Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win11-20231215-en
General
-
Target
loader.exe
-
Size
7.3MB
-
MD5
edd2636cdb7b09dddb5454545638ab68
-
SHA1
ce39fe6845e9a70793347243b4d97ed1cf5fcfd2
-
SHA256
a8e94a30172f57519b3b7511ed0316fc4c0cf227b20bbd2356808bca14735309
-
SHA512
13f49ea9738620308b702fc6ed1a5004d40ef83057ac8adc06bd26628323313dd3449ff78065d0e24b449a09552356f053ce369d51ad3fa8da71c433cbeb5872
-
SSDEEP
196608:TrnKmc8aYbwdgExY9dRs69Kf4aDW1GUTnwKuzu41xC2:TjRoq3QDWIEwKuF1xC2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource loader.exe
Files
-
loader.exe.exe windows:6 windows x64 arch:x64
6ec7f59e25f7f05072ebc48fc539694a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateProcessA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
RegisterClassExW
gdi32
DeleteDC
advapi32
RegDeleteKeyA
shell32
SHGetKnownFolderPath
ole32
CoCreateGuid
oleaut32
VariantClear
ntdll
NtResumeThread
msvcp140
??1_Lockit@std@@QEAA@XZ
shlwapi
PathFindExtensionW
ws2_32
closesocket
crypt32
CertOpenStore
secur32
InitSecurityInterfaceW
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_47
D3DCompile
imm32
ImmSetCompositionWindow
gdiplus
GdiplusShutdown
dnsapi
DnsNameCompare_W
rpcrt4
UuidCreate
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcmp
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-string-l1-1-0
strcmp
api-ms-win-crt-runtime-l1-1-0
terminate
api-ms-win-crt-stdio-l1-1-0
fsetpos
api-ms-win-crt-utility-l1-1-0
rand
api-ms-win-crt-convert-l1-1-0
_itow_s
api-ms-win-crt-filesystem-l1-1-0
remove
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-math-l1-1-0
fmodf
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
Sections
🧠<'0P Size: - Virtual size: 508KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
🧠_qT( Size: - Virtual size: 589KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
🧠GhQ5 Size: - Virtual size: 787KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
🧠=`9> Size: - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
🧠Bz:! Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
🧠r>he Size: - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
🧠].E5 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
🧠2ea& Size: 7.3MB - Virtual size: 7.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
🧠.$3G Size: 1024B - Virtual size: 737B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ