Static task
static1
Behavioral task
behavioral1
Sample
PassatHook.exe_gUBZqPuSIJnX5FV.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
PassatHook.exe_gUBZqPuSIJnX5FV.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
PassatHook.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
PassatHook.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
__MACOSX/._PassatHook.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
__MACOSX/._PassatHook.exe
Resource
win10v2004-20240508-en
General
-
Target
PassatHook.exe_gUBZqPuSIJnX5FV.zip
-
Size
14.3MB
-
MD5
dad2effbc84aa95076b51a8937016096
-
SHA1
f143c16924405dc7dcaaaea0e523fa53e5ebc806
-
SHA256
2b1e0b37bd858b12d042f9b148c4e27e6a5edfc1fd3722e8a1fc498befc15d22
-
SHA512
9874797a8452ae4dddcf29830582e7758cbb01a741bb678c40d214af5be06703dcb52f56f3f11a09622589a531d893310c8cdd46ef91f9b80ef220dcafb33848
-
SSDEEP
393216:60PE/fmoLiKke7FVyZD/h6KPxaIDcGdfCkkl8MHEM6:Pc/fmwXkeVyZ7nPYIgGdfxYc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/PassatHook.exe
Files
-
PassatHook.exe_gUBZqPuSIJnX5FV.zip.zip
-
PassatHook.exe.exe windows:6 windows x64 arch:x64
14aea59ec1bd2f23d73118af48b03464
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateDirectoryA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetKeyState
gdi32
GetDeviceCaps
shell32
ShellExecuteA
msvcp140
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_47
D3DCompile
dwmapi
DwmExtendFrameIntoClientArea
winmm
PlaySoundA
imm32
ImmSetCompositionWindow
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-heap-l1-1-0
malloc
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf
api-ms-win-crt-runtime-l1-1-0
terminate
api-ms-win-crt-convert-l1-1-0
strtoull
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-math-l1-1-0
_fdclass
api-ms-win-crt-time-l1-1-0
_localtime64_s
api-ms-win-crt-string-l1-1-0
strcmp
api-ms-win-crt-utility-l1-1-0
rand
advapi32
RegSetValueExW
Sections
.text Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Roa Size: - Virtual size: 8.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.NL~ Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.iE| Size: 15.8MB - Virtual size: 15.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
__MACOSX/._PassatHook.exe