Static task
static1
Behavioral task
behavioral1
Sample
QuadraBlade Bypass.vmp.exe
Resource
win10v2004-20240508-en
General
-
Target
QuadraBlade Bypass.vmp.exe
-
Size
25.0MB
-
MD5
4d5c16554395c85e8c405b1c2f8689be
-
SHA1
db9c7213447ee20bd6fb0e4e4e3f787150a06778
-
SHA256
8e676f215868ab9d4827c70cd1687d57903121ab628464648d28479e4630fb16
-
SHA512
c1be1bdd4902744353730decb71ed0802e42b3d748616492d4c4e7f67b8701b05f6b2bd58743cdd5e5ea29fcbfad5d3130a5f83562eba0b06d81f2ca577469e2
-
SSDEEP
393216:rQuq2b5+9F2h255T5di+Zt+CC5Uu7/13DPjVMFRC/+mCH5iHmgyTU87jw:rHx5+9FPxpZK5DpjOF8/+RH5qyTU8v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource QuadraBlade Bypass.vmp.exe
Files
-
QuadraBlade Bypass.vmp.exe.exe windows:6 windows x64 arch:x64
15e34ac0b409dfae16cd54c7922791c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetConsoleWindowInfo
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetForegroundWindow
advapi32
RegCreateKeyExW
shell32
ShellExecuteExA
msvcp140
?_LogWorkItemStarted@_TaskEventLogger@details@Concurrency@@QEAAXXZ
urlmon
URLDownloadToFileW
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memset
api-ms-win-crt-runtime-l1-1-0
_cexit
api-ms-win-crt-stdio-l1-1-0
setvbuf
api-ms-win-crt-heap-l1-1-0
_callnewh
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-filesystem-l1-1-0
_lock_file
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
libcrypto-3-x64
EVP_DigestUpdate
libcurl
curl_easy_init
Sections
.text Size: - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.%7z Size: - Virtual size: 15.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.7mj Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.E@= Size: 24.8MB - Virtual size: 24.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ