E:\JenkinsSlave\workspace\MIS_CPP\MIS_Component\SeewoFreeze_Prerelease\SeewoFreeze\Release\x64\StackFrameAnalysis.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-05_d8cc7b2e8ecd2a6dc4dff888e30e0917_ryuk.exe
Resource
win7-20240705-en
General
-
Target
2024-07-05_d8cc7b2e8ecd2a6dc4dff888e30e0917_ryuk
-
Size
167KB
-
MD5
d8cc7b2e8ecd2a6dc4dff888e30e0917
-
SHA1
317e2b4b519d0b651325d81a005a4220243ea7c8
-
SHA256
ea25b81dfb50f1dcaf6f59ddb3cbb7f245fa8a8cde447c4ddbffc2de4598461e
-
SHA512
0ac2647d4edd8e21f5a39d86afe44a046c881d2e59b8f2351667a8f93ee5b061c1109adaf9c97e0589e8b851d8de020f4f9a44bf12c38572d42b5c696d3b1d8a
-
SSDEEP
3072:cxuDqppNaUDJCP3OnelyMtu8vwIaJQfZRxag:cxDppMgMfOngyl+hR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-05_d8cc7b2e8ecd2a6dc4dff888e30e0917_ryuk
Files
-
2024-07-05_d8cc7b2e8ecd2a6dc4dff888e30e0917_ryuk.exe windows:6 windows x64 arch:x64
8cb28de0be2a84bd66311b26ec28a122
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
RaiseException
GetLastError
InitializeCriticalSectionEx
DeleteCriticalSection
CloseHandle
CreateFileW
ReadFile
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetCurrentProcess
WriteFile
FlushFileBuffers
CreateFileA
GetModuleFileNameW
SetFilePointer
GetLocalTime
LocalFree
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetLastError
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetACP
GetFileType
LCMapStringW
FindClose
FindFirstFileExW
WriteConsoleW
shell32
CommandLineToArgvW
shlwapi
PathFindFileNameA
PathRemoveFileSpecW
PathRemoveExtensionA
ntdll
NtQuerySystemInformation
dbghelp
SymCleanup
SymInitialize
SymSetSearchPath
SymLoadModule64
SymGetModuleInfo64
SymEnumSymbols
SymGetTypeInfo
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ