Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-02_33511943971c82600910beb4466dd3af_ryuk.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-02_33511943971c82600910beb4466dd3af_ryuk.exe
Resource
win10v2004-20240508-en
Target
2024-06-02_33511943971c82600910beb4466dd3af_ryuk
Size
691KB
MD5
33511943971c82600910beb4466dd3af
SHA1
a7973b4570528a89d35fede3b9d07fdc5cf2224e
SHA256
559f415d6caf0b6f0b1f7aa4caa0853ca4816ac629aa299815e78a7ced03ebe0
SHA512
eb1d5be9f05a0a774e725cba441add9d33b60220facdf4fcb4bbc2033396389f498996b9c10ecb08cb3b4b5e1a459175ef8068eaaee3538a9335f66252188895
SSDEEP
12288:TubkWwvrTTZWDWosfvwT4QasScpVHE+s+++s+Y+++s+++s+++s:gRIHTZUWLoT4QasScpVk+s+++s+Y+++c
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PathFileExistsW
GetCurrentThreadId
GetLastError
WaitForSingleObject
WriteFile
ReadFile
FindClose
GetModuleHandleW
CreateProcessW
GetTempPathW
CreateDirectoryW
CreateFileW
DeleteFileW
FindNextFileW
CopyFileW
MoveFileExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcessId
SetUnhandledExceptionFilter
ReleaseMutex
CreateMutexW
OutputDebugStringW
GetSystemDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetProcessHeap
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
HeapReAlloc
HeapFree
HeapAlloc
GetCurrentProcess
OpenProcess
LocalFree
SetEndOfFile
LocalAlloc
GlobalFree
GlobalAlloc
WritePrivateProfileStringW
GetPrivateProfileStringW
GetModuleFileNameW
LoadLibraryW
CloseHandle
GetProcAddress
FreeLibrary
SetStdHandle
WriteConsoleW
ReadConsoleW
HeapSize
Process32NextW
LoadLibraryExW
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
wsprintfW
RegCreateKeyExW
RegDeleteValueW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ImpersonateLoggedOnUser
RevertToSelf
SHGetFolderPathW
SHGetSpecialFolderPathW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ