c:\users\user1\documents\visual studio 2015\Projects\ConsoleApplication1\x64\Release\ConsoleApplication1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-26_5a8b7351810ed88c10969d84e38713d4_ryuk.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-26_5a8b7351810ed88c10969d84e38713d4_ryuk.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-26_5a8b7351810ed88c10969d84e38713d4_ryuk
-
Size
281KB
-
MD5
5a8b7351810ed88c10969d84e38713d4
-
SHA1
3d0bff44a3753de3d3e1fab1064ce862bb2ed1a4
-
SHA256
f07f110f8a787b8d02fa4d631774e7d1f0bee0429539f77168d4950c04bb76fb
-
SHA512
6627124bd6d627dfdbdd90e4b42c0f1b28c2f8387c61ed22d94615ecb81ed5a1efd1689d621096b7d44e74336e633c58921087d9de7080fd2b7b7c0bb9a5ef07
-
SSDEEP
6144:OUpCeFZIs3WKi71xkldVwkjHzq+P67GVbpLoh9t:OUpCRsmKwkNwkzo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-26_5a8b7351810ed88c10969d84e38713d4_ryuk
Files
-
2024-07-26_5a8b7351810ed88c10969d84e38713d4_ryuk.exe windows:6 windows x64 arch:x64
9fcb5952ea08c20e96050c8f8179bd77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
RtlPcToFileHeader
RtlUnwindEx
NtOpenFile
NtWriteVirtualMemory
NtProtectVirtualMemory
NtClose
NtReadVirtualMemory
NtSetInformationFile
RtlInitUnicodeString
NtCreateThreadEx
NtQueryInformationProcess
NtWriteFile
NtCreateSection
NtCreateProcessEx
userenv
CreateEnvironmentBlock
kernel32
SetEvent
ReadConsoleW
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
WriteProcessMemory
GetCurrentProcess
ExpandEnvironmentStringsW
VirtualAlloc
GetTempPathW
CreateFileW
UnmapViewOfFile
GetLastError
CloseHandle
LoadLibraryW
GetCurrentDirectoryW
GetProcAddress
VirtualAllocEx
GetFileSize
GetModuleHandleW
GetTempFileNameW
CreateFileMappingW
MapViewOfFile
LoadLibraryA
FindFirstFileExA
FindClose
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
HeapSize
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
GetProcessHeap
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ