E:\build\nw18_sdk_win64\node-webkit\src\outst\nw\initialexe\nw.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_cc54b78566188f1ceacb6590c7eb3dc5_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-25_cc54b78566188f1ceacb6590c7eb3dc5_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-25_cc54b78566188f1ceacb6590c7eb3dc5_ryuk
-
Size
887KB
-
MD5
cc54b78566188f1ceacb6590c7eb3dc5
-
SHA1
04e95aafa4b8c3e1bd663c236cfc2dad96b4d0d3
-
SHA256
208e8a4d057e9dd5cf4f744df28b7d45509e826d133462eac0cce594924001cb
-
SHA512
5bed1ffbba85779edd584652ba18893b462160535dff80ba90854777071082eb7a22baac33151f72bd9ff2b8cc94e3ac7880a10a80229d7397a7d4e81669b063
-
SSDEEP
24576:sz4GCpp2bVGB9HAMmr/NiD1V5fAiqRD3:sz4Xpp2bVGB9HE7GX5fAiYD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-25_cc54b78566188f1ceacb6590c7eb3dc5_ryuk
Files
-
2024-04-25_cc54b78566188f1ceacb6590c7eb3dc5_ryuk.exe windows:5 windows x64 arch:x64
8c61898d8234a40e9e18e8d56f1e5b0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
nw_elf
SignalChromeElf
advapi32
ImpersonateNamedPipeClient
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
SystemFunction036
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
CreateProcessAsUserW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
kernel32
GetLastError
SetLastError
CreateEventW
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
GetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
VirtualAlloc
VirtualFree
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
CreateFileW
DeleteFileW
WriteFile
OutputDebugStringA
CloseHandle
GetCurrentProcessId
GetTickCount
GetModuleFileNameW
FormatMessageA
GetCommandLineW
LocalFree
ExpandEnvironmentStringsW
GetVersionExW
GetNativeSystemInfo
TerminateProcess
GetExitCodeProcess
OpenProcess
FlushFileBuffers
GetFileInformationByHandle
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
IsDebuggerPresent
RaiseException
Sleep
CreateThread
GetCurrentThread
SetThreadPriority
GetThreadPriority
GetProcessTimes
GetSystemInfo
VirtualQueryEx
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateDirectoryW
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
GetTempPathW
UnregisterWaitEx
RegisterWaitForSingleObject
GetUserDefaultLangID
GetProcAddress
TlsGetValue
TlsSetValue
TlsFree
GetThreadId
GetModuleHandleExW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetEvent
SetInformationJobObject
LoadLibraryW
FindClose
FindFirstFileExW
FindNextFileW
LoadResource
LockResource
SizeofResource
FindResourceW
ResetEvent
VirtualQuery
CompareStringW
DecodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
SuspendThread
ResumeThread
GetThreadContext
ReadProcessMemory
Wow64GetThreadContext
IsProcessorFeaturePresent
GetThreadLocale
GetSystemDefaultLCID
GetUserDefaultLCID
HeapSetInformation
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateJobObject
WriteProcessMemory
AssignProcessToJobObject
FreeLibrary
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
VirtualAllocEx
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
CreateProcessW
DebugBreak
lstrlenW
SearchPathW
VirtualProtect
LoadLibraryExA
CreateSemaphoreW
ReleaseSemaphore
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetVersion
DisconnectNamedPipe
ConnectNamedPipe
UnlockFileEx
LockFileEx
GetUserDefaultUILanguage
GetEnvironmentVariableW
HeapSize
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
GetStdHandle
SetStdHandle
GetFullPathNameW
ExitProcess
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
GetProcessHeap
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
InitializeSListHead
GetStartupInfoW
UnhandledExceptionFilter
RtlVirtualUnwind
GetModuleHandleA
GetCurrentThreadId
TlsAlloc
GetTimeZoneInformation
RtlCaptureContext
RtlLookupFunctionEntry
shell32
SHGetKnownFolderPath
SHGetFolderPathW
CommandLineToArgvW
user32
GetUserObjectInformationW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
PeekMessageW
PostThreadMessageW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winmm
timeGetTime
rpcrt4
UuidCreate
winhttp
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpOpen
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReadData
WinHttpReceiveResponse
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 658KB - Virtual size: 657KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ