C:\_workspace\Tool\Realtek\ForteAPISample.1.93\x64\Release\ForteAPISample.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-11_237f73c6957c3c28a6751f5ea7965989_ryuk.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-11_237f73c6957c3c28a6751f5ea7965989_ryuk.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-11_237f73c6957c3c28a6751f5ea7965989_ryuk
-
Size
148KB
-
MD5
237f73c6957c3c28a6751f5ea7965989
-
SHA1
fda5a39767230549f61464cee33a631a79e1d7d5
-
SHA256
00794f2637055334001ce3d84a5dd366a0120a52a1d8093bba9d4c5d51248ce6
-
SHA512
907d08c0fd8498371a3259eef918fc6218d9f2d96e5ed9668701e7c63614d68f5cb1e1256df94e8a6b677b13bbb2fd6778618c8efb4c61ce6ca51189987e3cc4
-
SSDEEP
3072:2TK1Wc2TSDW5EcHmE4agMYH1aoCNFjRMfec1VN2XB5QDCfGrlytb76YN+M:2TK1Wc2GDBqmE4agMM3CNFd0GF+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-11_237f73c6957c3c28a6751f5ea7965989_ryuk
Files
-
2024-07-11_237f73c6957c3c28a6751f5ea7965989_ryuk.exe windows:6 windows x64 arch:x64
a3f9366b628850c0397c2e5ec98f470e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetModuleHandleW
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
InitializeCriticalSectionEx
GetLastError
GetProcAddress
DeleteCriticalSection
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
CreateFileW
WriteConsoleW
GetVersionExW
GetExitCodeProcess
WaitForSingleObject
GetCommandLineW
RaiseException
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlPcToFileHeader
EncodePointer
GetModuleFileNameW
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetLastError
GetStdHandle
WriteFile
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
GetStringTypeW
LCMapStringW
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
LocalFree
advapi32
SystemFunction036
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shell32
CommandLineToArgvW
ShellExecuteExW
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ