D:\Projects\WinRAR\build\winrar64\Release\WinRAR.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-20_aa6337426e9cc594c745e3b403f6443a_ryuk.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-20_aa6337426e9cc594c745e3b403f6443a_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-20_aa6337426e9cc594c745e3b403f6443a_ryuk
-
Size
2.0MB
-
MD5
aa6337426e9cc594c745e3b403f6443a
-
SHA1
26898f81e7e11dd5892411a123d29c7693c168a4
-
SHA256
0cc8da86439f6dece7efdad4300601ebbcd18c49c9aacdfe909033b868086e4c
-
SHA512
062a2e33d20c7d46f7ff52982067e3d8dd05e09e640404afcf5f94a40bb2dbff52f5a5215e623f9955aee862b5d9c938994c1019fb4d9c2e8aaa8012e438e829
-
SSDEEP
49152:zO6JXnYyTahNvHQE2LcA1aSTM4buRntPcvEDvvwXiMMMMMMmlEf6JU1QxwZd:q6Wjx2LgksRMMMMMMmaf6JU1Q2d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-20_aa6337426e9cc594c745e3b403f6443a_ryuk
Files
-
2024-08-20_aa6337426e9cc594c745e3b403f6443a_ryuk.exe windows:5 windows x64 arch:x64
1ce1e28fd550fa3a8c4fb42370d43c64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
comctl32
InitCommonControlsEx
ImageList_ReplaceIcon
ord8
CreateStatusWindowW
ImageList_Remove
ImageList_AddMasked
ImageList_Add
ImageList_Destroy
ImageList_Create
PropertySheetW
shlwapi
StrCmpLogicalW
SHAutoComplete
uxtheme
IsAppThemed
IsThemeActive
kernel32
FindNextFileW
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
ExpandEnvironmentStringsW
FindFirstChangeNotificationW
FindCloseChangeNotification
GetFileInformationByHandle
LocalFree
FormatMessageW
DeviceIoControl
BackupRead
BackupSeek
GetShortPathNameW
GetLongPathNameW
GetFileType
GetStdHandle
FlushFileBuffers
GetFileTime
GetDiskFreeSpaceExW
GetVersionExW
GetCurrentDirectoryW
GetFullPathNameW
FoldStringW
LoadResource
SizeofResource
FindResourceW
LoadLibraryExW
CompareStringA
GetCurrentThread
SetThreadPriority
SetThreadExecutionState
GetSystemDirectoryW
SetCurrentDirectoryW
GetFullPathNameA
SetPriorityClass
GetProcessAffinityMask
CreateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
CreateEventW
CreateSemaphoreW
GetSystemTime
TzSpecificLocalTimeToSystemTime
GetCPInfo
IsDBCSLeadByte
WideCharToMultiByte
CompareStringW
GetModuleHandleExW
GetCompressedFileSizeW
EnumResourceNamesW
EnumResourceLanguagesW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
GetLocaleInfoW
GetNumberFormatW
GetLogicalDrives
SuspendThread
ResumeThread
GetCurrentThreadId
GetLocalTime
CopyFileW
GetThreadPriority
SetErrorMode
GetPriorityClass
WaitForMultipleObjects
MulDiv
CompareFileTime
FindNextChangeNotification
GetDiskFreeSpaceW
WriteConsoleW
SetStdHandle
LCMapStringW
HeapReAlloc
GetModuleFileNameA
ExitProcess
GetConsoleCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
QueryPerformanceFrequency
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
HeapSize
GetFileAttributesW
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileW
GetTimeFormatW
GetDateFormatW
GetModuleFileNameW
GetCommandLineW
WaitForSingleObject
CloseHandle
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetTempPathW
GetProcAddress
GetModuleHandleW
GetVersionExA
MultiByteToWideChar
CreateHardLinkW
SetLastError
DosDateTimeToFileTime
LocalFileTimeToFileTime
HeapFree
HeapAlloc
GlobalAlloc
HeapDestroy
HeapCreate
CreateProcessW
GetTickCount
DeleteFileW
SetFileAttributesW
CreateFileW
RemoveDirectoryW
CreateDirectoryW
LoadLibraryW
GetStringTypeW
GetSystemTimeAsFileTime
SetFileTime
SetFilePointer
SetEndOfFile
ReadFile
WriteFile
GetFileSize
FreeLibrary
MoveFileW
GetCPInfoExW
GetOEMCP
GetACP
GetVolumeInformationW
GetDriveTypeW
Sleep
GetCurrentProcessId
GetCurrentProcess
CreateMutexW
ReleaseMutex
GetLastError
GlobalFree
GlobalUnlock
GlobalLock
GlobalSize
user32
RegisterClassW
IsChild
GetClipboardData
LoadAcceleratorsW
LoadMenuW
SetMenu
GetMenuItemID
GetLastActivePopup
GetMenuState
FlashWindow
CopyRect
RegisterClassExW
GetSysColor
ValidateRect
CopyImage
FillRect
DrawIconEx
SystemParametersInfoW
GetSystemMenu
KillTimer
SetTimer
MessageBoxIndirectW
CharLowerW
CharUpperW
ExitWindowsEx
CharLowerA
LoadStringW
GetWindow
SetProcessDefaultLayout
CharToOemBuffW
OemToCharBuffA
OemToCharA
GetComboBoxInfo
MessageBeep
PostQuitMessage
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
PeekMessageW
MessageBoxW
EnableMenuItem
CheckMenuItem
MoveWindow
LoadImageW
GetClientRect
GetWindowTextLengthW
SetWindowTextW
EndPaint
BeginPaint
UpdateWindow
AppendMenuW
GetMenuItemCount
DrawMenuBar
wsprintfW
SetWindowLongPtrW
ScreenToClient
ClientToScreen
CallWindowProcW
PtInRect
SetMenuItemInfoW
GetMenuItemInfoW
InsertMenuItemW
TrackPopupMenu
DeleteMenu
InsertMenuW
GetSubMenu
DestroyMenu
CreatePopupMenu
GetMenu
IsWindow
WaitForInputIdle
LoadIconW
SetScrollPos
SetScrollRange
ScrollWindowEx
CreateDialogParamW
PostThreadMessageW
IsDialogMessageW
GetIconInfo
CreateIconIndirect
FindWindowW
RemovePropW
GetPropW
SetPropW
GetForegroundWindow
TranslateAcceleratorW
CreateDialogIndirectParamW
BringWindowToTop
DispatchMessageW
TranslateMessage
GetMessageW
RegisterWindowMessageW
CharToOemA
FindWindowExW
LoadCursorW
GetWindowThreadProcessId
WindowFromPoint
SetCursor
GetKeyState
RegisterClipboardFormatW
SystemParametersInfoA
GetDesktopWindow
GetWindowLongPtrW
IntersectRect
CreateIcon
EnumWindows
SetForegroundWindow
LoadBitmapW
IsCharAlphaW
GetCursorPos
ReleaseDC
GetDC
GetSystemMetrics
EnableWindow
IsIconic
IsWindowEnabled
IsDlgButtonChecked
GetDlgItemInt
SetDlgItemInt
CharToOemBuffA
ShowWindow
GetClassNameW
EnumChildWindows
InvalidateRect
PostMessageW
CheckDlgButton
DestroyIcon
GetParent
MapWindowPoints
GetWindowRect
SendDlgItemMessageW
GetDlgItemTextW
SetDlgItemTextW
GetDlgItem
EndDialog
DialogBoxParamW
IsWindowVisible
SetWindowPlacement
GetWindowPlacement
SetWindowPos
SetWindowLongW
GetWindowLongW
GetWindowTextW
SetFocus
DestroyWindow
CreateWindowExW
DefWindowProcW
SendMessageW
RedrawWindow
GetFocus
gdi32
CreatePen
CreateSolidBrush
SetTextColor
TextOutW
Polygon
Polyline
CreateCompatibleDC
DeleteDC
GetPixel
GetObjectW
BitBlt
SetBkColor
ExtTextOutW
GetTextFaceW
CreateCompatibleBitmap
GetDeviceCaps
GetMapMode
SetMapMode
StretchBlt
DPtoLP
CreateDIBSection
GetTextExtentPoint32W
LineTo
Rectangle
SetPixel
MoveToEx
CreatePatternBrush
TextOutA
GetTextMetricsW
SelectObject
CreateBitmap
DeleteObject
CreateFontW
comdlg32
CommDlgExtendedError
GetSaveFileNameW
GetOpenFileNameW
ChooseFontW
advapi32
SystemFunction036
AccessCheck
OpenProcessToken
AllocateAndInitializeSid
FreeSid
MapGenericMask
GetFileSecurityW
CheckTokenMembership
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
IsTextUnicode
RegSetValueExW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
SetFileSecurityW
GetSecurityDescriptorLength
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
LookupPrivilegeValueW
AdjustTokenPrivileges
DuplicateToken
shell32
DragFinish
DragQueryFileW
Shell_NotifyIconW
DragAcceptFiles
ShellExecuteW
SHGetSpecialFolderLocation
ord100
SHAddToRecentDocs
SHFileOperationW
SHGetFolderPathW
ShellExecuteExW
SHBrowseForFolderW
SHGetMalloc
SHChangeNotify
SHGetDesktopFolder
SHGetFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
FindExecutableW
ole32
CreateStreamOnHGlobal
CoTaskMemAlloc
CoInitializeEx
CLSIDFromString
CoCreateInstance
OleSetClipboard
DoDragDrop
OleInitialize
OleUninitialize
CoTaskMemFree
oleaut32
VariantClear
SysAllocString
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 681KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 214KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE