Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_136011b3ada4d0351dc0807c8050b8f8_ryuk.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-08_136011b3ada4d0351dc0807c8050b8f8_ryuk.exe
Resource
win10v2004-20240802-en
Target
2024-09-08_136011b3ada4d0351dc0807c8050b8f8_ryuk
Size
4.5MB
MD5
136011b3ada4d0351dc0807c8050b8f8
SHA1
147bbba8da1e4d9ae12f59b6de5332c49e0d2814
SHA256
af048588dbea5dcd435edd6768c0a8028e130ed053cfcb77136b29134897cf2d
SHA512
c8c2c0d4a116af3926063c9fdf2c58643666f069d188686ff975b6258f2bacd54532af8b0e213869a572ee9550d2a25d1e3e3b7898a0bacea1937e68b6d20a3a
SSDEEP
49152:YIRz3iu7xnOAa4PTKuk/nhnSjzhm/DK+6V+0QTYwkmq:1ZNNk/hnSjzv3V+0QTYwkN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetStdHandle
FindClose
FindFirstFileA
FindNextFileA
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
GetConsoleCursorInfo
SetConsoleScreenBufferSize
SetConsoleCursorPosition
SetConsoleCursorInfo
SetConsoleWindowInfo
SetConsoleTextAttribute
GetConsoleMode
SetConsoleMode
GetEnvironmentVariableA
OutputDebugStringA
CloseHandle
GetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
Sleep
GetCurrentProcess
GetCurrentProcessId
CreateThread
GetCurrentThread
TerminateThread
GetExitCodeThread
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
GetLogicalProcessorInformation
SetDefaultDllDirectories
HeapReAlloc
CreateFileA
DeviceIoControl
GetSystemDirectoryA
MultiByteToWideChar
WideCharToMultiByte
HeapSize
WriteConsoleW
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
GetSystemFirmwareTable
FindFirstFileExA
GetFileAttributesExW
CreateProcessA
GetExitCodeProcess
CreateDirectoryW
CreateFileW
GetTimeZoneInformation
GetStringTypeW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
VirtualProtect
VirtualQuery
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleFileNameW
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReadFile
GetDriveTypeW
GetFullPathNameA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetCurrentDirectoryW
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleCtrlHandler
WriteFile
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetFileType
FlushFileBuffers
GetConsoleCP
ReadConsoleW
SetFilePointerEx
DeleteFileW
SetEndOfFile
ExitWindowsEx
CoCreateInstance
CoInitializeEx
CoUninitialize
CoInitializeSecurity
CoSetProxyBlanket
SysAllocString
SysAllocStringLen
SysFreeString
VariantInit
VariantChangeType
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdA
SetupDiDestroyDeviceInfoList
CM_Open_DevNode_Key
CM_Get_DevNode_Status
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
SetupDiOpenDevRegKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ