Static task
static1
Behavioral task
behavioral1
Sample
2024-09-12_d483c78a0e46110c4caea8bffb26e724_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-12_d483c78a0e46110c4caea8bffb26e724_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-12_d483c78a0e46110c4caea8bffb26e724_ryuk
-
Size
719KB
-
MD5
d483c78a0e46110c4caea8bffb26e724
-
SHA1
81c9942a2a109216b51e2613f65fa53d7c1e880d
-
SHA256
ac26f5c357e6a2a140447d01fbddccef2c6d2ee299b2128ec3f74edff625b166
-
SHA512
0ed413b09aeb7f90ef3ebdeac78dcccf7126b5aeab6353bf278342e682eb68fdcb48a3fe895526ba2ca4d0bf253d309c4cf9af79feec8268664640753fd9280d
-
SSDEEP
12288:nVoj8xyGnpqsuSjNimorFkVYj3h52qXIdkfO5SJVU9ribmYQNzc6ep/k/AWqq+bH:nVoj8xyGnpqsuSjNimorFwYjf2q4zSJn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-12_d483c78a0e46110c4caea8bffb26e724_ryuk
Files
-
2024-09-12_d483c78a0e46110c4caea8bffb26e724_ryuk.exe windows:6 windows x64 arch:x64
996df09fdcf200b0ad426a9441a2870b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CloseHandle
CreateThread
GlobalLock
lstrcpyW
CreateFileMappingW
MapViewOfFile
GetTickCount
GlobalUnlock
GetCommConfig
EraseTape
HeapFree
SetLastError
SetPriorityClass
GetCurrentProcess
lstrlenW
DeviceIoControl
TerminateProcess
GetModuleFileNameW
GetSystemTimes
CreateMutexW
GetLargePageMinimum
lstrlenA
DecodeSystemPointer
CreateMutexA
GlobalDeleteAtom
GetACP
OpenProcess
GetCommandLineA
CreateToolhelp32Snapshot
CreateEventW
Sleep
GetTickCount64
Process32NextW
GetMaximumProcessorGroupCount
GlobalFree
DisableThreadLibraryCalls
GetCurrentThread
LoadLibraryA
GlobalAlloc
Process32FirstW
HeapAlloc
FindAtomA
UnregisterApplicationRestart
WTSGetActiveConsoleSessionId
ExitProcess
GetCurrentProcessId
GetProcessHeap
ConvertFiberToThread
SetFileApisToANSI
lstrcmpiW
GetConsoleAliasExesLengthA
GetDriveTypeW
DebugSetProcessKillOnExit
SizeofResource
LockResource
LoadResource
FindResourceW
GetModuleHandleW
WriteConsoleW
SetFilePointerEx
ReadConsoleW
SetEndOfFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
SetEvent
lstrcpyA
lstrcatW
GetLastError
SetFileAttributesW
ExitThread
UnmapViewOfFile
CreateFileW
WaitForSingleObject
FindClose
ReadFile
SetFilePointer
SetErrorMode
VirtualAlloc
WriteFile
HeapSize
LCMapStringW
FindNextFileW
VirtualFree
FindFirstFileW
DefineDosDeviceW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleExW
GetFileType
RaiseException
user32
GetPropW
wsprintfW
CharUpperW
CharUpperBuffW
FindWindowW
FlashWindow
CloseClipboard
gdi32
SetDIBits
advapi32
SetServiceStatus
GetTokenInformation
LookupAccountSidW
DuplicateTokenEx
RegDisablePredefinedCacheEx
RevertToSelf
CryptAcquireContextW
RegisterServiceCtrlHandlerW
OpenProcessToken
CreateProcessAsUserW
StartServiceCtrlDispatcherW
CryptEncrypt
shell32
SHGetSpecialFolderPathW
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
shlwapi
StrStrW
PathFindFileNameW
crypt32
CryptImportPublicKeyInfo
CryptStringToBinaryA
CryptDecodeObjectEx
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wtsapi32
WTSFreeMemory
WTSEnumerateSessionsW
WTSQueryUserToken
WTSQuerySessionInformationW
rstrtmgr
RmRestart
RmStartSession
RmShutdown
RmEndSession
RmRegisterResources
RmGetList
Sections
.text Size: 665KB - Virtual size: 665KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ