C:\work\perforce\IP3D\main\3D\Grecon\Debug\Grecon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_dd2c8bb2deb00bee44860b77167454d0_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-01_dd2c8bb2deb00bee44860b77167454d0_ryuk.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-01_dd2c8bb2deb00bee44860b77167454d0_ryuk
-
Size
2.7MB
-
MD5
dd2c8bb2deb00bee44860b77167454d0
-
SHA1
2be38f4382be400aa730e5b615b48e94cc87df92
-
SHA256
4bf3fe2b509496ce93487484a3641df64bdbee00642cb0a15f40add72879aad9
-
SHA512
25ee75029adc8925df4246a14470d850b4d5d10a4fb6e8fe5106e852cca7372b672f4afdef95bc7a2f2908fd8367e481dd2867b4ac9e210ec9311b5a58e6c83c
-
SSDEEP
24576:Tgm93MEEf0LJil20P9P2VSsLkUUdgngheokzmS5x0uHp:TgmJMEEf0El20P5KnShc0uH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-01_dd2c8bb2deb00bee44860b77167454d0_ryuk
Files
-
2024-06-01_dd2c8bb2deb00bee44860b77167454d0_ryuk.exe windows:6 windows x64 arch:x64
33f1bf6cda6b65270af83e6d797e8eab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
holxlog
??1CSharpString@@UEAA@XZ
?WriteBody@LogEvent@@MEAAXPEAEH@Z
?ComputeArgLength@LogEvent@@MEAAXXZ
??0CSharpString@@QEAA@AEBV0@@Z
igitt
GITTCtxToMemory
GITTEncodeImageJPEGLS
GITTEncodeImageLJPEG
GITTCtxEntryData
GITTCtxPrimaryAngle
GITTCtxBitDepth
GITTCtxDimensionY
GITTCtxDimensionX
GITTCtxObjects
GITTCtxRead
GITTCtxDestroy
GITTCtxFromMemory
GITTCtxAddMemory
GITTCtxWrite
GITTCtxFlush
GITTCtxHeaderWrite
cudart64_80
cudaSetDevice
cudaGetDevice
cudaMallocPitch
cudaFree
cudaMemset2D
cudaMemcpy2D
cudaGetLastError
filter
fver
fbp
ffp
tomogcal
?CalibrateGeometry@CGemGeomCal@@QEAAHQEAPEAGHQEAMMHHPEADQEAPEADPEAM@Z
??1CGemGeomCal@@QEAA@XZ
??0CGemGeomCal@@QEAA@XZ
enhance
FreeSet
AllocSet
DumpG2
denoising
ArtDetectionDown
kernel32
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindFirstFileExA
GetTimeZoneInformation
SetConsoleCtrlHandler
CreateThread
OutputDebugStringW
OutputDebugStringA
HeapQueryInformation
HeapReAlloc
SetEnvironmentVariableW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetACP
GetCommandLineW
GetCommandLineA
QueryPerformanceFrequency
WriteConsoleW
GetStdHandle
GetSystemInfo
SetStdHandle
ReadConsoleW
SetEndOfFile
VirtualProtect
SetFilePointerEx
CreateFileW
CreateFileA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
WriteFile
CloseHandle
GetModuleFileNameA
GetModuleHandleA
GetTempFileNameA
CopyFileA
WideCharToMultiByte
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
LoadLibraryExA
GetFileType
ReadFile
GetLastError
GetOverlappedResult
MapViewOfFile
UnmapViewOfFile
LoadLibraryW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
RaiseException
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
RtlPcToFileHeader
RtlUnwindEx
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapSize
HeapValidate
Exports
Exports
??0LogEvent@@QEAA@$$QEAV0@@Z
??0LogEvent@@QEAA@AEBV0@@Z
??0RoiVolF@@QEAA@MM@Z
??0RoiVolF@@QEAA@MMMMMM@Z
??0recon@@QEAA@AEBV0@@Z
??1LogEvent@@QEAA@XZ
??4ArtifactDetector@@QEAAAEAV0@AEBV0@@Z
??4CSharpString@@QEAAAEAV0@AEBV0@@Z
??4LogEvent@@QEAAAEAV0@$$QEAV0@@Z
??4LogEvent@@QEAAAEAV0@AEBV0@@Z
??4RoiVolF@@QEAAAEAU0@$$QEAU0@@Z
??4RoiVolF@@QEAAAEAU0@AEBU0@@Z
??4TimeUtil@@QEAAAEAV0@$$QEAV0@@Z
??4TimeUtil@@QEAAAEAV0@AEBV0@@Z
??4recon@@QEAAAEAV0@AEBV0@@Z
??_7LogEvent@@6B@
??_7recon@@6B@
?Buffer@CSharpString@@QEBAPEADXZ
?Jan1_1601_ticks@TimeUtil@@0_KB
?Length@CSharpString@@QEBAHXZ
?Level@LogEvent@@QEAAHXZ
?Level@LogEvent@@QEAAXH@Z
?Time@LogEvent@@QEAA_KXZ
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 536KB - Virtual size: 535KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ