D:\REPOS LASTEST SP\nova_base\x64\Release\nova_base.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_5774bd8c66504430c6811200c6cf12d8_ryuk.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-29_5774bd8c66504430c6811200c6cf12d8_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_5774bd8c66504430c6811200c6cf12d8_ryuk
-
Size
9.4MB
-
MD5
5774bd8c66504430c6811200c6cf12d8
-
SHA1
3f9d916cbc2e1050c3fead40d04976a01596e8a4
-
SHA256
aa931efda62a271be1dc73e4a6fcadfb3d411e9496e0b4ebcc5259da6482c18a
-
SHA512
e3dafca652b3016db01eb0541f1008412e92ee833cc3790528761dd6dca8b74ec1b2fdd8a702c0fc19d56f8ad45cb4cb5b17fb1811f10b63203efadd959d54cf
-
SSDEEP
98304:LKn+r5WdfpuIWICtgHI09F6/TiBlXR10A7UU:2nIgoICtGf6b+B10A4U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-29_5774bd8c66504430c6811200c6cf12d8_ryuk
Files
-
2024-08-29_5774bd8c66504430c6811200c6cf12d8_ryuk.exe windows:6 windows x64 arch:x64
825c29ab6cc2f351c3c1117801331d7c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
AcquireSRWLockExclusive
AreFileApisANSI
CheckRemoteDebuggerPresent
CloseHandle
CompareStringW
CreateEventW
CreateFileA
CreateFileMappingA
CreateFileMappingW
CreateFileW
CreatePipe
CreateProcessW
CreateRemoteThread
CreateThread
CreateToolhelp32Snapshot
DecodePointer
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExitThread
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetConsoleWindow
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandleEx
GetFileSizeEx
GetFileType
GetFullPathNameW
GetLastError
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetUserDefaultLCID
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
InitializeSRWLock
InterlockedPushEntrySList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
K32GetModuleInformation
LCMapStringEx
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LocalFree
MapViewOfFile
Module32FirstW
Module32NextW
MultiByteToWideChar
OpenProcess
OutputDebugStringW
Process32FirstW
Process32NextW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ReadProcessMemory
ReleaseSRWLockExclusive
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFileInformationByHandle
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualProtect
VirtualQueryEx
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
WriteProcessMemory
user32
ClientToScreen
CloseClipboard
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
EmptyClipboard
FindWindowA
GetAsyncKeyState
GetCapture
GetClientRect
GetClipboardData
GetCursorPos
GetForegroundWindow
GetKeyState
GetMessageExtraInfo
GetSystemMetrics
GetWindowThreadProcessId
IsWindowUnicode
LoadCursorW
OpenClipboard
PeekMessageW
PostQuitMessage
RegisterClassExW
ReleaseCapture
ScreenToClient
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetLayeredWindowAttributes
SetWindowLongW
ShowWindow
TrackMouseEvent
TranslateMessage
UnregisterClassW
UpdateWindow
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
d3d11
D3D11CreateDeviceAndSwapChain
ws2_32
InetPtonW
WSACleanup
WSAGetLastError
WSAStartup
closesocket
connect
htons
recv
send
socket
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
dwmapi
DwmExtendFrameIntoClientArea
imm32
ImmGetContext
ImmReleaseContext
ImmSetCandidateWindow
ImmSetCompositionWindow
d3dcompiler_43
D3DCompile
ntdll
NtQuerySystemInformation
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlInitUnicodeString
dbghelp
ImageDirectoryEntryToData
ImageNtHeader
ImageRvaToVa
Sections
.text Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.2MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.voltbl Size: 512B - Virtual size: 358B
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ