Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_4f767e5ddb2ffbbe1b5b7c4341ada3ae_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_4f767e5ddb2ffbbe1b5b7c4341ada3ae_ryuk.exe
Resource
win10v2004-20240802-en
Target
2024-10-05_4f767e5ddb2ffbbe1b5b7c4341ada3ae_ryuk
Size
685KB
MD5
4f767e5ddb2ffbbe1b5b7c4341ada3ae
SHA1
a39a27f8fe12c38040290a1518aa232739cd1ffb
SHA256
1bf274bb7c94b8f25c686cb9a22bb7efbacb4566110e7b002ce61d3462d171b5
SHA512
0a82b2cc2b436c30cd51a4a40be2e4cdbe1966ec6600051a8e323f2a0d06d3816f52e1a29e4c352f8766803e544d91684fe68c94aab8c6887b7b21d00fe97541
SSDEEP
12288:SuDNKZ7PoOoKyG2o+Eva4QasScpVHE+s+++s+Y+++s+++s+++sg:/8JQOoKr2yC4QasScpVk+s+++s+Y+++c
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
E:\svn\YaSuo\ChengXu\Tags\pdtag_1.3.2.19128\Temp\Release\Power64.pdb
PathFileExistsW
GetCurrentProcessId
GetCurrentThreadId
GetLastError
WaitForSingleObject
WriteFile
ReadFile
FindClose
GetModuleHandleW
CreateProcessW
GetTempPathW
CreateDirectoryW
CreateFileW
DeleteFileW
FindNextFileW
CopyFileW
MoveFileExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcess
SetUnhandledExceptionFilter
ReleaseMutex
CreateMutexW
OutputDebugStringW
GetSystemDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetProcessHeap
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
HeapReAlloc
HeapFree
HeapAlloc
OpenProcess
LocalFree
SetEndOfFile
LocalAlloc
GlobalFree
GlobalAlloc
WritePrivateProfileStringW
GetPrivateProfileStringW
GetModuleFileNameW
LoadLibraryW
CloseHandle
GetProcAddress
FreeLibrary
SetStdHandle
WriteConsoleW
ReadConsoleW
HeapSize
Process32NextW
LoadLibraryExW
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
GetCPInfo
RtlCaptureContext
wsprintfW
RegCloseKey
RegDeleteValueW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
ImpersonateLoggedOnUser
RevertToSelf
SHGetFolderPathW
SHGetSpecialFolderPathW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ