c:\Build\products\windows\ssr\vc14build\x64\Release\ssr64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-20_7ae70e79c9a25920f8101dcd871cd23a_ryuk.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-20_7ae70e79c9a25920f8101dcd871cd23a_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-20_7ae70e79c9a25920f8101dcd871cd23a_ryuk
-
Size
1.3MB
-
MD5
7ae70e79c9a25920f8101dcd871cd23a
-
SHA1
2425a86f4c6d644725d105680163076f27b4e468
-
SHA256
51cd405adda976759246c8633c0d3971572f2b783bf11fff58374eeeffc54870
-
SHA512
5ebd07bd303065f2c3fba4093ee79bcf8e765c8cb1dd108fbc88ac41809185f6bbef7509e2115450ec219b3419bd4b46591a5e264b7467fff185c83a7c81be96
-
SSDEEP
12288:vrs0GfxQXUIAu5+RooHfjbXJ3JxGxedkGz8sWSmaTtTdFk9fisOuSWWyV:volfYF3oHfjLTgYdnpmaTMhNSQV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-20_7ae70e79c9a25920f8101dcd871cd23a_ryuk
Files
-
2024-08-20_7ae70e79c9a25920f8101dcd871cd23a_ryuk.exe windows:6 windows x64 arch:x64
a179091c2de63e525fd51e6275104e3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
safestore64
ord11
ord12
ord6
ord2
ord5
ord29
ord22
ord8
ord13
ord1
ord10
ord16
ord7
ord15
ord14
ord23
ord9
kernel32
FreeLibrary
CreateFileW
WriteConsoleW
SetFilePointerEx
HeapReAlloc
HeapSize
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetProcessHeap
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
MultiByteToWideChar
GetLastError
WideCharToMultiByte
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetEnvironmentStringsW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RaiseException
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
CloseHandle
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE