C:\b\build\slave\Win_x64\build\src\out\Release_x64\delegate_execute.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_54f4dddb8e052a996cf5a9198219029b_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-21_54f4dddb8e052a996cf5a9198219029b_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-21_54f4dddb8e052a996cf5a9198219029b_ryuk
-
Size
809KB
-
MD5
54f4dddb8e052a996cf5a9198219029b
-
SHA1
5d8d3658782737740f55a70f34afbd550a658d92
-
SHA256
0c6ff56c1283e70f33e9ad7fbfa7bfd48eb314dd91aab3d3a7cfe2ab39e942a4
-
SHA512
3dd577716fb24a2007c2d4da364e3a3e996480acd54d22aa0658fe0a34f9d25b80436a3dd646b2cecba25fd3448bd22300bd6b084f2233942029922a761880ee
-
SSDEEP
12288:w3jI1S5dE+0LDOVqiorZ2hIWG24av6o/Vl8S8xUvoQFLhW:WSgqioAhIWG24avxV7vPlW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-21_54f4dddb8e052a996cf5a9198219029b_ryuk
Files
-
2024-09-21_54f4dddb8e052a996cf5a9198219029b_ryuk.exe windows:5 windows x64 arch:x64
6e45766d073347ad3d4c20f1ec0b5f64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegSetValueExW
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
ConvertSidToStringSidW
RegQueryValueExW
SystemFunction036
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameW
wininet
InternetCrackUrlW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
timeGetTime
shlwapi
PathFindFileNameW
PathRemoveExtensionW
PathFindExtensionW
kernel32
LocalFree
GetCurrentProcess
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
GetFileAttributesW
ReadFile
WriteFile
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetUserDefaultLangID
GetEnvironmentVariableW
LoadLibraryW
TerminateProcess
OpenProcess
GetVersionExW
GetNativeSystemInfo
OutputDebugStringA
GetCurrentProcessId
GetTickCount
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
FlushFileBuffers
GetFileInformationByHandle
SetFilePointerEx
GetCurrentThreadId
FindClose
FindFirstFileExW
FindNextFileW
GetProcessId
CreateThread
GetWindowsDirectoryW
ExpandEnvironmentStringsW
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
GetModuleHandleExW
VirtualQuery
ResetEvent
WaitForMultipleObjects
GetSystemInfo
VirtualQueryEx
RtlCaptureContext
InitializeCriticalSection
ReleaseSemaphore
CreateSemaphoreW
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
CompareStringW
LockResource
GlobalLock
GlobalUnlock
GetPrivateProfileStringW
GetTimeZoneInformation
CreateFileA
WideCharToMultiByte
Sleep
CreateEventW
OpenMutexW
WaitForSingleObject
SetEvent
SetLastError
CloseHandle
GetCommandLineW
GetTempPathW
MultiByteToWideChar
lstrcmpiW
FindResourceW
SizeofResource
LoadResource
LoadLibraryExW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
CreateProcessW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
DecodePointer
GetProcessHeap
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetCommandLineA
GetUserDefaultUILanguage
GetOEMCP
IsValidCodePage
ReadConsoleW
WriteConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapSize
GetStdHandle
HeapReAlloc
HeapFree
HeapAlloc
GetACP
GetDriveTypeW
ExitProcess
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
GetFullPathNameW
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
LoadLibraryExA
VirtualProtect
GetSystemDirectoryW
ole32
CoCreateInstance
CoTaskMemAlloc
CoResumeClassObjects
CoUninitialize
CoAddRefServerProcess
CoRevokeClassObject
StringFromGUID2
CLSIDFromString
CoTaskMemFree
CoReleaseServerProcess
CoTaskMemRealloc
CoInitializeEx
ReleaseStgMedium
CoRegisterClassObject
oleaut32
SysAllocString
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
SysStringLen
VarUI4FromStr
SysFreeString
user32
CharUpperW
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
AllowSetForegroundWindow
GetAsyncKeyState
CharNextW
RegisterClipboardFormatW
Exports
Exports
GetHandleVerifier
Sections
.text Size: 437KB - Virtual size: 437KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 756B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ