c:\builds\moz2_slave\m-rel-w64-00000000000000000000\build\src\obj-firefox\toolkit\mozapps\update\updater\updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-06_17b3757168d7bff6f71b7e66b89b9560_ryuk.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-06_17b3757168d7bff6f71b7e66b89b9560_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-06_17b3757168d7bff6f71b7e66b89b9560_ryuk
-
Size
1.5MB
-
MD5
17b3757168d7bff6f71b7e66b89b9560
-
SHA1
0b0855c30fc67a89ff9d57df35fb884ccdcfe854
-
SHA256
5cfe8ed0c568e21ee7afa8e052ee2ed54930a21a0c52cf71b8879685b201d7dd
-
SHA512
86cd4a0245c83dc171726eebec13c36a5512452377fd2a2853559806a6c0bd8758682676789753bd3b63d6f368b0d356644051f1ea062fbccda235b8a7a99ac5
-
SSDEEP
24576:IqDhngz7K/RGsqjnhMgeiCl7G0nehbGZpbD:Bn4+KDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-06_17b3757168d7bff6f71b7e66b89b9560_ryuk
Files
-
2024-08-06_17b3757168d7bff6f71b7e66b89b9560_ryuk.exe windows:6 windows x64 arch:x64
ff6521bf8dcb7eb523208306debd023f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
CopyFileW
WideCharToMultiByte
GetTempFileNameW
LocalAlloc
SetLastError
GetCurrentProcess
FreeLibrary
WriteFile
GetDriveTypeW
DeleteFileW
MoveFileW
HeapSize
GetTimeZoneInformation
CreateProcessW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
HeapReAlloc
FlushFileBuffers
SetFilePointerEx
LocalFree
MoveFileExW
UnlockFile
CloseHandle
GetLastError
FormatMessageW
GetPrivateProfileStringW
OpenProcess
GetFileAttributesW
CreateFileW
WaitForSingleObject
FindClose
SetEndOfFile
SetFilePointer
LockFile
GetLongPathNameW
FindNextFileW
FindFirstFileW
Sleep
MultiByteToWideChar
DeactivateActCtx
GetModuleFileNameW
ActivateActCtx
CreateActCtxW
LoadLibraryExW
SetDllDirectoryW
GetModuleHandleW
GetProcAddress
WriteConsoleW
LCMapStringW
CompareStringW
GetSystemDirectoryW
GetFullPathNameW
ReadConsoleW
GetConsoleMode
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileAttributesExW
CreateDirectoryW
SetStdHandle
RemoveDirectoryW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
SetFileAttributesW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
ReadFile
ExitProcess
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetStringTypeW
GetConsoleCP
user32
OffsetRect
wsprintfW
GetWindowRect
GetDC
SetWindowPos
SetWindowLongPtrW
ScreenToClient
ReleaseDC
EndDialog
SetWindowTextW
GetWindowLongPtrW
SendMessageW
SetTimer
CopyRect
LoadIconW
GetClientRect
GetDlgItem
DrawTextW
GetDesktopWindow
GetParent
DialogBoxParamW
gdi32
SelectObject
advapi32
SystemFunction036
CloseServiceHandle
OpenSCManagerA
StartServiceW
QueryServiceConfigW
OpenServiceW
QueryServiceStatusEx
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
GetTokenInformation
RegQueryInfoKeyW
RegEnumKeyExW
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
CryptDestroyKey
CryptVerifySignatureA
CryptAcquireContextA
CryptCreateHash
CryptHashData
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
wintrust
WinVerifyTrust
shell32
ShellExecuteExW
shlwapi
PathStripToRootW
PathCommonPrefixW
PathAppendW
PathUnquoteSpacesW
PathRemoveFileSpecW
Sections
.text Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE