Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_2c5f69543516be80c5c1c4a465c14213_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-16_2c5f69543516be80c5c1c4a465c14213_ryuk.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-16_2c5f69543516be80c5c1c4a465c14213_ryuk
-
Size
3.0MB
-
MD5
2c5f69543516be80c5c1c4a465c14213
-
SHA1
9d0f20a85d75d8f8f07207f349b800c8370b771a
-
SHA256
9908848b94e72fd56dfea272c18cfc1e4bd7f808ad7cb09db5c2024f5c0211e8
-
SHA512
dd5a3d928b8ceb762cf509a03305f7ebcef63cd29dbf7d813639f99b863fef216b778d30879a95ffe87a8d8b8b349449fabf3b709dca0495e6513134d8a83c7a
-
SSDEEP
49152:aI5/pBsQNoVFfXWBwEftECfxreqik+3isYVQa2eVzeVfH8DX5jkJ:a86KRYisYVAi5jkJ
Malware Config
Signatures
Files
-
2024-06-16_2c5f69543516be80c5c1c4a465c14213_ryuk.exe windows:5 windows x64 arch:x64
5fd93a27b33005ee481c168ae62d9490
Code Sign
49:55:3c:aa:aa:65:78:72:bc:8d:a8:b8:46:fb:dc:ceCertificate
IssuerCN=xPCAPInc,1.2.840.113549.1.9.1=#0c117465616d407870636170696e632e636f6dNot Before28/11/2019, 00:00Not After28/11/2020, 23:59SubjectCN=xPCAPInc,1.2.840.113549.1.9.1=#0c117465616d407870636170696e632e636f6d42:1a:f2:94:09:84:19:1f:52:0a:4b:c6:24:26:a7:4bCertificate
IssuerCN=AddTrust External CA Root,OU=AddTrust External TTP Network,O=AddTrust AB,C=SENot Before07/06/2005, 08:09Not After30/05/2020, 10:48SubjectCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USKey Usages
KeyUsageCertSign
KeyUsageCRLSign
62:5c:4d:90:8c:d5:42:fb:ab:2e:a5:73:3f:f1:54:19Certificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before27/04/2011, 00:00Not After30/05/2020, 10:48SubjectCN=COMODO Time Stamping CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
2b:73:db:74:63:11:4c:5a:5b:32:4a:f2:30:57:72:49Certificate
IssuerCN=COMODO Time Stamping CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before02/05/2019, 00:00Not After30/05/2020, 10:48SubjectCN=Sectigo SHA-1 Time Stamping Signer,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
newdev
UpdateDriverForPlugAndPlayDevicesW
kernel32
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
GetStringTypeW
LCMapStringW
GetACP
GetStdHandle
GetFileType
SetStdHandle
VirtualQuery
VirtualAlloc
GetSystemInfo
HeapQueryInformation
GetCommandLineA
FreeLibraryAndExitThread
ExitThread
CreateThread
ExitProcess
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
SetFilePointerEx
FindFirstFileExW
FindNextFileW
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
WaitForSingleObjectEx
ResetEvent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
FindResourceExW
SearchPathW
GetProfileIntW
GetTickCount
GetTempPathW
GetTempFileNameW
SystemTimeToTzSpecificLocalTime
GetFileTime
GetFileSizeEx
GetFileAttributesExW
FileTimeToLocalFileTime
SetErrorMode
GetWindowsDirectoryW
VirtualProtect
GetFileAttributesW
VerifyVersionInfoW
VerSetConditionMask
lstrcmpiW
GetCurrentProcess
DuplicateHandle
WriteFile
UnlockFile
SetFilePointer
SetEndOfFile
ReadFile
LockFile
GetVolumeInformationW
GetFullPathNameW
FlushFileBuffers
FindFirstFileW
FindClose
CreateFileW
DeleteFileW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
CompareStringW
GetCurrentDirectoryW
GlobalFlags
FileTimeToSystemTime
GlobalGetAtomNameW
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
GlobalFindAtomW
GetSystemDirectoryW
EncodePointer
lstrcpyW
GetCurrentProcessId
GlobalAddAtomW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleW
lstrcmpW
lstrcmpA
GlobalDeleteAtom
LoadLibraryExW
GetVersionExW
GetCurrentThread
ResumeThread
SetThreadPriority
GetCurrentThreadId
CreateEventW
WaitForSingleObject
SetEvent
CloseHandle
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
GetModuleHandleExW
FreeResource
OutputDebugStringA
MultiByteToWideChar
WideCharToMultiByte
CopyFileW
FormatMessageW
MulDiv
LocalFree
GlobalFree
GlobalUnlock
GlobalLock
GlobalSize
GlobalAlloc
SetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
DecodePointer
CreateConsoleScreenBuffer
SetConsoleScreenBufferInfoEx
ReadConsoleInputA
EnumSystemCodePagesW
EnumSystemLanguageGroupsW
IsNLSDefinedString
IsValidCodePage
DeleteVolumeMountPointW
CloseThreadpoolCleanupGroupMembers
RegisterWaitForSingleObject
MoveFileExW
GetDllDirectoryW
EnumResourceLanguagesA
FindResourceExA
FindResourceW
GetCommandLineW
GetModuleFileNameW
LoadLibraryW
SetNamedPipeHandleState
GetTapeParameters
WaitCommEvent
SetFileValidData
GetFileSize
SizeofResource
WriteConsoleW
LoadResource
Sleep
SetFileIoOverlappedRange
GetLastError
GetExitCodeThread
SetThreadIdealProcessor
IsThreadAFiber
GetProcAddress
FreeLibrary
LockResource
Heap32First
QueryPerformanceFrequency
user32
SetRectEmpty
SendDlgItemMessageA
GetWindowDC
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
RealChildWindowFromPoint
ClientToScreen
LoadCursorW
ReleaseDC
GetDC
IsDialogMessageW
SetWindowTextW
CheckDlgButton
ShowWindow
GetMonitorInfoW
MonitorFromWindow
WinHelpW
GetScrollInfo
SetScrollInfo
LoadIconW
GetWindow
GetTopWindow
GetClassNameW
GetClassLongPtrW
SetWindowLongPtrW
GetWindowLongPtrW
SetWindowLongW
PtInRect
EqualRect
CopyRect
ScreenToClient
AdjustWindowRectEx
GetWindowTextLengthW
GetWindowTextW
RemovePropW
GetPropW
SetPropW
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
ScrollWindow
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
UpdateWindow
TrackPopupMenu
SetMenu
GetMenu
GetCapture
SetFocus
IsIconic
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPlacement
GetWindowPlacement
IsChild
IsMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
DrawIconEx
IsRectEmpty
GetMenuItemInfoW
GetMenuDefaultItem
SetMenuDefaultItem
GetUserObjectSecurity
RegisterWindowMessageW
PostMessageW
RegisterClassExA
MoveWindow
OffsetRect
InflateRect
FillRect
DrawFocusRect
GetSysColorBrush
GetSysColor
MapWindowPoints
GetWindowRect
GetClientRect
RedrawWindow
SetWindowRgn
DrawStateW
GetSystemMetrics
DrawFrameControl
DrawEdge
GetWindowThreadProcessId
MessageBoxW
SetCursor
ShowOwnedPopups
PostQuitMessage
CallNextHookEx
GetCursorPos
GetKeyState
IsWindowVisible
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetDesktopWindow
GetWindowLongW
SetActiveWindow
IsWindowEnabled
GetActiveWindow
GetNextDlgTabItem
GetDlgItem
CopyImage
SystemParametersInfoW
SetTimer
KillTimer
InvalidateRect
DestroyIcon
WaitMessage
SetCapture
ReleaseCapture
WindowFromPoint
IntersectRect
SetLayeredWindowAttributes
EnumDisplayMonitors
SetParent
MonitorFromPoint
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
CreateDialogIndirectParamW
DestroyWindow
LoadImageW
TrackMouseEvent
IsZoomed
GetAsyncKeyState
CharUpperBuffW
LoadMenuW
GetSystemMenu
MessageBeep
NotifyWinEvent
SetCursorPos
SetRect
UnionRect
BringWindowToTop
CreatePopupMenu
LockWindowUpdate
DestroyMenu
EnableScrollBar
GetDoubleClickTime
GetIconInfo
GetDlgCtrlID
EndDialog
SetDlgItemInt
GetClipboardData
CharToOemBuffA
CharUpperW
CreateAcceleratorTableA
GetMenuItemID
DeleteMenu
ValidateRect
SetPropA
GetMenuContextHelpId
ShowCaret
EnumChildWindows
FindWindowW
GetLastActivePopup
SetWindowsHookExW
UnhookWindowsHookEx
LookupIconIdFromDirectoryEx
GetAltTabInfoW
ShutdownBlockReasonDestroy
SetWindowPos
EnableWindow
UnregisterClassW
GetMenuStringW
GetMenuState
GetSubMenu
GetMenuItemCount
InsertMenuW
AppendMenuW
RemoveMenu
SendMessageW
GetFocus
CheckMenuItem
EnableMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetMenuItemInfoW
GetParent
LoadBitmapW
IsWindow
ModifyMenuW
DestroyAcceleratorTable
SetClassLongPtrW
GetUpdateRect
MapDialogRect
LoadAcceleratorsW
TranslateAcceleratorW
InsertMenuItemW
UnpackDDElParam
ReuseDDElParam
ToUnicodeEx
GetKeyboardLayout
GetKeyboardState
MapVirtualKeyW
CreateAcceleratorTableW
CopyAcceleratorTableW
GetKeyNameTextW
SubtractRect
RegisterClipboardFormatW
GetWindowRgn
DestroyCursor
CreateMenu
DrawIcon
InvertRect
HideCaret
GetComboBoxInfo
TranslateMDISysAccel
DefMDIChildProcW
DefFrameProcW
DrawMenuBar
MapVirtualKeyExW
IsCharLowerW
GetNextDlgGroupItem
PostThreadMessageW
IsClipboardFormatAvailable
FrameRect
UpdateLayeredWindow
CopyIcon
gdi32
GetObjectType
GetPixel
GetStockObject
GetViewportExtEx
GetWindowExtEx
IntersectClipRect
LineTo
PtVisible
RectVisible
RestoreDC
SaveDC
SelectClipRgn
ExtSelectClipRgn
SelectObject
SelectPalette
SetBkMode
SetMapMode
SetLayout
GetLayout
SetPolyFillMode
SetROP2
SetTextAlign
MoveToEx
TextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
OffsetViewportOrgEx
OffsetWindowOrgEx
ScaleViewportExtEx
CreateFontIndirectW
SetRectRgn
DPtoLP
CreateCompatibleBitmap
CreateDIBitmap
EnumFontFamiliesW
GetTextCharsetInfo
SetPixel
StretchBlt
CreateDIBSection
SetDIBColorTable
CreateRoundRectRgn
Rectangle
GetRgnBox
OffsetRgn
RoundRect
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
GetSystemPaletteEntries
EnumFontFamiliesExW
LPtoDP
ExtFloodFill
SetPaletteEntries
FillRgn
FrameRgn
GetBoundsRect
PtInRegion
GetViewportOrgEx
GetWindowOrgEx
SetPixelV
GetTextFaceW
GetClipBox
ExcludeClipRect
Escape
CreatePatternBrush
CreatePen
CreateCompatibleDC
BitBlt
GetObjectW
SetTextColor
SetBkColor
GetTextMetricsW
Polyline
Polygon
CreatePolygonRgn
ExtTextOutW
PatBlt
GetTextExtentPoint32W
GetTextColor
GetBkColor
Ellipse
CreateSolidBrush
CreateRectRgnIndirect
CreateHatchBrush
CreateEllipticRgn
CombineRgn
CreateBitmap
GetDeviceCaps
CreateDCW
CopyMetaFileW
DeleteDC
GetTextFaceA
AngleArc
RealizePalette
GetFontData
ScaleWindowExtEx
CreateRectRgn
DeleteObject
msimg32
AlphaBlend
TransparentBlt
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
CredReadDomainCredentialsA
RegEnumKeyExW
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CredGetSessionTypes
CredMarshalCredentialW
PerfDecrementULongLongCounterValue
CredReadA
GetMultipleTrusteeOperationW
GetTrusteeNameA
BuildTrusteeWithNameW
InitiateSystemShutdownA
RegGetValueW
RegCreateKeyW
CreatePrivateObjectSecurityWithMultipleInheritance
GetSecurityDescriptorGroup
IsValidSecurityDescriptor
DeleteAce
AccessCheckByTypeResultListAndAuditAlarmW
ClearEventLogA
ConvertSecurityDescriptorToStringSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorA
ConvertStringSidToSidA
shell32
CommandLineToArgvW
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ord709
ord66
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetDesktopFolder
SHGetFileInfoW
SHAppBarMessage
ShellExecuteW
DragQueryFileW
DragFinish
SHGetUnreadMailCountW
comctl32
InitCommonControlsEx
shlwapi
StrChrW
StrRChrW
StrRChrIA
ord152
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
UrlGetPartA
SHDeleteKeyW
SHRegDuplicateHKey
SHRegSetUSValueA
ord185
PathFindExtensionW
PathFindFileNameW
PathIsUNCW
PathStripToRootW
StrFormatKBSizeW
IntlStrEqWorkerA
uxtheme
DrawThemeParentBackground
IsAppThemed
IsThemeBackgroundPartiallyTransparent
GetThemePartSize
GetWindowTheme
DrawThemeText
OpenThemeData
CloseThemeData
DrawThemeBackground
GetThemeColor
GetCurrentThemeName
GetThemeSysColor
ole32
CoCreateGuid
OleGetClipboard
CoLockObjectExternal
RegisterDragDrop
RevokeDragDrop
OleLockRunning
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
DoDragDrop
CoInitializeEx
CreateStreamOnHGlobal
CoDisconnectObject
ReleaseStgMedium
OleDuplicateData
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
OleGetIconOfClass
StgCreatePropSetStg
CoGetSystemSecurityPermissions
STGMEDIUM_UserSize
HICON_UserMarshal
oleaut32
VariantChangeType
LoadTypeLi
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantClear
VariantCopy
VarBstrFromDate
VariantInit
SysAllocStringLen
SysAllocString
SysFreeString
gdiplus
GdipAlloc
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdipCreateBitmapFromHBITMAP
GdipDrawImageI
GdipDeleteGraphics
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipFree
GdipCreateBitmapFromStream
GdipGetImagePaletteSize
GdipGetImagePalette
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusStartup
GdiplusShutdown
winmm
PlaySoundW
mmioOpenA
timeKillEvent
midiOutShortMsg
waveOutReset
midiOutUnprepareHeader
oleacc
AccessibleObjectFromWindow
LresultFromObject
CreateStdAccessibleObject
imm32
ImmGetContext
ImmGetOpenStatus
ImmReleaseContext
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 633KB - Virtual size: 632KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ