D:\Projects\WinRAR\uninstall\build\uninstall64\Release\uninstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-03_888bc652150664584748248b408f8b2a_ryuk.exe
Resource
win7-20240704-en
General
-
Target
2024-08-03_888bc652150664584748248b408f8b2a_ryuk
-
Size
1.6MB
-
MD5
888bc652150664584748248b408f8b2a
-
SHA1
28d4654ddf28206b441c5bb0816903186ccd40ee
-
SHA256
f5bad29c4642e13e058c162c672012050fd2716cbba4ac5808a9acb4f9b6d9b4
-
SHA512
1a4a40b9e96e3e887a17473b8b50df2381edd67e3798db216081abf6306553c1bd3377e238eca3b8df41208df078e6c3f7d2d7d36dfd49bee478af477634b491
-
SSDEEP
24576:85t3+TLIecwXbDDSBhvn/+r1zcsqjnhMgeiCl7G0nehbGZpbD:Gt3+T73rD2Bh3qqDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-03_888bc652150664584748248b408f8b2a_ryuk
Files
-
2024-08-03_888bc652150664584748248b408f8b2a_ryuk.exe windows:5 windows x64 arch:x64
3ec1d94e2ff31c3d07f06205adadd09b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
FindNextFileW
GetVersionExW
GetCurrentDirectoryW
FindResourceW
FreeLibrary
LoadLibraryW
LoadLibraryExW
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
GetSystemDirectoryW
GetCPInfo
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
GetModuleHandleExW
GetShortPathNameW
Sleep
GetTempPathW
SetCurrentDirectoryW
CreateProcessW
GetCommandLineW
GetEnvironmentVariableW
RemoveDirectoryW
CopyFileW
MoveFileExW
SetStdHandle
FindFirstFileW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
LCMapStringW
SetFilePointerEx
HeapReAlloc
GetConsoleMode
GetConsoleCP
HeapAlloc
HeapFree
GetACP
GetModuleFileNameA
ExitProcess
QueryPerformanceFrequency
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RtlUnwindEx
RtlVirtualUnwind
RaiseException
RtlPcToFileHeader
InitializeSListHead
FindClose
ExpandEnvironmentStringsW
MoveFileW
SetFileAttributesW
GetDiskFreeSpaceExW
CreateFileW
CloseHandle
SetFileTime
SetFilePointer
SetEndOfFile
FlushFileBuffers
ReadFile
GetStdHandle
WriteFile
GetFileType
SetLastError
GetLastError
DeleteFileW
GetFileAttributesW
CreateDirectoryW
GetModuleFileNameW
GetStringTypeW
WriteConsoleW
ReadConsoleW
RtlLookupFunctionEntry
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentThreadId
RtlCaptureContext
user32
CharUpperW
SendMessageW
ShowWindow
GetDlgItem
EnableWindow
InvalidateRect
SetWindowTextW
GetParent
DialogBoxParamW
EndDialog
SetDlgItemTextW
GetDlgItemTextW
CheckDlgButton
IsDlgButtonChecked
OemToCharA
LoadIconW
GetSysColor
SendDlgItemMessageW
MessageBoxW
GetDesktopWindow
ReleaseDC
GetDC
IsWindowVisible
IsWindow
SetForegroundWindow
LoadStringW
GetWindow
GetClassNameW
SetProcessDefaultLayout
GetWindowLongPtrW
SetWindowLongW
GetWindowLongW
GetWindowRect
GetClientRect
GetSystemMetrics
SetWindowPos
gdi32
GetDeviceCaps
DeleteObject
CreateFontW
advapi32
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
shell32
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
SHChangeNotify
SHGetFolderPathW
SHFileOperationW
ole32
OleUninitialize
OleInitialize
CoCreateInstance
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 181KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE