Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_e4e64aa6740fb4531c3b314b6594b832_ryuk.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-06_e4e64aa6740fb4531c3b314b6594b832_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_e4e64aa6740fb4531c3b314b6594b832_ryuk
-
Size
694KB
-
MD5
e4e64aa6740fb4531c3b314b6594b832
-
SHA1
0a9b75f95b6b42a076985422659bd0432943960c
-
SHA256
e8b83caeac648d6a2e8a532739e9d1a212f4205ca821fab52cad7cb69c03678a
-
SHA512
3da7ee1e40023225ce98a465bd76b89f584ca91730015c79f059a715e88cfe7bbe3a4f73747e258f2c37460406a11053437a9457e22e71a99ded7a4dbe7a1b79
-
SSDEEP
12288:gYAei633RU3J5HYkA1ILrzj7d8Sr3UT9yNbLOYkzNkHshgdUENsu/:gYvRsA2LrzjZ82C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-06_e4e64aa6740fb4531c3b314b6594b832_ryuk
Files
-
2024-09-06_e4e64aa6740fb4531c3b314b6594b832_ryuk.exe windows:6 windows x64 arch:x64
ea6a03194e1de3ada6e504564e33844e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
RtlPcToFileHeader
RtlUnwindEx
NtQueryObject
RtlNtStatusToDosError
NtQueryInformationProcess
winhttp
WinHttpCrackUrl
kernel32
HeapSize
ReadConsoleW
WriteConsoleW
SetStdHandle
FindNextFileW
FindFirstFileExW
FindClose
GetCommandLineW
GetCommandLineA
SetEnvironmentVariableA
GetCurrentProcess
CreateDirectoryW
GetSystemFirmwareTable
SizeofResource
Process32First
WriteFile
FindResourceA
GetModuleHandleA
CreateToolhelp32Snapshot
GetLastError
CreateFileA
LoadLibraryA
LockResource
Process32Next
CloseHandle
LoadLibraryW
LoadResource
SearchPathA
GetProcAddress
GetModuleHandleW
FreeLibrary
OpenThread
IsDebuggerPresent
LocalFree
FormatMessageA
SetInformationJobObject
WriteProcessMemory
AssignProcessToJobObject
CreateJobObjectW
CreateFileW
DuplicateHandle
OpenProcess
CreateEventW
SetEvent
VirtualAllocEx
WideCharToMultiByte
WaitForSingleObjectEx
Sleep
GetCurrentThread
GetCurrentThreadId
QueryPerformanceCounter
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
GetThreadTimes
GetModuleFileNameW
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
RaiseException
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapReAlloc
HeapFree
GetStdHandle
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
GetProcessHeap
IsValidCodePage
advapi32
SystemFunction036
Sections
.text Size: 340KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ