Static task
static1
Behavioral task
behavioral1
Sample
1e3c5af87aa29780d57b41fe54b395a5a5636d2dd786e53a8afc5e57cde70384.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1e3c5af87aa29780d57b41fe54b395a5a5636d2dd786e53a8afc5e57cde70384.exe
Resource
win10v2004-20230703-en
General
-
Target
1e3c5af87aa29780d57b41fe54b395a5a5636d2dd786e53a8afc5e57cde70384
-
Size
4.0MB
-
MD5
2ecae281eddb44f084567b3a5ad38aff
-
SHA1
607166b1955ace7d1dcfa0df3a65dc8aaf2dfaac
-
SHA256
1e3c5af87aa29780d57b41fe54b395a5a5636d2dd786e53a8afc5e57cde70384
-
SHA512
689013901dd3cd345c0222dfc198fd0d6c026b677173b9b79136f1b87e5f7ea6ca77e59ffd6a841c551340f521c6ee6683cdad2277d5c6a8247d2a91cd0f14fe
-
SSDEEP
49152:/83xPdtBJjUEdPg/vmAhy1L5R2A7Rzx1i8I4cLJBuF9T1jrfUQ1/FQdrWqi:/IB3Igh7xx1i8cOcgidr5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e3c5af87aa29780d57b41fe54b395a5a5636d2dd786e53a8afc5e57cde70384
Files
-
1e3c5af87aa29780d57b41fe54b395a5a5636d2dd786e53a8afc5e57cde70384.exe windows x64
abe2453e5d21ec42ab7f2359061b52e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
libcurl
curl_mime_free
curl_mime_data
curl_mime_name
curl_mime_addpart
curl_mime_init
curl_slist_free_all
curl_easy_cleanup
curl_easy_strerror
curl_easy_perform
curl_easy_setopt
curl_slist_append
curl_easy_init
kernel32
FreeLibrary
LoadLibraryW
GetLocalTime
GetVersionExA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetModuleHandleW
GetSystemTime
IsBadReadPtr
GetTickCount
FindResourceW
SizeofResource
LockResource
LoadResource
FreeResource
SetLastError
GetFullPathNameW
GetFileAttributesW
FlushInstructionCache
SetEndOfFile
WriteConsoleW
HeapSize
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
OutputDebugStringW
SetConsoleCtrlHandler
GetTimeZoneInformation
SetStdHandle
ReadConsoleW
FlushFileBuffers
HeapReAlloc
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetFileType
GetCurrentThread
ExitProcess
DeleteCriticalSection
GetStdHandle
ReadFile
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
InterlockedFlushSList
InterlockedPushEntrySList
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
CompareStringEx
GetStringTypeW
CreateSymbolicLinkW
GetFileInformationByHandleEx
CloseThreadpoolWait
SetThreadpoolWait
CreateThreadpoolWait
CloseThreadpoolTimer
WaitForThreadpoolTimerCallbacks
SetThreadpoolTimer
CreateThreadpoolTimer
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
FreeLibraryWhenCallbackReturns
GetTickCount64
GetSystemTimeAsFileTime
GetCurrentProcessorNumber
FlushProcessWriteBuffers
CreateSemaphoreExW
CreateEventExW
SleepConditionVariableCS
InitOnceExecuteOnce
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetTempPathW
SetFileInformationByHandle
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeSRWLock
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
MultiByteToWideChar
GetShortPathNameW
TerminateProcess
OpenProcess
Sleep
CreateProcessW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GlobalFree
lstrlenW
FindClose
FindFirstFileW
CreateDirectoryW
SetUnhandledExceptionFilter
CloseHandle
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceFrequency
QueryPerformanceCounter
lstrlenA
GetLocaleInfoEx
LocalFree
LCMapStringEx
InitializeCriticalSectionEx
DecodePointer
EncodePointer
GetNativeSystemInfo
GetExitCodeThread
SwitchToThread
CreateFileW
ReleaseMutex
GetLastError
CreateMutexW
SetCurrentDirectoryW
GetModuleFileNameW
GlobalUnlock
GlobalLock
WaitForSingleObjectEx
FormatMessageA
GetVersionExW
GlobalAlloc
MulDiv
OutputDebugStringA
WideCharToMultiByte
WriteFile
user32
IsIconic
SetTimer
KillTimer
DestroyIcon
InvertRect
EmptyClipboard
CloseClipboard
SetClipboardData
PostQuitMessage
IsWindow
SetWindowPos
EnableWindow
IsWindowEnabled
SetActiveWindow
RegisterWindowMessageW
IntersectRect
IsRectEmpty
GetCursorPos
ClientToScreen
PostMessageW
DestroyWindow
MessageBoxW
SendMessageW
GetActiveWindow
SetForegroundWindow
GetWindowLongPtrW
ShowWindow
FindWindowW
GetKeyState
OffsetRect
IsWindowVisible
DrawIconEx
FillRect
OpenClipboard
GetDesktopWindow
UpdateLayeredWindow
MapVirtualKeyA
CharLowerBuffW
SetCaretPos
HideCaret
CreateCaret
SystemParametersInfoA
DrawTextW
GetWindowPlacement
MonitorFromRect
LoadIconW
GetSystemMetrics
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
EnableMenuItem
SetRect
GetWindowLongW
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetSysColor
SetMenuContextHelpId
GetMenuItemInfoW
SetMenuInfo
GetMenuInfo
TrackPopupMenu
DeleteMenu
AppendMenuW
InsertMenuW
GetMenuItemCount
CheckMenuItem
DestroyMenu
CreatePopupMenu
IsMenu
GetIconInfo
CharNextW
GetForegroundWindow
CallMsgFilterW
WaitMessage
PeekMessageW
LoadImageW
CreateIconFromResource
LoadBitmapW
GetFocus
DestroyCursor
PtInRect
EqualRect
SetCursor
GetClassNameW
UnionRect
InflateRect
CopyRect
ScreenToClient
SetWindowTextW
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
UpdateWindow
ReleaseCapture
SetCapture
GetCapture
SetFocus
IsZoomed
SetLayeredWindowAttributes
AnimateWindow
TrackMouseEvent
GetMonitorInfoW
MonitorFromWindow
LoadCursorW
GetWindow
GetParent
SetWindowLongPtrW
MapWindowPoints
GetWindowRect
GetClientRect
GetDlgItem
CreateWindowExW
RegisterClassExW
UnregisterClassW
CallWindowProcW
DefWindowProcW
gdi32
RoundRect
RestoreDC
RectInRegion
PtInRegion
Pie
OffsetRgn
IntersectClipRect
GetTextExtentPoint32W
GetRgnBox
ExtSelectClipRgn
ExcludeClipRect
EqualRgn
GetWorldTransform
SetWorldTransform
CreateDIBSection
ExtCreatePen
CreatePolygonRgn
Polyline
GetCurrentObject
GetViewportOrgEx
SaveDC
SetRectRgn
SetROP2
GetClipRgn
SetTextColor
Ellipse
SetViewportOrgEx
CreateCompatibleBitmap
StretchBlt
GetDCOrgEx
GetObjectW
SetBkMode
Rectangle
GetStockObject
GetClipBox
CreateSolidBrush
CreateFontIndirectW
EnumFontsW
SetGraphicsMode
GetDeviceCaps
SelectObject
DeleteDC
CreateCompatibleDC
CreateBitmap
DeleteObject
BitBlt
CreateRoundRectRgn
Arc
CombineRgn
CreateEllipticRgnIndirect
CreatePen
CreatePatternBrush
CreateRectRgn
CreateRectRgnIndirect
GetTextColor
advapi32
RegOpenKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
SHGetFolderPathAndSubDirW
SHGetPathFromIDListW
Shell_NotifyIconW
ShellExecuteW
SHBrowseForFolderW
ole32
CreateBindCtx
CLSIDFromProgID
CLSIDFromString
OleLockRunning
CoSetProxyBlanket
CoCreateInstance
OleUninitialize
CoInitializeSecurity
CoInitialize
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
oleaut32
VariantClear
CreateErrorInfo
SetErrorInfo
VariantChangeType
VariantInit
SysStringLen
SysAllocString
SysFreeString
SysAllocStringByteLen
GetErrorInfo
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shlwapi
StrToIntExW
SHGetValueW
gdiplus
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDrawImageRectI
GdipGraphicsClear
GdipSaveImageToFile
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipFree
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageI
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdipAlloc
GdipImageGetFrameCount
dbghelp
MiniDumpWriteDump
imm32
ImmAssociateContext
ImmGetContext
ImmDestroyContext
ImmReleaseContext
ImmCreateContext
msimg32
AlphaBlend
GradientFill
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 692KB - Virtual size: 691KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ