Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
2024-09-07_150fdfcf72ba2f9f6e35de9d06ef2d4f_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_150fdfcf72ba2f9f6e35de9d06ef2d4f_ryuk.exe
Resource
win10v2004-20240802-en
Target
2024-09-07_150fdfcf72ba2f9f6e35de9d06ef2d4f_ryuk
Size
46.2MB
MD5
150fdfcf72ba2f9f6e35de9d06ef2d4f
SHA1
40ab08f42e954c63ac1ce787b63ffe6456cf49dc
SHA256
0465bcc5e13cb158493c8dcc12fa7e212ba08e225acf042f14e036f3d8cc715f
SHA512
b487d65edce2865617bee78a4f6e20a44a8fcc15a693b7cc1854a1b7429f05ac2a95d429b43a4abaf867079f6ae17e29dcf0f6416100935fc5598cde788c894e
SSDEEP
786432:ENYUfehBMmJi3wnkWsmJRlPnUiqVop4mXujiWD3PwWKzbsZ1L:HUf6DRlKVeXujHfCbsTL
metasploit
encoder/shikata_ga_nai
metasploit
windows/reverse_tcp
192.168.1.147:5555
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
E:\J\WS\workspace\PhotoKit_All\bin64\PhotoProjects1_866_feature-PE-7958_2996108_BUILD001_WIN64_setup.pdb
CreateThread
CreateProcessW
GetModuleFileNameW
LocalFree
GetFileAttributesW
CreateFileA
CreateFileW
GetFileSize
ReadFile
SetFilePointer
WriteFile
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
Sleep
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
HeapSize
ReadConsoleW
WriteConsoleW
GetTimeZoneInformation
SetStdHandle
OutputDebugStringW
OutputDebugStringA
SetConsoleCtrlHandler
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
WaitForSingleObject
CloseHandle
GetCommandLineW
GetStdHandle
GetTempPathW
CreateDirectoryW
FindResourceW
SizeofResource
VerSetConditionMask
LockResource
LoadResource
VerifyVersionInfoW
SetUnhandledExceptionFilter
GetOEMCP
IsValidCodePage
FindNextFileW
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
FormatMessageW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlPcToFileHeader
RaiseException
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
GetFileAttributesExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetACP
HeapAlloc
HeapFree
HeapReAlloc
GetCurrentThread
GetConsoleCP
GetConsoleMode
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
SetFilePointerEx
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
SetEndOfFile
MessageBoxA
LoadImageW
LoadCursorW
RedrawWindow
EndPaint
UpdateWindow
GetSystemMetrics
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
DefWindowProcW
BeginPaint
Rectangle
MoveToEx
GetObjectW
SelectObject
LineTo
GetStockObject
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateCompatibleDC
BitBlt
CommandLineToArgvW
SHFileOperationW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ