bg3_watcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-20_adb24599b21f7bdb28422b8e5ece9d92_megazord.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-20_adb24599b21f7bdb28422b8e5ece9d92_megazord.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-20_adb24599b21f7bdb28422b8e5ece9d92_megazord
-
Size
3.4MB
-
MD5
adb24599b21f7bdb28422b8e5ece9d92
-
SHA1
c0d752faf21c05396168e152df23465ce0e12a08
-
SHA256
8b0ce18aba546ffd47e2326112f4ff4067b1b762eb4f1f7b08f0b64c1fdc3652
-
SHA512
26abd4f984ea5e5d8685dd4f6587c395717640b2baddfe7e5b5d348ec3976ba386c449ad7af0645b6c74e038ed150ad1e8fec6979d492a1d3af0b20ef1dbe800
-
SSDEEP
49152:BL0unALwQP5L9KNxfJaYid/SUkOZxvrfTEsRbcq68CnJlSgdBfyiX3D6ZzUfO:BRA0QPgx3idd5rhsNVyiX3D6ZzUf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-20_adb24599b21f7bdb28422b8e5ece9d92_megazord
Files
-
2024-05-20_adb24599b21f7bdb28422b8e5ece9d92_megazord.exe windows:6 windows x64 arch:x64
a7ec21330d8fddc4a62a562c93beeab5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WaitOnAddress
WakeByAddressAll
WakeByAddressSingle
bcryptprimitives
ProcessPrng
gdi32
SetBkMode
GetDeviceCaps
DeleteDC
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateSolidBrush
DeleteObject
SetTextColor
kernel32
SetFilePointerEx
InitializeSListHead
GetSystemTimeAsFileTime
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetLastError
HeapFree
HeapReAlloc
GetStdHandle
GetConsoleMode
SetConsoleMode
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
WaitForSingleObjectEx
LoadLibraryA
GetProcAddress
GetCurrentProcess
lstrlenW
GetCurrentProcessId
CreateMutexA
CloseHandle
ReleaseMutex
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
CreateWaitableTimerExW
Sleep
SetWaitableTimer
WaitForSingleObject
SwitchToThread
LoadLibraryW
LoadLibraryExW
FreeLibrary
GetCurrentThread
MultiByteToWideChar
WriteConsoleW
GetModuleHandleA
SetLastError
QueryPerformanceFrequency
GetModuleHandleW
FormatMessageW
GetCurrentDirectoryW
GetEnvironmentVariableW
GetTempPathW
CreateFileW
SetFileInformationByHandle
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFullPathNameW
FindNextFileW
CreateDirectoryW
FindFirstFileW
FindClose
ReadConsoleW
CreateThread
ExitProcess
QueryPerformanceCounter
HeapAlloc
GetProcessHeap
GetFinalPathNameByHandleW
GetFileType
GetSystemTimePreciseAsFileTime
DeleteFileW
LoadLibraryExA
GetCurrentThreadId
CreateMutexW
GetCommandLineW
GetModuleFileNameW
AllocConsole
SetConsoleTitleW
WideCharToMultiByte
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetSystemInfo
GetNativeSystemInfo
IsDebuggerPresent
GetConsoleOutputCP
FlushFileBuffers
HeapSize
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
UnhandledExceptionFilter
GetModuleHandleExW
TerminateProcess
WriteFile
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
shell32
SHGetKnownFolderPath
Shell_NotifyIconGetRect
Shell_NotifyIconW
ole32
CoTaskMemFree
user32
CreateWindowExW
RegisterClassW
RedrawWindow
RegisterClassExW
GetSystemMetrics
GetRawInputData
CreatePopupMenu
ValidateRect
DispatchMessageW
DestroyWindow
RegisterWindowMessageA
TranslateMessage
SetTimer
KillTimer
GetMessageW
DefWindowProcW
SetWindowLongPtrW
CreateMenu
MapVirtualKeyW
LoadImageW
InvalidateRgn
PeekMessageW
TrackPopupMenu
SetForegroundWindow
ClientToScreen
MonitorFromWindow
GetCursorPos
SetWindowPos
SetMenuItemInfoW
DrawIconEx
GetDC
AdjustWindowRectEx
RemoveMenu
DrawMenuBar
SetMenu
MessageBoxW
ReleaseDC
GetWindowDC
OffsetRect
GetWindowRect
MapWindowPoints
GetClientRect
GetMenuBarInfo
DrawTextW
FillRect
GetMenuItemInfoW
SendInput
PostQuitMessage
SendMessageW
ShowWindow
CheckMenuItem
SystemParametersInfoA
GetMenu
CreateAcceleratorTableW
DestroyAcceleratorTable
DestroyMenu
DestroyIcon
IsProcessDPIAware
RegisterRawInputDevices
GetWindowLongW
GetWindowLongPtrW
AppendMenuW
comctl32
SetWindowSubclass
RemoveWindowSubclass
DefSubclassProc
ntdll
NtReadFile
NtWriteFile
RtlNtStatusToDosError
oleaut32
SysFreeString
GetErrorInfo
SysStringLen
psapi
EnumProcessModulesEx
GetModuleFileNameExW
EnumProcesses
advapi32
RegQueryValueExW
SystemFunction036
RegOpenKeyExW
bcrypt
BCryptGenRandom
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 855KB - Virtual size: 854KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 283KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ