C:\dvs\p4\build\sw\rel\gpu_drv\r570\r572_46\drivers\ui\NvSmartMax\NvSmartMaxApp\bin\Release64\NvSmartMaxapp64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-10_8c5d60fbed2b0256cc3c9ab3ff0dbdde_ryuk.exe
Resource
win7-20240903-en
General
-
Target
2025-03-10_8c5d60fbed2b0256cc3c9ab3ff0dbdde_ryuk
-
Size
286KB
-
MD5
8c5d60fbed2b0256cc3c9ab3ff0dbdde
-
SHA1
fe9571922d8f65d609b309f55f891666d5538e6b
-
SHA256
cfa1b2d87e208d0343c43496b6d41558942a8639e0ac34de1b3761a1cfbdb951
-
SHA512
8b6a51f53613c597fcc43af0147124828bfdd9f5c2c6dd0c60772f3a511b9c989b8ef888d4e950109bf1049e29dda1a2601eb5d5150f37b8cccaba4541d69499
-
SSDEEP
3072:VIEQef2xyLHUTmCqvDO0Od6NBZNnUhAYZJj3hLKKKKKU8AAFTbp8ELQHsoOJNuYc:rQB47UFq7O16NBZNDkofJXnIZR1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-10_8c5d60fbed2b0256cc3c9ab3ff0dbdde_ryuk
Files
-
2025-03-10_8c5d60fbed2b0256cc3c9ab3ff0dbdde_ryuk.exe windows:6 windows x64 arch:x64
55a56bd66cdb461c6ec05ff6572b7e77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
LocalAlloc
CreateFileW
GetFileAttributesW
GetSystemDirectoryW
GetLastError
CloseHandle
GetProcAddress
LocalFree
VerSetConditionMask
GetModuleHandleW
FreeLibrary
VerifyVersionInfoW
LoadLibraryExW
GetCurrentProcess
Wow64DisableWow64FsRedirection
GetEnvironmentVariableW
CreateMutexW
WaitForSingleObject
GetCurrentThreadId
OpenEventW
CreateThread
SetCurrentDirectoryW
SetDllDirectoryW
IsWow64Process
GetModuleFileNameW
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
GetProcessHeap
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFullPathNameW
SetLastError
GetConsoleMode
GetModuleFileNameA
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
WriteConsoleW
user32
GetMessageW
DefWindowProcW
SubtractRect
GetWindowRect
GetDC
SetWindowPos
EqualRect
MonitorFromRect
EnumDisplayMonitors
CreateWindowExW
SendMessageW
RegisterClassExW
ShowWindow
OffsetRect
DispatchMessageW
GetMonitorInfoW
IsRectEmpty
TranslateMessage
FindWindowW
LoadCursorW
PostQuitMessage
SystemParametersInfoW
UpdateWindow
InvalidateRect
ReleaseDC
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ