C:\Users\swe_r\source\repos\LegionPreLoader\x64\Release\legionpreloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
LegionLoader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LegionLoader.exe
Resource
win10v2004-20240221-en
General
-
Target
LegionLoader.exe
-
Size
11.3MB
-
MD5
5a663a1a97e946d0510d1249ac8ff90f
-
SHA1
f400a9ed3ba941c1c5948380caadeccb9584510f
-
SHA256
39daa35d998d6d0e3085d7fb590903ec89f8162a8761fda76677521be27751b5
-
SHA512
2d017e263278cc56d1dc97e8bb139c7930286597339f094709a505b68e7eef2084084bd61dd7fb0166de4fb07fb0911eca5947d21d3219ed868511836123590a
-
SSDEEP
98304:Vw3xe8D30UvJdPHTd07OdXy62RusiJI8DWMljQPRP:ixe8AUX/UkyHusiJZJZKt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource LegionLoader.exe
Files
-
LegionLoader.exe.exe windows:6 windows x64 arch:x64
Password: password
918e868139a57e501365ddf43d91314c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
ReadFile
GetFileSizeEx
TerminateProcess
WaitForSingleObjectEx
GetModuleHandleA
CloseHandle
CreateProcessA
MultiByteToWideChar
WideCharToMultiByte
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetLastError
HeapSize
InitializeCriticalSectionEx
GetCurrentProcess
CreateFileW
HeapFree
SetFilePointerEx
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
EncodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
CreateEventW
GetModuleHandleW
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlUnwindEx
RtlPcToFileHeader
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
ExitProcess
WriteFile
user32
MessageBoxA
advapi32
ImpersonateLoggedOnUser
DuplicateTokenEx
RevertToSelf
wininet
HttpOpenRequestA
InternetSetOptionA
InternetCloseHandle
HttpSendRequestA
InternetReadFile
InternetConnectA
InternetOpenA
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
WTSQueryUserToken
secur32
GetUserNameExW
dxgi
CreateDXGIFactory
Sections
.text Size: 551KB - Virtual size: 551KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vlizer Size: 10.6MB - Virtual size: 10.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdatq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE