D:\Perforce\1666\depot\stg\install\install\utils\WULaunchApp_CN\x64\Release\WULaunchApp_CN.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk
-
Size
577KB
-
MD5
7daf0e15401f2cf0cc13592dc63c5b55
-
SHA1
aa307d7ec500baf6fea6f7388dd59ab427be12f0
-
SHA256
657dd292929810602b1edd43a3970867639949b66b95e683567baefae8353aa0
-
SHA512
485ade2cf26d6309189cfc6215b12d880eb4c1f4485463f2aaceed49e83ea723e2ed98412726ef79799c4ac4ba907fe470e30f49ae26bc13bc70da24c0dee882
-
SSDEEP
6144:kn2yi4uy3wpb5MyzHPea26rafnxa5igm/RXTG01muPUexRoh4xwigLtjWTQat+1N:knR7uy3y5TvA6G5PL/HoLxlat+OOst
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk
Files
-
2024-08-08_7daf0e15401f2cf0cc13592dc63c5b55_ryuk.exe windows:6 windows x64 arch:x64
ddd3eaa99a5d7be53f641f06582d7038
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetProcAddress
GetModuleHandleW
GetCurrentProcess
TerminateProcess
GetWindowsDirectoryW
CreateFileW
WideCharToMultiByte
GetPrivateProfileStringW
GetPrivateProfileSectionW
GetSystemInfo
SetEndOfFile
HeapSize
ReadConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetProcessHeap
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetModuleFileNameW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
FindClose
FindNextFileW
FindFirstFileW
CloseHandle
GetSystemDirectoryW
GetCurrentProcessId
CreateMutexW
OpenMutexW
GetCommandLineW
VerifyVersionInfoW
VerSetConditionMask
LocalFree
LocalAlloc
lstrlenW
GetLastError
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
HeapFree
HeapReAlloc
HeapAlloc
GetFileType
WriteConsoleW
GetFileAttributesExW
LoadLibraryExW
FreeLibrary
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
SetEvent
IsProcessorFeaturePresent
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
LoadStringW
wsprintfW
LoadIconW
LoadCursorW
RegisterClassExW
DialogBoxParamW
DestroyWindow
DefWindowProcW
BeginPaint
EndPaint
PostQuitMessage
EndDialog
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryInfoKeyW
RegDeleteKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
RegOpenKeyExW
RegCreateKeyExW
RegDeleteValueW
shell32
SHGetMalloc
SHGetPathFromIDListW
SHGetFolderLocation
SHGetSpecialFolderPathW
ole32
CoCreateInstance
shlwapi
PathFileExistsW
PathIsDirectoryW
msi
ord32
ord171
ord8
ord92
ord159
ord160
ord118
ord48
setupapi
SetupDiDestroyDeviceInfoList
SetupDiRemoveDevice
SetupDiGetDeviceRegistryPropertyW
SetupUninstallOEMInfW
SetupDiGetDevicePropertyW
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
rpcrt4
UuidCreate
UuidToStringW
Sections
.text Size: 283KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE