Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_aeb704c2f2ae87bf928b97676d1ba4f4_rdat_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_aeb704c2f2ae87bf928b97676d1ba4f4_rdat_ryuk.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_aeb704c2f2ae87bf928b97676d1ba4f4_rdat_ryuk
-
Size
1.1MB
-
MD5
aeb704c2f2ae87bf928b97676d1ba4f4
-
SHA1
d0747d150949a1648086670061580043fdcc8b0f
-
SHA256
a160bcd7010a4ddeded409ca37a7464623bbed9a35fd10ddaf29d4af92b62107
-
SHA512
8336a89fe0e5f73b195e4f100191bd6042e2f7f448fbcfdd0161302941aad5e1aaaa51919f9a40b68015ad7702e64df72010fb69e358a680cba266e53a9a3d22
-
SSDEEP
24576:b489KoOSYZ9f89aoFoqZJTk1WqJIeBi//SW9X:b4xoxYZ9fiaGIWqCeBRk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-09_aeb704c2f2ae87bf928b97676d1ba4f4_rdat_ryuk
Files
-
2024-10-09_aeb704c2f2ae87bf928b97676d1ba4f4_rdat_ryuk.exe windows:6 windows x64 arch:x64
47481967b7c15520e0e2d122427e10ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
RtlPcToFileHeader
RtlUnwindEx
RtlCaptureStackBackTrace
NtSetInformationWorkerFactory
NtQueryInformationWorkerFactory
TpAllocJobNotification
TpAllocAlpcCompletion
NtAlpcSetInformation
NtAlpcCreatePort
ZwSetIoCompletion
ZwSetInformationFile
RtlAdjustPrivilege
ZwAssociateWaitCompletionPacket
NtAlpcConnectPort
NtSetTimer2
NtQueryObject
RtlNtStatusToDosError
NtQueryInformationProcess
winhttp
WinHttpCrackUrl
kernel32
WriteConsoleW
HeapSize
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
GetCurrentProcess
GetLastError
LocalFree
FormatMessageA
SizeofResource
WriteFile
GetModuleHandleA
CreateToolhelp32Snapshot
Process32NextW
CreateFileA
LoadLibraryA
LockResource
Process32FirstW
CloseHandle
LoadLibraryW
LoadResource
FindResourceW
SearchPathA
GetProcAddress
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
IsDebuggerPresent
CreateThreadpoolIo
CreateThreadpoolWait
CreateThreadpoolTimer
CreateThreadpoolWork
SetInformationJobObject
WriteProcessMemory
AssignProcessToJobObject
CreateJobObjectW
CreateFileW
DuplicateHandle
OpenProcess
CreateEventW
SetEvent
VirtualAllocEx
FormatMessageW
WaitForSingleObjectEx
Sleep
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetNativeSystemInfo
QueryPerformanceCounter
QueryPerformanceFrequency
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
TryEnterCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
GetStartupInfoW
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
GetThreadTimes
FreeLibraryAndExitThread
GetModuleFileNameW
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
SetProcessAffinityMask
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForMultipleObjectsEx
WaitForSingleObject
FindNextFileA
FindFirstFileExW
FindFirstFileExA
RaiseException
ExitProcess
GetModuleHandleExW
HeapAlloc
ExitThread
ResumeThread
HeapReAlloc
HeapFree
GetStdHandle
GetModuleFileNameA
GetACP
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetProcessHeap
SetConsoleCtrlHandler
OutputDebugStringA
FindClose
advapi32
SystemFunction036
Sections
.text Size: 685KB - Virtual size: 685KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ