C:\b\c\b\win_archive\src\out\Release\nacl_win64\nacl64.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_317924d21a75a645e43b4778fd2a7cb9_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-28_317924d21a75a645e43b4778fd2a7cb9_ryuk.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_317924d21a75a645e43b4778fd2a7cb9_ryuk
-
Size
2.6MB
-
MD5
317924d21a75a645e43b4778fd2a7cb9
-
SHA1
e8e737b8b870e64d3aa1901ec4a2b06f6c8272ae
-
SHA256
efc84ce1c27c69f0afe491ed1e6a1032f2ac07b64f6038160791c2c73641e402
-
SHA512
e0c9c02fffb92b5feefaa6cb060aebef67c1863a1d43d7cc99b4724dae2688988d668f9d9eacdfdc98808f0f6250e895dd2db41d85c559c1fafac233f2ccc367
-
SSDEEP
49152:VLUlX6Eox+geT1mPzEOZcy/cvtDvfJYc3dQqh:VgDtOuvtbfZt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-28_317924d21a75a645e43b4778fd2a7cb9_ryuk
Files
-
2024-04-28_317924d21a75a645e43b4778fd2a7cb9_ryuk.exe windows:5 windows x64 arch:x64
e3f8741c2ee7b2e43b57a7e99faf92e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SystemFunction036
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
dbghelp
SymGetSearchPathW
SymInitialize
SymGetLineFromAddr64
SymSetOptions
SymFromAddr
SymSetSearchPathW
kernel32
GetCommandLineA
TransactNamedPipe
DuplicateHandle
GetCurrentProcess
GetStdHandle
GetLongPathNameW
CloseHandle
GetLastError
SetLastError
ResumeThread
IsProcessInJob
QueryInformationJobObject
GetModuleFileNameW
GetModuleHandleW
GetModuleHandleExW
HeapAlloc
HeapReAlloc
HeapFree
DebugActiveProcess
GetModuleHandleA
LocalFree
FormatMessageW
CreateFileW
CreateNamedPipeW
WaitNamedPipeW
GetCurrentProcessId
GetCurrentThreadId
ConnectNamedPipe
VirtualFree
UnmapViewOfFile
GetSystemInfo
VirtualAlloc
VirtualProtect
CreateEventW
ContinueDebugEvent
WaitForDebugEvent
SetEvent
TerminateProcess
SuspendThread
GetThreadContext
SetThreadContext
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
ReadFile
WriteFile
SetHandleInformation
OpenProcess
GetCurrentThread
GetProcAddress
SetThreadPriority
VirtualQuery
ExitProcess
GetCommandLineW
GetCurrentDirectoryW
DeleteFileW
OutputDebugStringA
GetTickCount
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetThreadPriority
GetSystemTimeAsFileTime
QueryThreadCycleTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
SystemTimeToFileTime
WaitForSingleObject
GetExitCodeProcess
IsDebuggerPresent
RaiseException
CreateThread
CreateProcessW
AssignProcessToJobObject
SetInformationJobObject
AttachConsole
AllocConsole
FreeLibrary
LoadLibraryW
lstrcmpiA
GetVersionExW
GetNativeSystemInfo
HeapSetInformation
GetProcessId
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableSRW
CreateFileMappingW
MapViewOfFile
ResetEvent
WaitForMultipleObjects
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateDirectoryW
GetFileAttributesW
GetFileAttributesExW
QueryDosDeviceW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
MoveFileExW
GetUserDefaultLangID
ExpandEnvironmentStringsW
GetSystemPowerStatus
FlushFileBuffers
GetFileInformationByHandle
SetEndOfFile
SetFilePointerEx
SetFileTime
GetProcessTimes
ReleaseSRWLockShared
AcquireSRWLockShared
GetModuleHandleExA
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
UnregisterWaitEx
RegisterWaitForSingleObject
RtlAddFunctionTable
RtlDeleteFunctionTable
CreateRemoteThread
GetSystemDirectoryW
GetWindowsDirectoryW
GetNamedPipeInfo
CancelIo
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
InitOnceExecuteOnce
RtlVirtualUnwind
VirtualProtectEx
InitializeCriticalSection
DeleteCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualAllocEx
VirtualFreeEx
CreateJobObjectW
DebugBreak
lstrlenW
SearchPathW
WideCharToMultiByte
GetThreadId
GetEnvironmentVariableW
SetEnvironmentVariableW
OutputDebugStringW
MultiByteToWideChar
FlushInstructionCache
CreateFileA
LockFileEx
UnlockFileEx
MapViewOfFileEx
SwitchToThread
GetThreadTimes
GetSystemTime
DisconnectNamedPipe
SetNamedPipeHandleState
PeekNamedPipe
GetNamedPipeHandleStateW
ReleaseSemaphore
CreateSemaphoreW
HeapSize
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
FreeLibraryAndExitThread
ExitThread
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetFullPathNameA
GetFullPathNameW
GetConsoleMode
GetConsoleCP
SetStdHandle
GetDriveTypeW
GetProcessHeap
LoadLibraryExW
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GetStringTypeW
ole32
CoInitializeEx
CoTaskMemFree
CoUninitialize
shell32
CommandLineToArgvW
SHGetKnownFolderPath
SHGetFolderPathW
user32
wsprintfW
MessageBoxW
DefWindowProcW
UnregisterClassW
RegisterClassExW
CreateWindowExW
DestroyWindow
CloseDesktop
CloseWindowStation
CreateDesktopW
GetThreadDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
timeGetDevCaps
timeEndPeriod
timeGetTime
timeBeginPeriod
ws2_32
WSACleanup
WSAStartup
WSAEventSelect
WSACreateEvent
WSACloseEvent
WSAGetLastError
gethostbyname
socket
shutdown
setsockopt
send
select
ntohs
listen
htons
accept
bind
recv
closesocket
getsockname
htonl
userenv
GetProfileType
DestroyEnvironmentBlock
CreateEnvironmentBlock
Exports
Exports
ClearBreakpadPipeEnvironmentVariable
ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
GetHandleVerifier
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
RegisterNonABICompliantCodeRange
SetCrashKeyValueImpl
TerminateProcessWithoutDump
UnregisterNonABICompliantCodeRange
_ovly_debug_event
nacl_global_xlate_base
nacl_thread_ids
nacl_user
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 25B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ