInformationW
GetMessageA
gdi32
DeleteObject
BitBlt
StretchBlt
DeleteDC
SetStretchBltMode
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetDIBits
GetObjectA
advapi32
QueryServiceStatus
CryptSetHashParam
CryptAcquireContextW
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyA
OpenProcessToken
InitiateSystemShutdownA
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptReleaseContext
RegCreateKeyW
RegSetValueExW
CryptDestroyKey
InitializeSecurityDescriptor
SetEntriesInAclA
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
SetTokenInformation
OpenServiceA
CheckTokenMembership
FreeSid
StartServiceA
ControlService
RegisterServiceCtrlHandlerExA
OpenSCManagerA
SetServiceStatus
AllocateAndInitializeSid
CloseServiceHandle
ReportEventW
StartServiceCtrlDispatcherA
CryptGetUserKey
DeregisterEventSource
RegisterEventSourceW
CryptGetProvParam
shell32
ShellExecuteExW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
SysStringLen
SysFreeString
SysAllocString
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 750KB - Virtual size: 749KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ