C:\zede\semuno86\menadekazeyaj-xew.pdb
Static task
static1
Behavioral task
behavioral1
Sample
055de3f0a4960212b79bbbd95fa0277a898702219752543287eed735e6b39d0a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
055de3f0a4960212b79bbbd95fa0277a898702219752543287eed735e6b39d0a.exe
Resource
win10v2004-20241007-en
General
-
Target
055de3f0a4960212b79bbbd95fa0277a898702219752543287eed735e6b39d0a
-
Size
318KB
-
MD5
f42af35f5aebf10bee3cd5d5753d4cc3
-
SHA1
326701fc79d80f51c63e2531ca95b722e5ec3994
-
SHA256
055de3f0a4960212b79bbbd95fa0277a898702219752543287eed735e6b39d0a
-
SHA512
64d972b723ddf848a9264d70b09075eaa30f6479eab9ce633906f8dec27135657db883635878789ee96d3f1ce13b5b7db2b7f12f55fa3cccb0a5fa927bfa81ae
-
SSDEEP
6144:gFL5YeNTft07bw4qt5xbRVoquGvEFMFXLX/A6n:01YeNTQbw445xbRiGvE6FbX/j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 055de3f0a4960212b79bbbd95fa0277a898702219752543287eed735e6b39d0a
Files
-
055de3f0a4960212b79bbbd95fa0277a898702219752543287eed735e6b39d0a.exe windows:5 windows x86 arch:x86
2bb4e5a139a2a29d6e02a63c04eada73
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetComputerNameExA
ConvertThreadToFiber
ZombifyActCtx
GetEnvironmentStringsW
WaitForSingleObject
SetVolumeMountPointW
EnumCalendarInfoExW
GetConsoleAliasesA
GetLocaleInfoW
GetProcessHandleCount
GetVersionExW
GetConsoleAliasW
WriteConsoleInputW
TerminateProcess
ReplaceFileW
FileTimeToSystemTime
GetConsoleAliasesW
SetLastError
GetProcAddress
VirtualAlloc
HeapSize
ResetEvent
LocalAlloc
GetModuleHandleA
GetStringTypeW
GlobalAddAtomW
ResetWriteWatch
WriteConsoleW
GetLastError
HeapReAlloc
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetLocaleInfoA
advapi32
AreAllAccessesGranted
Sections
.text Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.perozu Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ