C:\dvs\p4\build\sw\rel\gpu_drv\r570\r572_46\drivers\ngx\updater\_out\wddm2_amd64_release\nvngx_update.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-10_d918980d1484deffcfa471b890ea91b5_hijackloader_ryuk.exe
Resource
win7-20250207-en
General
-
Target
2025-03-10_d918980d1484deffcfa471b890ea91b5_hijackloader_ryuk
-
Size
1.1MB
-
MD5
d918980d1484deffcfa471b890ea91b5
-
SHA1
6c47d08adb28df9d1a1c91f577779d58396b2121
-
SHA256
c004247f123066bcfb70264dc60756756c21f75d5cb5c6dd7d440498335681ba
-
SHA512
6c8b6e93233bb566174313942f23b0db1c2ce06ceda4b47c2b9e6d7bc8f8af31a2fda12ec2ec2c5d955df05a432a18cdb9c55187b9567851a8cff359a5763f3b
-
SSDEEP
24576:NzsgAzDeeBtuzLDdk4kHw49x9XTxpPdIo4Me88Zbc2N6:NiPjunDeJXxUoi8Cca6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-10_d918980d1484deffcfa471b890ea91b5_hijackloader_ryuk
Files
-
2025-03-10_d918980d1484deffcfa471b890ea91b5_hijackloader_ryuk.exe windows:6 windows x64 arch:x64
321369fe882de2892933e88e2f61f373
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
DeleteCriticalSection
LoadLibraryW
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileW
FindNextFileW
RemoveDirectoryW
FindClose
SetFileAttributesW
DeleteFileW
MoveFileExW
LoadLibraryExW
FormatMessageA
ReadFile
SetFilePointer
CreateFileA
VerifyVersionInfoW
FreeLibrary
GetModuleHandleW
VerSetConditionMask
WriteConsoleW
FreeEnvironmentStringsW
LocalFree
GetProcAddress
GetSystemDirectoryW
GetFileAttributesW
CreateFileW
LocalAlloc
GetFullPathNameW
SetLastError
GetModuleFileNameA
AllocConsole
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetProcessHeap
SetEndOfFile
CreateEventA
CreateThread
FreeConsole
OutputDebugStringA
WriteFile
GetStdHandle
SetConsoleTitleA
GetModuleFileNameW
CloseHandle
SetEvent
GetLastError
Sleep
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetCurrentProcessId
OpenEventA
GetFileAttributesExW
SetStdHandle
GetTimeZoneInformation
HeapSize
SetFilePointerEx
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetCommandLineW
GetCommandLineA
HeapReAlloc
HeapFree
HeapAlloc
ExitThread
GetCurrentDirectoryW
SetEnvironmentVariableA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
FormatMessageW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionEx
QueryPerformanceFrequency
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
SleepEx
GetFileSizeEx
TryEnterCriticalSection
GetCurrentThreadId
EncodePointer
DecodePointer
GetCPInfo
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlPcToFileHeader
RaiseException
RtlUnwindEx
ExitProcess
GetModuleHandleExW
CreateDirectoryW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
shlwapi
PathFileExistsW
advapi32
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
InitializeSecurityDescriptor
ConvertStringSidToSidW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclA
SetSecurityDescriptorDacl
CryptDestroyHash
shell32
SHCreateDirectoryExW
SHGetKnownFolderPath
ole32
CoTaskMemFree
bcrypt
BCryptGenRandom
normaliz
IdnToAscii
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
ws2_32
socket
htons
WSAIoctl
setsockopt
WSACleanup
WSAStartup
WSASetLastError
ntohs
WSAGetLastError
htonl
__WSAFDIsSet
connect
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockopt
listen
recv
select
accept
WSAWaitForMultipleEvents
bind
getaddrinfo
freeaddrinfo
getpeername
getsockname
ioctlsocket
closesocket
Sections
.text Size: 793KB - Virtual size: 792KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 261KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ