Static task
static1
Behavioral task
behavioral1
Sample
2024-06-27_584ee8b58b84938f456fbdb28142f750_ryuk.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-27_584ee8b58b84938f456fbdb28142f750_ryuk.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-27_584ee8b58b84938f456fbdb28142f750_ryuk
-
Size
2.0MB
-
MD5
584ee8b58b84938f456fbdb28142f750
-
SHA1
e3633d1e7199589aa1998bc56e9e3affe3ce2c79
-
SHA256
461f6e9cc5c14418ee61e7f2479dec8bce5a95f174e2b5342033286abb035e68
-
SHA512
4395d74577654ce35f4405c84db4e83c1819da3415978c768f15b7aff2dc3d4e4827d368d296adda9bb4e6366b297d5265cb4b3fb692835a09860c107cc2617c
-
SSDEEP
49152:c2AnkV4pirBKiyq6kWISQEBVRbgnHyNJslRG7y00ibS:c2AnxpirB1N2mnH5x00ibS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-27_584ee8b58b84938f456fbdb28142f750_ryuk
Files
-
2024-06-27_584ee8b58b84938f456fbdb28142f750_ryuk.exe windows:6 windows x64 arch:x64
e61883ce31d0adb6d2c65481206203b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
iphlpapi
GetAdaptersAddresses
ws2_32
WSAGetLastError
WSACleanup
WSAStartup
getsockopt
ntohl
WSAStringToAddressA
gethostbyname
sendto
send
recvfrom
listen
setsockopt
ioctlsocket
bind
accept
__WSAFDIsSet
socket
shutdown
select
htons
connect
closesocket
gethostname
freeaddrinfo
getaddrinfo
advapi32
SystemFunction036
AddAccessAllowedAceEx
CreateWellKnownSid
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DeregisterEventSource
RegisterEventSourceW
ReportEventW
GetUserNameW
user32
MessageBoxW
GetDesktopWindow
GetUserObjectInformationW
GetProcessWindowStation
GetSystemMetrics
kernel32
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetStringTypeW
SetStdHandle
FlushFileBuffers
CreateDirectoryW
GetFileAttributesExW
SetFilePointerEx
SetEndOfFile
GetExitCodeProcess
DeleteFileW
SetFileAttributesW
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetVersionExA
CreateFileA
CloseHandle
GetLastError
DeviceIoControl
GetVolumeInformationA
WaitForSingleObject
Sleep
CreateProcessA
MultiByteToWideChar
WideCharToMultiByte
FindClose
FindFirstFileA
FindNextFileA
CreateThread
WriteConsoleW
CreateDirectoryA
GetModuleFileNameA
GetStdHandle
GetFileType
GetCurrentThreadId
GetVersion
GetFileAttributesA
GetFileInformationByHandle
FindFirstFileW
FindNextFileW
QueryPerformanceCounter
GetCurrentProcessId
GetTickCount
GetVersionExW
FreeLibrary
GetProcAddress
GlobalMemoryStatus
LoadLibraryW
LocalFree
LocalAlloc
CreateMutexA
ReleaseMutex
FormatMessageA
GetEnvironmentVariableA
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
TlsSetValue
TlsGetValue
TlsAlloc
SystemTimeToFileTime
GetSystemTime
FileTimeToSystemTime
GetCurrentProcess
TlsFree
HeapFree
GetProcessHeap
HeapAlloc
GetModuleHandleA
ReadFile
WriteFile
GetFileSize
GetLocalTime
SetErrorMode
HeapReAlloc
SearchPathA
CreateSemaphoreA
OpenSemaphoreA
ReleaseSemaphore
CompareStringW
GetTimeFormatW
GetDateFormatW
GetACP
GetCommandLineW
GetCommandLineA
GetCurrentDirectoryW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableW
SetEnvironmentVariableA
UnlockFileEx
LockFileEx
GetTimeZoneInformation
GetFullPathNameA
GetFullPathNameW
ExitThread
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
GetModuleFileNameW
SetLastError
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateFileW
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
HeapSize
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 580KB - Virtual size: 584KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE