Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_449becd0bd6f1b0e2715b4b52feefbcd_rdat_ryuk.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-29_449becd0bd6f1b0e2715b4b52feefbcd_rdat_ryuk.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-29_449becd0bd6f1b0e2715b4b52feefbcd_rdat_ryuk
-
Size
497KB
-
MD5
449becd0bd6f1b0e2715b4b52feefbcd
-
SHA1
8fe6f7c3bb55789d904b4fdf90d2c29332a85817
-
SHA256
038e6b5e0cce34b62d56b96abdde51a3f97e664f0f2a6a20bcd87787e8a0d9a5
-
SHA512
60775d270c13b7a0b80af584afe0aae0b20f8422c5c9ef53c509d2a3e84c1ecc35dc38e01a1c9a7aab46ff05499f75877e73ee1653e3c5f5436e8bdfddbef476
-
SSDEEP
6144:1YglVUzaisvooL2kjDx/a4tHQDw3ttA3NzzMMzPd0jvdNTZlHG+Ps9Mmbhti5Qgf:ll2iUt8sNzDRaJZ09MmbLi57iC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-29_449becd0bd6f1b0e2715b4b52feefbcd_rdat_ryuk
Files
-
2024-06-29_449becd0bd6f1b0e2715b4b52feefbcd_rdat_ryuk.exe windows:5 windows x64 arch:x64
3497e10c19d7de7f65dfd3d4c7f9e7fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WaitForSingleObject
Sleep
GetLastError
GetSystemDirectoryA
LockResource
DeleteFileA
CreateThread
GetWindowsDirectoryA
LoadResource
LocalFree
CreateDirectoryA
ReadFile
GetFileSizeEx
WriteFile
SetFilePointer
CreateMutexA
LocalAlloc
ReleaseMutex
CreateFileA
CloseHandle
GetStartupInfoA
CreateProcessA
OutputDebugStringA
GetLocalTime
InitializeCriticalSection
ExitProcess
GetTickCount
SetUnhandledExceptionFilter
VirtualFree
VirtualAlloc
DeleteCriticalSection
HeapFree
HeapAlloc
GetProcessHeap
FindNextFileA
FindClose
SetFileTime
FindResourceA
LocalFileTimeToFileTime
GetFileAttributesA
SystemTimeToFileTime
UnmapViewOfFile
LeaveCriticalSection
EnterCriticalSection
CreateFileW
WriteConsoleW
SetFilePointerEx
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FindFirstFileExA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
GetCommandLineW
GetCommandLineA
GetCurrentDirectoryA
SizeofResource
TryEnterCriticalSection
GetCurrentThreadId
WideCharToMultiByte
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
LoadLibraryW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
HeapReAlloc
GetModuleHandleExW
GetStdHandle
GetModuleFileNameA
user32
wsprintfA
ws2_32
accept
bind
WSAIoctl
__WSAFDIsSet
gethostbyname
select
listen
send
socket
connect
recv
htonl
htons
setsockopt
WSAStartup
gethostname
inet_addr
closesocket
wininet
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetReadFile
InternetOpenA
InternetCloseHandle
iphlpapi
GetTcpTable
advapi32
SystemFunction036
Sections
.text Size: 325KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ