Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_6f4dbcceed74e0b985b29fb717789e97_ryuk.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-09_6f4dbcceed74e0b985b29fb717789e97_ryuk.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-09_6f4dbcceed74e0b985b29fb717789e97_ryuk
-
Size
1.2MB
-
MD5
6f4dbcceed74e0b985b29fb717789e97
-
SHA1
e384a487062bca4a5dedfa0bff83dad93044e1bc
-
SHA256
0404a6e0166dc3d20177bb735ca4194dd12b7841de6e702ab2228122dbb760c7
-
SHA512
b1e7bd5b0adafb8fb568a92e30f66f66358130d11871a003c7cbe4e0498f3ab434dd117354028e808cb4b4368bfff4175d9b91c1175dd654a37bb97786bab75c
-
SSDEEP
12288:v0SDEQyU5Q6raNOwHpuCTbUH6t6y2fhGQy5VY52DHo/hNLCFMk4R1LgDNdXqR4LF:vMuUzYCPUaAy2EQy5Vi2LSlb4j8OyU3
Malware Config
Signatures
Files
-
2024-07-09_6f4dbcceed74e0b985b29fb717789e97_ryuk.exe windows:6 windows x64 arch:x64
555bfa206097380a8ae12440a947b8ef
Code Sign
03:4b:04:25:bf:b6:71:76:bd:b0:db:ec:fe:74:4d:9dCertificate
IssuerCN=Hospital Biscuit,1.2.840.113549.1.9.1=#0c1b737461727440686f73706974616c0909626973637569742e636f6dNot Before08/12/2018, 00:00Not After08/12/2019, 23:59SubjectCN=Hospital Biscuit,1.2.840.113549.1.9.1=#0c1b737461727440686f73706974616c0909626973637569742e636f6dfe:67:e4:f1:5a:24:e3:c6:0d:54:7c:a0:20:c2:76:70Certificate
IssuerCN=Certum Trusted Network CA,OU=Certum Certification Authority,O=Unizeto Technologies S.A.,C=PLNot Before08/03/2016, 13:10Not After30/05/2027, 13:10SubjectCN=Certum EV TSA SHA2,OU=Certum Certification Authority,O=Unizeto Technologies S.A.,C=PLExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegOpenKeyExA
RegCloseKey
StartServiceCtrlDispatcherA
SetServiceStatus
DuplicateTokenEx
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceObjectSecurity
GetSecurityDescriptorDacl
ConvertStringSidToSidA
LookupAccountSidA
BuildExplicitAccessWithNameA
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetServiceObjectSecurity
RegOpenKeyA
RegGetKeySecurity
RegSetKeySecurity
GetTokenInformation
ConvertSidToStringSidA
RegQueryValueExA
CreateProcessAsUserA
RegOpenKeyExW
RegQueryValueExW
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
ws2_32
WSAStartup
WSACleanup
ioctlsocket
gethostname
htonl
ntohl
WSAGetLastError
__WSAFDIsSet
sendto
recvfrom
listen
accept
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
WSASetLastError
select
crypt32
CertFreeCertificateContext
wldap32
ord46
ord143
ord211
ord60
ord45
ord50
ord41
ord22
ord301
ord200
ord30
ord79
ord35
ord26
ord32
ord27
ord33
normaliz
IdnToUnicode
IdnToAscii
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
rpcrt4
UuidToStringA
RpcStringFreeA
kernel32
GetTimeZoneInformation
FindClose
GetFullPathNameW
GetCurrentDirectoryW
GetFileAttributesExW
CreateProcessA
GetExitCodeProcess
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetCommandLineW
GetCommandLineA
SetFilePointerEx
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
CreateFileW
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
SetEnvironmentVariableA
ExitProcess
LoadLibraryExW
RtlUnwindEx
RtlPcToFileHeader
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
ResetEvent
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
ReadFile
CloseHandle
Sleep
LoadLibraryA
GetProcAddress
GetModuleHandleA
CreateThread
lstrcmpiA
GetLastError
SetEvent
CreateToolhelp32Snapshot
Process32First
Process32Next
WTSGetActiveConsoleSessionId
WaitForSingleObject
GetModuleFileNameA
GetTickCount
GetCurrentProcess
LocalFree
OpenProcess
MoveFileExA
GetBinaryTypeA
VirtualAlloc
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
TerminateProcess
InitializeCriticalSectionEx
RaiseException
DecodePointer
DeleteCriticalSection
WriteFile
FindFirstVolumeW
MultiByteToWideChar
GetVolumeInformationW
GetTickCount64
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
SleepEx
SetLastError
FormatMessageA
WaitForSingleObjectEx
VerSetConditionMask
GetSystemDirectoryA
VerifyVersionInfoA
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
WriteConsoleW
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHGetKnownFolderPath
ole32
CoTaskMemFree
CoCreateGuid
shlwapi
SHSetValueA
PathFileExistsA
PathFindFileNameA
PathRemoveExtensionA
SHGetValueA
Sections
.text Size: 510KB - Virtual size: 510KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.d6ea0i Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bptkh7 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.fbmqjz Size: 512B - Virtual size: 380B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.e2919s Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.t11675 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tdv2i3 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.qxgktr Size: 512B - Virtual size: 328B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gume7p Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.waeigj Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.beuhzy Size: 512B - Virtual size: 422B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dbreht Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cn3o5p Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l17rde Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.mzenwo Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.uk0vkx Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.w5s7f7 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.t0k1i3 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 430KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ