Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win10-20230220-en
General
-
Target
loader.exe
-
Size
6.8MB
-
MD5
1734215bf5c2b50f28b3afdfa6e3cabb
-
SHA1
d7a83d18a9ed982563f615888cb51e3e54b11cab
-
SHA256
d82a603f3234533921be5443eeed03daac75a8cd715eb01b1fc9b53f79dbf7a5
-
SHA512
33305fef4cb5b9851e7fe3b45a71e40a9b466f9c82244623a3e0373d1283e3b3fdae1c72a1994d7047a010f9cb3debb3bbbd7f5af0dfb6a480786aa7b8e702fb
-
SSDEEP
98304:hbFFL7m3ObCZmFzO9w8xv+DW33roXOM2pbYehDxDTeYgfEbBf4+BRlbU:hpFaObCZezB8xvN7nMYYe9d4EbBAD
Malware Config
Signatures
Files
-
loader.exe.exe windows x64
82e37ea1e1fc5ab70cc5a7fc1faa6630
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
GetTokenInformation
kernel32
GetCurrentThreadId
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetForegroundWindow
CharUpperBuffW
gdi32
GetDeviceCaps
shell32
ShellExecuteA
imm32
ImmSetCompositionWindow
msvcp140
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
userenv
UnloadUserProfile
d3d9
Direct3DCreate9
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
urlmon
URLDownloadToFileA
ntdll
NtQuerySystemInformation
vcruntime140_1
__CxxFrameHandler4
vcruntime140
strchr
api-ms-win-crt-stdio-l1-1-0
_get_stream_buffer_pointers
api-ms-win-crt-string-l1-1-0
strcspn
api-ms-win-crt-utility-l1-1-0
srand
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-runtime-l1-1-0
__sys_nerr
api-ms-win-crt-filesystem-l1-1-0
_unlink
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-math-l1-1-0
ceilf
bcrypt
BCryptGenRandom
normaliz
IdnToAscii
ws2_32
accept
wldap32
ord217
crypt32
CertEnumCertificatesInStore
Sections
.text Size: - Virtual size: 780KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.}'g Size: - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Az& Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.8~K Size: 6.8MB - Virtual size: 6.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ