C:\dvs\p4\build\sw\devrel\Playpen\yyao\VRBench\VR-FCAT\FVSDK_rel_1_0\Symbols\nvrla.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_da12efea9a222a6238ad6f5b814e257c_ryuk.exe
Resource
win7-20240508-en
General
-
Target
2024-06-15_da12efea9a222a6238ad6f5b814e257c_ryuk
-
Size
1.9MB
-
MD5
da12efea9a222a6238ad6f5b814e257c
-
SHA1
af999c0c7f91148f32444db56adb03667541c6dd
-
SHA256
46c67e9cf73ccc002233394c29e3e876a260ec7ccbbe82cd286f6c3c08a0b683
-
SHA512
cd7820a51caa60450fbfa2c90e141ada41f8295e428e3f89aedd3fb2c50feb3b7927094752ec27fd6c3c6ed74abc37664bc0600cd19d5d21ef41c28c8affafef
-
SSDEEP
49152:FDkJVwH8w1hX3+XDMhQ/wBTTY5FcwosO+OQUKjdm:CO7HEIESwoKMK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-15_da12efea9a222a6238ad6f5b814e257c_ryuk
Files
-
2024-06-15_da12efea9a222a6238ad6f5b814e257c_ryuk.exe windows:6 windows x64 arch:x64
86c3811563f72c2ca6b1710b367a1bbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCurrentProcessId
VerifyVersionInfoW
QueryPerformanceCounter
AllocConsole
CreateFileW
CreateDirectoryW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
GetProcAddress
GetFileAttributesW
GetFullPathNameW
SetLastError
GetSystemDirectoryW
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
FileTimeToSystemTime
VerSetConditionMask
WriteConsoleW
HeapSize
DeleteFileW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetTimeZoneInformation
GetProcessHeap
GetCurrentDirectoryW
SetEndOfFile
SetStdHandle
GetFileAttributesExW
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LocalFree
ResetEvent
CloseHandle
SetEvent
AttachConsole
GetLastError
CreateEventW
LocalAlloc
WaitForSingleObject
WaitForMultipleObjects
SetConsoleTitleA
GetCommandLineW
SetDefaultDllDirectories
GetModuleFileNameA
Sleep
OutputDebugStringA
GetTimeFormatW
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
WriteFile
HeapReAlloc
HeapFree
HeapAlloc
SetFilePointerEx
ExitThread
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
SetConsoleCtrlHandler
GetModuleHandleExW
ExitProcess
RtlUnwindEx
RtlPcToFileHeader
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
FormatMessageW
InitializeCriticalSectionEx
DeleteCriticalSection
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
GetTickCount
MultiByteToWideChar
WideCharToMultiByte
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
CreateFileA
GetFileSizeEx
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
TryEnterCriticalSection
GetCurrentThreadId
DuplicateHandle
GetCurrentProcess
GetCurrentThread
GetExitCodeThread
GetStringTypeW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
ole32
CoTaskMemFree
normaliz
IdnToAscii
wldap32
ord143
ord46
ord211
ord60
ord45
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord217
crypt32
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertFreeCertificateChain
ws2_32
connect
bind
recv
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
getpeername
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockname
getsockopt
htons
ntohs
setsockopt
socket
WSASetLastError
WSAIoctl
WSAStartup
WSACleanup
__WSAFDIsSet
select
accept
htonl
listen
getaddrinfo
freeaddrinfo
sendto
recvfrom
ioctlsocket
gethostname
Sections
.text Size: 1020KB - Virtual size: 1020KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 307KB - Virtual size: 306KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE