C:\kedefula.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc.exe
Resource
win10v2004-20241007-en
General
-
Target
1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc
-
Size
15.0MB
-
MD5
f480f6c7401bffe8b0f86af3ebcd0182
-
SHA1
af882623b8c62e80b69fe4b2d5841be744364665
-
SHA256
1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc
-
SHA512
84f00f4a7a2ad086a4f9fae8c08d854db6ec9c5df2feca1a4c76d01a5726522e86123d85e81fe01fdaca7569ff35805438ce0fa398a6e1e6a5c424c10eae00a6
-
SSDEEP
24576:PCoZopQ3TmLgqkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkP:Ksjms
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc
Files
-
1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc.exe windows:5 windows x86 arch:x86
8406c253adc95c5fe6849445a3438fac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ZombifyActCtx
GetConsoleAliasesLengthW
GetVersionExW
GetConsoleOutputCP
GetDefaultCommConfigA
FindFirstFileExA
GetDriveTypeW
FreeEnvironmentStringsW
SetProcessPriorityBoost
FindNextVolumeA
SetCurrentDirectoryA
GetLongPathNameA
TlsSetValue
SetComputerNameExA
FindAtomW
BuildCommDCBAndTimeoutsA
VirtualProtect
GetModuleHandleA
GlobalAlloc
InitializeCriticalSection
TlsGetValue
GetCommandLineW
InterlockedDecrement
GetCalendarInfoA
CopyFileA
OutputDebugStringW
SetSystemTimeAdjustment
GetPriorityClass
WritePrivateProfileStringW
GetProcessHeaps
GlobalWire
HeapCompact
GetStartupInfoA
GetDiskFreeSpaceExA
GetCPInfoExA
GetWindowsDirectoryW
GetSystemWow64DirectoryA
SetLastError
WriteProfileSectionW
GetCalendarInfoW
GetProfileStringA
SetConsoleCursorPosition
GetLastError
DeleteVolumeMountPointW
ContinueDebugEvent
WriteFile
GetNumberOfConsoleInputEvents
GetSystemWindowsDirectoryW
GlobalFindAtomA
FindNextChangeNotification
CreateActCtxA
GetMailslotInfo
GetPrivateProfileIntA
_lread
DefineDosDeviceA
SetVolumeMountPointA
EndUpdateResourceA
WriteConsoleW
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetPrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileSectionNamesW
GetFileAttributesExW
LocalFileTimeToFileTime
MoveFileW
GetVolumePathNameA
TerminateProcess
lstrcmpW
GetComputerNameA
FindActCtxSectionStringA
GetThreadContext
MoveFileExA
GetProcAddress
GlobalCompact
UnregisterWait
BuildCommDCBW
GlobalDeleteAtom
GetShortPathNameW
OpenEventA
SetCommTimeouts
WaitNamedPipeW
CreateIoCompletionPort
GetPrivateProfileSectionNamesA
FindResourceExW
GetSystemTimeAsFileTime
GetSystemInfo
FreeEnvironmentStringsA
GetLocalTime
OpenSemaphoreA
WriteProfileStringA
lstrcpyW
VerLanguageNameW
GetThreadSelectorEntry
GetSystemTime
UnlockFile
GetConsoleCP
GetConsoleAliasA
SetConsoleScreenBufferSize
GetAtomNameA
WriteConsoleInputW
CreateMailslotA
SetCommState
SetHandleCount
_lopen
ResetWriteWatch
ClearCommBreak
GetModuleHandleW
GetOverlappedResult
EnumDateFormatsA
GetConsoleAliasExesLengthW
WriteConsoleOutputCharacterA
HeapFree
OpenMutexW
GetStringTypeW
SetFilePointer
PostQueuedCompletionStatus
AreFileApisANSI
OpenWaitableTimerW
GetCurrentProcess
PeekNamedPipe
GetCompressedFileSizeW
FindNextVolumeMountPointA
GetFullPathNameA
WriteProfileStringW
InitAtomTable
GlobalAddAtomW
TerminateJobObject
SetFirmwareEnvironmentVariableA
GetBinaryTypeW
LeaveCriticalSection
QueryDosDeviceW
HeapSetInformation
CreateNamedPipeA
InterlockedIncrement
Sleep
DeleteCriticalSection
EnterCriticalSection
RaiseException
RtlUnwind
MoveFileA
GetCommandLineA
HeapValidate
IsBadReadPtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
IsDebuggerPresent
TlsAlloc
GetCurrentThreadId
TlsFree
CloseHandle
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
ExitProcess
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
DebugBreak
OutputDebugStringA
LoadLibraryW
InitializeCriticalSectionAndSpinCount
SetStdHandle
MultiByteToWideChar
GetStringTypeA
LCMapStringA
LCMapStringW
GetLocaleInfoA
LoadLibraryA
WriteConsoleA
CreateFileA
user32
OemToCharA
advapi32
GetFileSecurityW
msimg32
AlphaBlend
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mofino Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14.7MB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ