G:\crash_report\bin\x64\rail_crash_sender.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_55716284a4c07d1174979dbf39968bee_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_55716284a4c07d1174979dbf39968bee_ryuk.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_55716284a4c07d1174979dbf39968bee_ryuk
-
Size
5.9MB
-
MD5
55716284a4c07d1174979dbf39968bee
-
SHA1
4ea908ef5038e38e8d9c6aa355a70562f2a0657c
-
SHA256
cd7759b3075e0d4ed8ce787e52a8130faecf6535676a33739b3242305102a26c
-
SHA512
6321accb48c9abc431bfecfb85ceaadd520f6b064e7627732cf88e5b5e3e368455c579c9062f75052a4e1aaca31fd2064c551f2c31472c51681904f361d55dc3
-
SSDEEP
49152:lOjPWfATKuk2UT1gOHXSaWfsK76OPBBobfk5F3k++vrA/1rjblEM7sHEBOw8nHzj:zfBFGDZrjbzS87ZVz9i+elL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-22_55716284a4c07d1174979dbf39968bee_ryuk
Files
-
2024-05-22_55716284a4c07d1174979dbf39968bee_ryuk.exe windows:5 windows x64 arch:x64
f45760fd26730a316efddb80a80fa623
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
closesocket
WSASetLastError
getpeername
getsockname
bind
ntohs
connect
getsockopt
htons
setsockopt
send
recv
WSAGetLastError
__WSAFDIsSet
WSACleanup
WSAStartup
ioctlsocket
getservbyname
getaddrinfo
sendto
recvfrom
gethostbyname
listen
accept
shutdown
socket
WSAIoctl
gethostname
select
htonl
freeaddrinfo
ntohl
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
SHGetFileInfoW
SHFileOperationW
ExtractIconW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
user32
GetDC
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
ReleaseDC
GetGuiResources
UnregisterClassW
advapi32
RegisterEventSourceW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryInfoKeyW
RegEnumKeyExW
RegEnumValueW
RegCloseKey
DeregisterEventSource
RegOpenKeyExW
ReportEventW
RegQueryValueExW
wldap32
ord200
ord27
ord26
ord46
ord22
ord301
ord211
ord32
ord35
ord30
ord50
ord143
ord60
ord41
ord33
ord79
normaliz
IdnToUnicode
IdnToAscii
gdi32
GetObjectW
GetDeviceCaps
GetDIBits
CreateCompatibleBitmap
DeleteObject
kernel32
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
GetTimeZoneInformation
IsValidLocale
FlushFileBuffers
GetExitCodeProcess
CreatePipe
GetTimeFormatW
GetDateFormatW
ReadConsoleW
HeapSize
GetACP
HeapReAlloc
MoveFileExW
GetCurrentDirectoryW
GetCurrentDirectoryA
SetCurrentDirectoryW
SetCurrentDirectoryA
SetEnvironmentVariableW
SetEnvironmentVariableA
GetFullPathNameA
GetFullPathNameW
HeapFree
HeapAlloc
SetConsoleMode
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
ResumeThread
ExitThread
GetProcessHeap
ExitProcess
SetConsoleCtrlHandler
WriteConsoleW
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
CreateProcessA
GetDriveTypeW
RtlUnwindEx
RtlPcToFileHeader
WaitForMultipleObjectsEx
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
SetProcessAffinityMask
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetNumaHighestNodeNumber
GetCommandLineA
GetEnvironmentStringsW
WideCharToMultiByte
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateEventW
FreeEnvironmentStringsW
EnterCriticalSection
ResetEvent
LeaveCriticalSection
SetEvent
WaitForSingleObject
MultiByteToWideChar
CreateFileW
GetFileSizeEx
FindFirstFileW
GetFileTime
FindNextFileW
FindClose
OpenProcess
ReadProcessMemory
LoadLibraryW
GetProcAddress
FreeLibrary
GetProcessTimes
FileTimeToSystemTime
GetSystemTime
GetFileAttributesW
GetCurrentThreadId
GetCommandLineW
CreateThread
GetCurrentProcess
ReadFile
WriteFile
CreateProcessW
GetFileInformationByHandle
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
TerminateProcess
DeleteFileW
RemoveDirectoryW
TerminateThread
Sleep
GetTickCount
RaiseException
DecodePointer
OutputDebugStringA
CreateDirectoryW
WritePrivateProfileStringW
GetModuleHandleExW
GetModuleFileNameW
GetTempPathW
GetPrivateProfileStringW
FormatMessageW
GetFileAttributesExW
GlobalAlloc
GlobalFree
SystemTimeToFileTime
GetModuleHandleW
RtlCaptureStackBackTrace
GetTempFileNameW
TryEnterCriticalSection
CreateMutexA
ReleaseMutex
OpenFileMappingW
UnmapViewOfFile
GetSystemInfo
CreateFileMappingW
MapViewOfFile
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetStdHandle
InitializeCriticalSection
GetTempPathA
GetWindowsDirectoryA
GetComputerNameA
GetSystemTimeAsFileTime
GetFileType
SetLastError
FormatMessageA
SleepEx
VerifyVersionInfoA
GetModuleHandleA
GetSystemDirectoryA
LoadLibraryA
VerSetConditionMask
ExpandEnvironmentStringsA
WaitForMultipleObjects
PeekNamedPipe
RtlVirtualUnwind
GlobalMemoryStatus
QueryPerformanceCounter
FlushConsoleInputBuffer
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CloseHandle
SystemTimeToTzSpecificLocalTime
IsDebuggerPresent
OutputDebugStringW
QueryPerformanceFrequency
FindFirstFileExW
GetDiskFreeSpaceExW
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
CopyFileW
CreateHardLinkW
AreFileApisANSI
GetStringTypeW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
WaitForSingleObjectEx
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
SwitchToThread
ole32
CoUninitialize
CoCreateGuid
CoInitialize
shlwapi
PathFileExistsW
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 508KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 214KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 602KB - Virtual size: 601KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ