C:\Users\docker\Documents\workspace\build-v2\common\hrkill\bin\usysdiag-helper-x64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_b944b45a650ab30d1c9fc6ee22939315_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_b944b45a650ab30d1c9fc6ee22939315_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_b944b45a650ab30d1c9fc6ee22939315_ryuk
-
Size
461KB
-
MD5
b944b45a650ab30d1c9fc6ee22939315
-
SHA1
67557c8564cc5580cb36524f784600dccdedcd3c
-
SHA256
ae7b5361bca2c2ce182b3a9f4600ce5c8259c47f358827b1598ed6b91c6bf776
-
SHA512
9195d876b2ef31fa58712c768e6aac773631cf4ac34a7103a16de62d955a716ccb4ee024b8ca0b769b75d4d6d8b828a3e7b10e9d4a12e94651da22085a1baa6f
-
SSDEEP
6144://RGEN/RB9RWQ2nswypG669NKP3ODbNRga6Ka7EPLWlnfvxw2TCDW8c3FmMOsFk://oivDWRnsfgNKP3Orgaiy2TCDWXFf1k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-13_b944b45a650ab30d1c9fc6ee22939315_ryuk
Files
-
2024-09-13_b944b45a650ab30d1c9fc6ee22939315_ryuk.exe windows:5 windows x64 arch:x64
f3b9c61743e138ecb275b6d196d2227a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCommandLineW
WaitForSingleObject
CreateThread
ExitProcess
SetProcessWorkingSetSize
TlsSetValue
HeapFree
SetLastError
InitializeCriticalSectionAndSpinCount
GetQueuedCompletionStatus
LocalAlloc
GetCurrentThreadId
HeapSize
PostQueuedCompletionStatus
GetExitCodeThread
GetLastError
SetEvent
TlsAlloc
HeapReAlloc
RaiseException
ResetEvent
HeapAlloc
DecodePointer
HeapDestroy
GetProcessHeap
VirtualQueryEx
TlsFree
CreateEventA
CreateIoCompletionPort
VirtualQuery
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
OutputDebugStringA
SetConsoleCtrlHandler
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
OpenThread
TerminateThread
TerminateProcess
FreeLibrary
GetCurrentDirectoryW
CreateFileA
GetCurrentDirectoryA
SetFilePointer
WriteFile
SearchPathW
ReadFile
DeviceIoControl
ExpandEnvironmentStringsA
IsBadReadPtr
SearchPathA
GetSystemInfo
LoadLibraryA
CreateFileW
GetVersion
GetProcAddress
GetModuleHandleA
GetTickCount
WideCharToMultiByte
DeleteCriticalSection
LocalFree
GetWindowsDirectoryW
CloseHandle
Sleep
MultiByteToWideChar
OpenProcess
InitializeCriticalSection
LeaveCriticalSection
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
GetCurrentProcess
GetLongPathNameW
EnterCriticalSection
VirtualAlloc
VirtualFree
VirtualProtect
GetFileAttributesA
TlsGetValue
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlPcToFileHeader
EncodePointer
RtlUnwindEx
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
GetCommandLineA
ExitThread
ResumeThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
GetACP
GetStringTypeW
GetCurrentThread
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
ReadConsoleW
user32
EnumDesktopWindows
GetParent
GetWindowRect
UnregisterClassA
OpenDesktopA
EnumWindowStationsA
GetWindowThreadProcessId
IsWindowVisible
CloseWindowStation
EnumDesktopsA
CloseDesktop
OpenWindowStationA
advapi32
RegLoadKeyA
RegOpenKeyW
ConvertSidToStringSidW
OpenProcessToken
RegCloseKey
RegEnumKeyExA
RegQueryValueExW
RegSaveKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetSidSubAuthorityCount
GetSidSubAuthority
GetUserNameW
LookupAccountNameW
GetSidIdentifierAuthority
BuildExplicitAccessWithNameA
SetSecurityDescriptorDacl
SetEntriesInAclA
GetSecurityDescriptorDacl
RegGetKeySecurity
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetKeySecurity
RegSetValueExW
RegSetValueExA
InitializeSecurityDescriptor
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
GetTokenInformation
shell32
CommandLineToArgvW
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
crypt32
CryptQueryObject
CertCloseStore
CryptMsgGetParam
CertFindCertificateInStore
CertGetNameStringW
CertFreeCertificateContext
CryptMsgClose
Sections
.text Size: 322KB - Virtual size: 321KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ