C:\BuildAgent\buildAgent\work\aa1ae33f8f6d00c4\src\out\Release\nacl_win64\nacl64.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_523288920d3a050532088bdf07a15550_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-07_523288920d3a050532088bdf07a15550_ryuk.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-07_523288920d3a050532088bdf07a15550_ryuk
-
Size
5.9MB
-
MD5
523288920d3a050532088bdf07a15550
-
SHA1
2eb46743ad12e92c88cf582379f497d2788bba37
-
SHA256
547c7ea2e3e30baeb3161ac6c06d75cd30b7816790f2c6d847cd0bb49d490d3e
-
SHA512
3305db68e02362bee3291ba4f36d232cd91f92de3f7f7b391d313f89864f95954e557db6846a613d5ecb9c1f8cfca4334a20945e1de17e9be10b1fb26cecab24
-
SSDEEP
98304:3xGGifGJYq/Ri2BgzD1SQkOA4WPs8Fkay77wRGpj3:BRuGJYq/Ri2BgzD1JkOAXPs8FkasF9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-07_523288920d3a050532088bdf07a15550_ryuk
Files
-
2024-05-07_523288920d3a050532088bdf07a15550_ryuk.exe windows:5 windows x64 arch:x64
119c81d2f0567d8b0f34a0c791accdcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
SystemFunction036
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
gdi32
GetCharABCWidthsW
AddFontMemResourceEx
GetFontUnicodeRanges
SelectObject
CreateDIBSection
CreateCompatibleDC
EnumFontFamiliesExW
SetGraphicsMode
GetTextFaceW
GdiFlush
SetWorldTransform
ExtTextOutW
SetTextAlign
GetOutlineTextMetricsW
CreateFontIndirectW
RemoveFontMemResourceEx
DeleteObject
GetGlyphOutlineW
GetGlyphIndicesW
GetTextExtentPointI
SetBkMode
GetFontData
SetTextColor
DeleteDC
GetTextMetricsW
kernel32
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCommandLineA
TransactNamedPipe
DuplicateHandle
GetCurrentProcess
GetStdHandle
GetLongPathNameW
CloseHandle
GetLastError
ResumeThread
IsProcessInJob
QueryInformationJobObject
GetModuleFileNameW
GetModuleHandleW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
DebugActiveProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
CreateNamedPipeW
WaitNamedPipeW
LocalFree
ConnectNamedPipe
GetModuleHandleA
FormatMessageW
VirtualFree
UnmapViewOfFile
GetSystemInfo
VirtualAlloc
VirtualProtect
CreateEventW
ContinueDebugEvent
WaitForDebugEvent
SetEvent
TerminateProcess
SuspendThread
GetThreadContext
SetThreadContext
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
ReadFile
WriteFile
SetHandleInformation
OpenProcess
GetCurrentThread
GetProcAddress
SetThreadPriority
VirtualQuery
ExitProcess
GetCommandLineW
SetLastError
GetProcessId
QueryThreadCycleTime
Sleep
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
QueryPerformanceFrequency
GetThreadPriority
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
WaitForSingleObject
GetExitCodeProcess
RaiseException
CreateThread
IsDebuggerPresent
GetCurrentDirectoryW
FormatMessageA
GetTickCount
SetInformationJobObject
AssignProcessToJobObject
CreateProcessW
GetVersionExW
GetNativeSystemInfo
HeapSetInformation
GetProcessTimes
CreateFileMappingW
MapViewOfFile
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeConditionVariable
InitializeConditionVariable
SleepConditionVariableSRW
WaitForMultipleObjects
ResetEvent
GetThreadId
GetModuleHandleExW
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
LoadLibraryW
CreateDirectoryW
QueryDosDeviceW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
GetFileAttributesExW
DeleteFileW
MoveFileExW
ExpandEnvironmentStringsW
GetUserDefaultLangID
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
GetSystemPowerStatus
GetFileSizeEx
SetFileTime
SetEndOfFile
GetFileInformationByHandle
SetFilePointerEx
FlushFileBuffers
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
FindFirstFileW
FindFirstFileExW
FindNextFileW
FindClose
RegisterWaitForSingleObject
UnregisterWaitEx
ReleaseSRWLockShared
AcquireSRWLockShared
GetModuleHandleExA
RtlAddFunctionTable
RtlDeleteFunctionTable
CreateRemoteThread
GetSystemDirectoryW
GetWindowsDirectoryW
GetNamedPipeInfo
CancelIo
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
InitOnceExecuteOnce
RtlVirtualUnwind
InitializeCriticalSection
DeleteCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualProtectEx
QueryFullProcessImageNameW
VirtualAllocEx
VirtualFreeEx
CreateJobObjectW
DebugBreak
lstrlenW
SearchPathW
WideCharToMultiByte
GetEnvironmentVariableW
SetEnvironmentVariableW
OutputDebugStringW
MultiByteToWideChar
GetLocaleInfoW
FreeLibrary
GetTimeZoneInformation
CreateFileA
FlushInstructionCache
LockFileEx
UnlockFileEx
MapViewOfFileEx
SwitchToThread
GetThreadTimes
GetSystemTime
DisconnectNamedPipe
SetNamedPipeHandleState
PeekNamedPipe
GetNamedPipeHandleStateW
ReleaseSemaphore
CreateSemaphoreW
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
FreeLibraryAndExitThread
ExitThread
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetFullPathNameA
GetFullPathNameW
GetConsoleMode
GetConsoleCP
SetStdHandle
GetDriveTypeW
GetProcessHeap
LoadLibraryExW
RtlPcToFileHeader
RtlUnwindEx
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GetStringTypeW
ole32
CoUninitialize
CoTaskMemFree
CoCreateGuid
CoInitializeEx
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
CommandLineToArgvW
SHGetKnownFolderPath
user32
CreateDesktopW
CloseWindowStation
SetProcessWindowStation
GetUserObjectInformationW
SystemParametersInfoW
GetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
wsprintfW
MessageBoxW
RegisterClassExW
UnregisterClassW
CreateWindowExW
DestroyWindow
DefWindowProcW
CloseDesktop
usp10
ScriptItemize
ScriptFreeCache
ScriptShape
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winmm
timeBeginPeriod
timeEndPeriod
timeGetTime
timeGetDevCaps
ws2_32
ntohs
listen
htons
htonl
getsockname
closesocket
bind
accept
recv
select
send
setsockopt
shutdown
WSAStartup
WSAEventSelect
WSACreateEvent
WSACloseEvent
WSAGetLastError
WSACleanup
gethostbyname
socket
userenv
CreateEnvironmentBlock
GetProfileType
DestroyEnvironmentBlock
Exports
Exports
ClearBreakpadPipeEnvironmentVariable
ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
GetHandleVerifier
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
RegisterNonABICompliantCodeRange
SetCrashKeyValueImpl
TerminateProcessWithoutDump
UnregisterNonABICompliantCodeRange
_ovly_debug_event
nacl_global_xlate_base
nacl_thread_ids
nacl_user
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 25B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 588KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE