Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win11-20240802-en
General
-
Target
loader.exe
-
Size
43.2MB
-
MD5
2fdbc8eac7f74152f67d0aacf4af5540
-
SHA1
cb62f09ca95f49d3ff94fa9ce6f43e2d4b8234fb
-
SHA256
e0bfbcf81ebc0f671492e1f2e069d7a22345f705cf365fbf3113df5f3376d120
-
SHA512
a9771853a9a86925f1c75613bce68d49750d38c0b1b6a1d4d4f5ca176ebcb34a3b3729901331eff6a65027721369118181d0c8d7ab8ad70121bb2968f645418e
-
SSDEEP
786432:sXrWCERULMqeqDH91+RIyKcgsmAKkmYr9IIu9PK0Zaamc:s7bLMq91+GcTmxkmYJIIu40Zaamc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource loader.exe
Files
-
loader.exe.exe windows:6 windows x64 arch:x64
77bf6a595d14f560e57d0c1431a7b7eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetLastError
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
MessageBoxA
advapi32
CryptImportKey
shell32
ShellExecuteExW
protectionlibrary
init
msvcp140
?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z
wininet
InternetCloseHandle
winhttp
WinHttpSendRequest
iphlpapi
GetAdaptersInfo
ntdll
RtlCaptureContext
normaliz
IdnToAscii
wldap32
ord200
crypt32
CertOpenStore
ws2_32
listen
rpcrt4
UuidToStringA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140
memcpy
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
exit
api-ms-win-crt-heap-l1-1-0
free
api-ms-win-crt-convert-l1-1-0
strtoul
api-ms-win-crt-stdio-l1-1-0
_read
api-ms-win-crt-filesystem-l1-1-0
remove
api-ms-win-crt-string-l1-1-0
strncpy
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
api-ms-win-crt-math-l1-1-0
_dclass
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-utility-l1-1-0
qsort
Sections
.text Size: - Virtual size: 485KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.|'t Size: - Virtual size: 26.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.!n( Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.F@\ Size: 43.2MB - Virtual size: 43.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ