main
Static task
static1
Behavioral task
behavioral1
Sample
ape/LOADER.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ape/LOADER.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ape/ape.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ape/ape.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ape/msdia140.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
ape/msdia140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ape/symsrv.dll
Resource
win10v2004-20240802-en
General
-
Target
aa638d825247178b2fc296fc5610a617208a3c3888cdbcf4c5f92f8f514411cb
-
Size
6.4MB
-
MD5
4e19677a8d912e327fb68ed87bd22356
-
SHA1
89006d093c4c0447991070b25110363403b30df0
-
SHA256
aa638d825247178b2fc296fc5610a617208a3c3888cdbcf4c5f92f8f514411cb
-
SHA512
a346e3e39f267da5389fd2c6ac7ba6c1e20a52037e456d0aa0158a9205ae51ee01a4e63b726f91dacd73193e07f105c6b23c604e6f93fa8f2d034603009aeeb9
-
SSDEEP
98304:7S/whk3S2Kr0+XvuspaLK8G48lx4NY6rMC165t7+f7HoDirXHE5lzNdFFeBOmTmC:/hki2Uv1UP0aY6rM2cCjNrXEZdODmk9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ape/ape.dll
Files
-
aa638d825247178b2fc296fc5610a617208a3c3888cdbcf4c5f92f8f514411cb.zip
-
ape/LOADER.bat
-
ape/ape.dll.dll windows:6 windows x64 arch:x64
7e136c13a97eec68c03882b70aca1a21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
CreateToolhelp32Snapshot
user32
wsprintfW
gdi32
SelectObject
advapi32
CryptDestroyHash
ole32
CoInitialize
winmm
timeGetTime
wininet
InternetReadFile
fltlib
FilterFindFirst
ntdll
NtQuerySystemInformation
crypt32
CertFindCertificateInStore
wldap32
ord143
ws2_32
closesocket
shlwapi
SHDeleteKeyW
Exports
Exports
Sections
.text Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 591KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 87.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ape/instructions.txt
-
ape/msdia140.dll.dll regsvr32 windows:6 windows x64 arch:x64
87bf67b998dcd1bb1d9c95f9ed21fb26
Code Sign
33:00:00:00:c1:09:f8:02:41:bb:4d:aa:dc:00:00:00:00:00:c1Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before07/09/2016, 17:58Not After07/09/2018, 17:58SubjectCN=Microsoft Time-Stamp Service,OU=AOC+OU=nCipher DSE ESN:12E7-3064-6112,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:78:25:5a:b5:cd:23:c6:5f:95:00:01:00:00:01:78Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:11Not After11/08/2018, 20:11SubjectCN=Microsoft Corporation,OU=AOC,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:c3:0e:9b:a7:d8:b2:dc:f7:2c:00:00:00:00:00:c3Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:20Not After11/08/2018, 20:20SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
35:1c:e9:98:6f:b8:17:6f:a2:82:1a:c9:5a:03:0a:4c:34:bc:7d:e7:bd:90:78:38:06:7b:9b:1f:0b:5a:8e:40Signer
Actual PE Digest35:1c:e9:98:6f:b8:17:6f:a2:82:1a:c9:5a:03:0a:4c:34:bc:7d:e7:bd:90:78:38:06:7b:9b:1f:0b:5a:8e:40Digest Algorithmsha256PE Digest Matchestruee9:39:a6:06:86:d3:e7:da:6c:9f:b7:02:e5:36:e7:8c:ca:f6:80:1aSigner
Actual PE Digeste9:39:a6:06:86:d3:e7:da:6c:9f:b7:02:e5:36:e7:8c:ca:f6:80:1aDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
msdia140.pdb
Imports
kernel32
SetLastError
FindResourceExW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
LoadLibraryExW
GetProcAddress
LocalAlloc
LocalFree
GetModuleFileNameW
GetLastError
GetSystemInfo
InitializeCriticalSection
DeleteCriticalSection
LCMapStringW
UnmapViewOfFile
CloseHandle
EnterCriticalSection
LeaveCriticalSection
CreateFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
FileTimeToSystemTime
RaiseException
VirtualProtect
VirtualQuery
FreeLibrary
GetModuleHandleW
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetFullPathNameW
GetFullPathNameA
SetStdHandle
GetFileType
SetFilePointerEx
ReadFile
GetConsoleMode
ReadConsoleW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
WideCharToMultiByte
HeapFree
HeapAlloc
GetACP
GetStdHandle
GetStringTypeW
GetDriveTypeW
WriteFile
CompareStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetCurrentDirectoryW
HeapSize
HeapReAlloc
WriteConsoleW
SetEndOfFile
GetFileAttributesW
SetFileAttributesW
VirtualAlloc
VirtualFree
DeleteFileW
DeviceIoControl
ExpandEnvironmentStringsW
GetFileSizeEx
MapViewOfFileEx
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
VSDllRegisterServer
VSDllUnregisterServer
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ape/symsrv.dll.dll windows:10 windows x64 arch:x64
9ece4e7482be4ab6b4d79909aa1d087a
Code Sign
33:00:00:00:cc:cb:b8:13:eb:5d:72:2d:45:00:00:00:00:00:ccCertificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before07/09/2016, 17:58Not After07/09/2018, 17:58SubjectCN=Microsoft Time-Stamp Service,OU=MOPR+OU=nCipher DSE ESN:148C-C4B9-2066,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:40:96:a9:ee:70:56:fe:cc:07:00:01:00:00:01:40Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before18/08/2016, 20:17Not After02/11/2017, 20:17SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:01:4f:e7:c6:62:c9:46:f4:a9:7f:00:00:00:00:01:4fCertificate
IssuerCN=Microsoft Code Signing PCA 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before17/11/2016, 21:59Not After17/02/2018, 21:59SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0c:52:4c:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before06/07/2010, 20:40Not After06/07/2025, 20:50SubjectCN=Microsoft Code Signing PCA 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
26:69:05:6d:f1:b4:bd:67:4e:e2:00:b6:79:59:45:0d:f5:c2:d2:8c:6d:14:ea:19:b6:f0:b4:b7:40:c9:f6:a2Signer
Actual PE Digest26:69:05:6d:f1:b4:bd:67:4e:e2:00:b6:79:59:45:0d:f5:c2:d2:8c:6d:14:ea:19:b6:f0:b4:b7:40:c9:f6:a2Digest Algorithmsha256PE Digest Matchestrue10:c6:43:d2:ca:46:65:3f:6c:34:82:05:a3:66:e6:ba:17:22:bf:8bSigner
Actual PE Digest10:c6:43:d2:ca:46:65:3f:6c:34:82:05:a3:66:e6:ba:17:22:bf:8bDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
symsrv.pdb
Imports
msvcrt
wcscat_s
isspace
__CxxFrameHandler3
_CxxThrowException
?what@exception@@UEBAPEBDXZ
??1type_info@@UEAA@XZ
wcscpy_s
_wcslwr
strrchr
towlower
malloc
strcat_s
strcpy_s
_onexit
memcpy
wcsstr
free
_wcsdup
_stricmp
fclose
swprintf_s
??3@YAXPEAX@Z
vswprintf_s
tolower
_wsplitpath_s
_wmakepath_s
_vsnwprintf_s
iswprint
__dllonexit
_unlock
_XcptFilter
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
_amsg_exit
_initterm
??0exception@@QEAA@AEBQEBDH@Z
??0exception@@QEAA@AEBQEBD@Z
iswspace
memmove
_purecall
_wfopen
fgetws
_callnewh
swscanf_s
_wcsicmp
wcsrchr
??_V@YAXPEAX@Z
_vsnwprintf
__C_specific_handler
wcsncpy_s
_wcsnicmp
wcschr
getenv
_wtoi64
_lock
memset
wcscmp
api-ms-win-security-base-l1-1-0
EqualSid
FreeSid
AllocateAndInitializeSid
GetTokenInformation
api-ms-win-core-file-l1-1-0
LocalFileTimeToFileTime
GetDriveTypeW
GetFileAttributesExW
GetFileTime
WriteFile
GetFileAttributesW
CreateFileW
ReadFile
SetFileTime
DeleteFileW
RemoveDirectoryW
GetFileSize
FileTimeToLocalFileTime
DeleteFileA
CreateFileA
SetFilePointer
GetFileInformationByHandle
CreateDirectoryW
api-ms-win-core-errorhandling-l1-1-0
RaiseException
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
GetLastError
SetErrorMode
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcessId
OpenProcessToken
CreateThread
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
api-ms-win-core-processenvironment-l1-1-0
ExpandEnvironmentStringsW
GetEnvironmentVariableW
api-ms-win-core-misc-l1-1-0
LocalFree
LocalReAlloc
GlobalFree
LocalAlloc
Sleep
FormatMessageW
api-ms-win-core-sysinfo-l1-1-0
GetVersionExW
GetSystemInfo
GetTickCount
GetSystemTime
GetSystemTimeAsFileTime
GetSystemDirectoryW
api-ms-win-core-string-l1-1-0
WideCharToMultiByte
MultiByteToWideChar
api-ms-win-core-debug-l1-1-0
OutputDebugStringW
DebugBreak
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-libraryloader-l1-1-0
LoadLibraryExA
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
FreeLibrary
api-ms-win-core-synch-l1-1-0
DeleteCriticalSection
WaitForSingleObject
AcquireSRWLockExclusive
EnterCriticalSection
ReleaseSRWLockExclusive
LeaveCriticalSection
InitializeCriticalSection
OpenMutexW
ReleaseMutex
SetWaitableTimer
api-ms-win-core-localregistry-l1-1-0
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegEnumValueW
ws2_32
GetAddrInfoW
WSAStartup
FreeAddrInfoW
WSACleanup
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-rtlsupport-l1-1-0
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
advapi32
EventWriteTransfer
EventRegister
EventActivityIdControl
api-ms-win-core-memory-l1-1-0
VirtualProtect
VirtualQuery
api-ms-win-core-heap-l1-1-0
GetProcessHeap
HeapAlloc
ntdll
RtlRunOnceExecuteOnce
Exports
Exports
EulaDlgProc
RunDllEntry
SymbolServer
SymbolServerByIndex
SymbolServerByIndexW
SymbolServerClose
SymbolServerDeltaName
SymbolServerDeltaNameW
SymbolServerGetIndexString
SymbolServerGetIndexStringW
SymbolServerGetOptionData
SymbolServerGetOptions
SymbolServerGetSupplement
SymbolServerGetSupplementW
SymbolServerGetVersion
SymbolServerIsStore
SymbolServerIsStoreW
SymbolServerPing
SymbolServerPingW
SymbolServerPingWEx
SymbolServerSetOptions
SymbolServerSetOptionsW
SymbolServerStoreFile
SymbolServerStoreFileW
SymbolServerStoreSupplement
SymbolServerStoreSupplementW
SymbolServerW
SymbolServerWEx
httpCloseHandle
httpOpenFileHandle
httpOpenFileHandleW
httpQueryDataAvailable
httpReadFile
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mrdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ