Static task
static1
Behavioral task
behavioral1
Sample
Fort_Launcher.exe
Resource
win10v2004-20240910-en
General
-
Target
Fort_Launcher.exe
-
Size
30.1MB
-
MD5
41b3f5b10251fc3da3dccb6bc518ae8c
-
SHA1
cc8330075b8be6b844517f450cb2b2b3dddb2e75
-
SHA256
68e1031e0147bf22e1ceaf9b7a7e5ea3f7acb108e0d4ab575109210bf0c97deb
-
SHA512
fe4f9d3bb31213d2ae9895bbc01ba1f96d0034f7b9e9e80b24fbc4c559424d0908b4fbab21385b52b13abc76b79d2851d7b4c4b58fa86a517ad55d4ef3e84fdf
-
SSDEEP
786432:7LjMtag5aX8I346vPF6Nd1l3UPywCyY4gei2y:7L8m8I319QdzUP7Ytei2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Fort_Launcher.exe
Files
-
Fort_Launcher.exe.exe windows:6 windows x64 arch:x64
88c44d084fc37ba508c0ad5bc75ef742
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ReadProcessMemory
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetDC
gdi32
SelectObject
advapi32
CryptCreateHash
shell32
ShellExecuteA
msvcp140
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z
psapi
GetModuleInformation
normaliz
IdnToAscii
wldap32
ord32
ws2_32
ntohl
rpcrt4
RpcStringFreeA
userenv
UnloadUserProfile
winhttp
WinHttpSendRequest
ntdll
NtRaiseHardError
iphlpapi
GetAdaptersInfo
vcruntime140
memmove
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
__sys_nerr
api-ms-win-crt-stdio-l1-1-0
fflush
api-ms-win-crt-filesystem-l1-1-0
_fstat64
api-ms-win-crt-heap-l1-1-0
free
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-math-l1-1-0
_dsign
api-ms-win-crt-time-l1-1-0
strftime
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-string-l1-1-0
strncpy
crypt32
CertFreeCertificateChain
Sections
.text Size: - Virtual size: 920KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.E') Size: - Virtual size: 18.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.66O Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Kxr Size: 30.1MB - Virtual size: 30.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ