Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_b1887a48e59ac7b1b1742854d2a228af_ryuk.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-14_b1887a48e59ac7b1b1742854d2a228af_ryuk.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-14_b1887a48e59ac7b1b1742854d2a228af_ryuk
-
Size
1.3MB
-
MD5
b1887a48e59ac7b1b1742854d2a228af
-
SHA1
0b0f0878ad64dbf333ac8d6aa9adbb0e7b83f711
-
SHA256
76b1c8b026ac9e72ffe8ac1dd8d18abfbb4eb9c23bccb42ab9af2580ed72b7ad
-
SHA512
48a6ee79e8adca4eb755b66eab404a1c2d81e1658bf6c8aa2392e4a813fe0ab211960ec5466a53b8e82d0b4e2b05edc335540d11ef6a9d00db56cfa350096fb9
-
SSDEEP
24576:Ni0naRHr6XCh+V/KNGdsYqpHidVzdYUpes:NjnaRL6XCIp6GdsYcid
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-14_b1887a48e59ac7b1b1742854d2a228af_ryuk
Files
-
2024-05-14_b1887a48e59ac7b1b1742854d2a228af_ryuk.exe windows:6 windows x64 arch:x64
438c423338f923b712327680153b4c96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CloseHandle
RaiseException
DecodePointer
DeleteCriticalSection
GetModuleFileNameA
GetCurrentProcess
lstrlenW
WriteFile
OutputDebugStringA
CreateMutexW
GetCurrentThreadId
GetLastError
Sleep
GetTempPathA
CreateFileA
DeleteFileA
ExitProcess
WinExec
GetFileType
GetACP
FindClose
InitializeCriticalSectionEx
FindNextFileA
EnumSystemLocalesA
SetEndOfFile
CreateFileW
WriteConsoleW
SetStdHandle
FindFirstFileExA
SetEnvironmentVariableA
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleHandleExW
HeapFree
HeapReAlloc
IsValidLocale
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
HeapSize
GetProcessHeap
ReadConsoleW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapAlloc
EnumSystemLocalesW
GetUserDefaultLCID
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
EncodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
LocalFree
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
TerminateProcess
RtlPcToFileHeader
RtlUnwindEx
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
user32
MessageBoxA
advapi32
SystemFunction036
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExW
shell32
ord680
FindExecutableA
oleaut32
VariantClear
rpcrt4
UuidFromStringA
ntdll
RtlEthernetStringToAddressA
RtlCaptureContext
RtlVirtualUnwind
RtlIpv4StringToAddressA
RtlLookupFunctionEntry
Sections
.text Size: 408KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 760KB - Virtual size: 760KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ