F:\Sources\python\python-3.8.19\Python-3.8.19\PCbuild\amd64\venvwlauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_58f3e0a0b2a9c1332989837bb874e801_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-03_58f3e0a0b2a9c1332989837bb874e801_ryuk.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-03_58f3e0a0b2a9c1332989837bb874e801_ryuk
-
Size
487KB
-
MD5
58f3e0a0b2a9c1332989837bb874e801
-
SHA1
c8ea37760a7ecdc00bcde247582902057d6cd177
-
SHA256
c9d37502efc61ac37b4fd46796190e141b3908597bfaab41045f9bc2eca934d0
-
SHA512
0d7fa0fd070793b7a6fd07610d5db192a5dcc826774a1616b9847740a072558024274c6852d7da382785caeeb970462bcced95fdaa34ee53d40b08e00cb832bf
-
SSDEEP
6144:0x9RSblq+E2drfhPxX842euGqnZIwMd7wvc:0jRi+MfLX2eOZIwM+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-03_58f3e0a0b2a9c1332989837bb874e801_ryuk
Files
-
2024-05-03_58f3e0a0b2a9c1332989837bb874e801_ryuk.exe windows:6 windows x64 arch:x64
eae1775aa8957d5c62963991678d58a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
advapi32
RegQueryValueExW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
kernel32
WriteConsoleW
SetEndOfFile
SetLastError
HeapReAlloc
GetStartupInfoW
SetConsoleCtrlHandler
SetInformationJobObject
QueryInformationJobObject
GetBinaryTypeW
GetCommandLineW
GetCurrentProcess
GetStdHandle
AssignProcessToJobObject
GetModuleFileNameW
SetEnvironmentVariableW
GetEnvironmentVariableW
GetFileAttributesW
DuplicateHandle
MultiByteToWideChar
GetPrivateProfileStringW
FormatMessageW
GetLastError
WaitForSingleObjectEx
CloseHandle
CreateJobObjectA
CreateProcessW
GetExitCodeProcess
HeapSize
CreateFileW
SetFilePointerEx
GetFileSizeEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetCommandLineA
WriteFile
HeapFree
HeapAlloc
GetCurrentThread
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetStringTypeW
ReadFile
ReadConsoleW
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
user32
GetMessageA
MessageBoxW
PostMessageA
Sections
.text Size: 309KB - Virtual size: 309KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ