C:\tcag1\work\17c22847bd57b040\ESIF\Products\ESIF_UF\Sources\win\projs\x64\Win10Release\esif_uf_64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_f8b6d28e0c9ccb200ba78595be619b82_ryuk.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-29_f8b6d28e0c9ccb200ba78595be619b82_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_f8b6d28e0c9ccb200ba78595be619b82_ryuk
-
Size
2.6MB
-
MD5
f8b6d28e0c9ccb200ba78595be619b82
-
SHA1
b1a9018733b97047610904e16713dfd81075a264
-
SHA256
c6b6eaf6bee8ef8da4a6f48ce00cc4971ee351363a75b148f4eb30ed34edd369
-
SHA512
a0f1bb36c509c83c05a863ed7a67ce83484ae063b38946471a031d510f35ff7b708a27ab2719df1fedee61c11bb61bb5d050e0c62b7ef44c55326c302c8828e8
-
SSDEEP
49152:bdZpxYT0shsbPtUd4wD0BUizLNiXicJFFRGNzj3:8UtZBZ7wRGpj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-29_f8b6d28e0c9ccb200ba78595be619b82_ryuk
Files
-
2024-08-29_f8b6d28e0c9ccb200ba78595be619b82_ryuk.exe windows:6 windows x64 arch:x64
009f2479574379d512a798dfa381487a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ole32
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoInitializeEx
PropVariantClear
wsock32
__WSAFDIsSet
listen
WSACleanup
WSAStartup
getservbyname
socket
setsockopt
select
recv
accept
ioctlsocket
htons
closesocket
bind
send
setupapi
SetupDiCreateDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiCallClassInstaller
SetupDiRemoveDevice
SetupDiGetDeviceRegistryPropertyW
SetupDiSetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
powrprof
SetSuspendState
PowerGetActiveScheme
PowerSetActiveScheme
PowerReadPossibleFriendlyName
PowerWritePossibleFriendlyName
PowerWriteSettingAttributes
PowerRemovePowerSetting
PowerWriteACValueIndex
PowerWriteDCValueIndex
PowerReadACValueIndex
PowerReadDCValueIndex
kernel32
GetFullPathNameW
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetCurrentThread
HeapAlloc
HeapFree
GetACP
GetCommandLineA
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreW
CreateWaitableTimerW
UnregisterWaitEx
RegisterWaitForSingleObject
ReleaseSRWLockShared
AcquireSRWLockShared
QueryPerformanceCounter
QueryPerformanceFrequency
FindClose
FindFirstFileA
FindNextFileA
Sleep
OpenThread
CreateThread
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryA
LocalFree
FormatMessageA
OutputDebugStringA
ReleaseMutex
CreateMutexW
SetEvent
OpenEventW
LoadLibraryW
CreateEventW
GetCurrentThreadId
GetThreadId
CreateFileA
DeviceIoControl
GetEnvironmentVariableA
GetTempPathW
GetTempPathA
GetFullPathNameA
CreateMutexA
GetCurrentProcess
SetPriorityClass
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemWindowsDirectoryA
GetModuleFileNameW
GetSystemPowerStatus
ResetEvent
GetStdHandle
GetCommandLineW
WaitForMultipleObjects
TerminateProcess
GetExitCodeProcess
ExitThread
GetExitCodeThread
CreateProcessW
WriteConsoleInputW
CreateFileW
FlushFileBuffers
ReadFile
WriteFile
ConnectNamedPipe
DisconnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
WaitNamedPipeW
GetOverlappedResult
WTSGetActiveConsoleSessionId
CreateDirectoryW
DeleteFileW
RemoveDirectoryW
GetModuleHandleW
LoadResource
LockResource
SizeofResource
FindResourceW
CopyFileW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
InterlockedFlushSList
SetStdHandle
HeapReAlloc
GetStringTypeW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesW
CreateProcessA
GetFileAttributesExW
OutputDebugStringW
WaitForSingleObjectEx
FindFirstFileExA
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
SetConsoleCtrlHandler
WriteConsoleW
HeapSize
SetEndOfFile
SetLastError
CompareStringW
GetTimeFormatW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedPushEntrySList
GetDateFormatW
user32
UnregisterClassW
RegisterClassExW
SendMessageW
ShowWindow
UpdateWindow
LoadCursorW
DispatchMessageW
TranslateMessage
GetMessageW
EnumDisplayDevicesW
GetSystemMetrics
RegisterPowerSettingNotification
UnregisterPowerSettingNotification
DefWindowProcW
CreateWindowExW
PostQuitMessage
advapi32
SystemFunction036
ReportEventA
RegisterEventSourceW
DeregisterEventSource
StartServiceW
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerExW
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
DuplicateTokenEx
CreateProcessAsUserW
ConvertStringSidToSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetLengthSid
GetAclInformation
AddAce
AddAccessAllowedAce
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
wtsapi32
WTSQueryUserToken
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 297KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 617KB - Virtual size: 617KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE