D:\Projects\paid_memes\virus\Release\stub.pdb
Behavioral task
behavioral1
Sample
6673441d5e4c3adcbe670fd4025b90549bbc259224653a6795c123d59ff92a30.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6673441d5e4c3adcbe670fd4025b90549bbc259224653a6795c123d59ff92a30.exe
Resource
win10v2004-20240226-en
General
-
Target
6673441d5e4c3adcbe670fd4025b90549bbc259224653a6795c123d59ff92a30.sample
-
Size
308KB
-
MD5
a33262199abfa39774d5f5e69957dde8
-
SHA1
0792fe4d9f514d587edf772aa6acc6d0879e4974
-
SHA256
6673441d5e4c3adcbe670fd4025b90549bbc259224653a6795c123d59ff92a30
-
SHA512
958f569a47284b2ee41e9754d529b80078dcd218cc8a7bbdcf372589f0ea9dbfb8f69ef7b116f6c057edf4159373ed38dcbf17c7757a5f8f0236e68e91b89a88
-
SSDEEP
6144:Ek4DdotiH8um78UhQyZ72VQShKLzuTHDZnV24lYgfg:L61m7rhQyZiBzegf
Malware Config
Signatures
-
MedusaLocker payload 1 IoCs
Processes:
resource yara_rule sample family_medusalocker -
Medusalocker family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6673441d5e4c3adcbe670fd4025b90549bbc259224653a6795c123d59ff92a30.sample
Files
-
6673441d5e4c3adcbe670fd4025b90549bbc259224653a6795c123d59ff92a30.sample.exe windows:6 windows x86 arch:x86
fff356a865da7e37d77c9a6241dfb565
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
crypt32
CryptStringToBinaryW
shlwapi
StrStrIW
PathFindExtensionW
PathIsUNCW
mpr
WNetAddConnection2W
WNetGetConnectionW
kernel32
FindFirstVolumeW
SetVolumeMountPointW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
DeleteVolumeMountPointW
FindNextVolumeW
GetDriveTypeW
ReadFile
FindFirstFileExW
FindNextFileW
WriteFile
SetEndOfFile
FindClose
CreateFileW
SubmitThreadpoolWork
SetFilePointerEx
GetConsoleWindow
lstrcmpiW
QueryDosDeviceW
MoveFileW
CreateThreadpoolWork
SizeofResource
GetCurrentProcess
TerminateProcess
InitializeProcThreadAttributeList
WaitForSingleObject
OpenProcess
MultiByteToWideChar
UpdateProcThreadAttribute
LockResource
LoadResource
FindResourceW
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
WideCharToMultiByte
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetFileSizeEx
GetFileAttributesExW
GetWindowsDirectoryW
CloseHandle
GetLastError
CreateJobObjectW
SetInformationJobObject
GetProcessHeap
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
HeapReAlloc
DecodePointer
WriteConsoleW
GetLogicalDrives
SetConsoleTitleW
LocalFree
FormatMessageA
GetLocaleInfoEx
RaiseException
WaitForSingleObjectEx
Sleep
GetCurrentThreadId
GetExitCodeThread
IsProcessorFeaturePresent
FreeLibraryWhenCallbackReturns
CloseThreadpoolWork
GetModuleHandleExW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
GetProcAddress
InitializeConditionVariable
WakeConditionVariable
QueryPerformanceCounter
QueryPerformanceFrequency
InitOnceComplete
InitOnceBeginInitialize
InitializeSRWLock
TryAcquireSRWLockExclusive
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
ExitProcess
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
GetExitCodeProcess
user32
ShowWindow
RegisterWindowMessageW
GetShellWindow
GetWindowThreadProcessId
IsWindowVisible
GetAsyncKeyState
advapi32
RegSetValueExW
OpenProcessToken
GetTokenInformation
CryptDestroyKey
CryptGetKeyParam
CryptAcquireContextW
CryptDecrypt
CryptImportKey
CryptReleaseContext
RegCloseKey
RegCreateKeyExW
ole32
CoGetObjectContext
CoGetApartmentType
Sections
.text Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ