Static task
static1
Behavioral task
behavioral1
Sample
hdwwiz.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hdwwiz.exe
Resource
win10v2004-20230220-en
General
-
Target
hdwwiz.exe
-
Size
58KB
-
MD5
4756a299d70645353efb05ad1468b98e
-
SHA1
b46e03d050e8e0ebcc1b861cda791c6a5e837749
-
SHA256
e471af55e5280c90c298130720fef33c53a9881ae69c6aaa4316acbf8010a9c9
-
SHA512
469d8590bd720df61246b33b2656810613e87663f2b8b8736c844e47ce018e01ade85bbecec24329b426a2b838a6020b5227f7f689e07c658f8be430cbb0523e
-
SSDEEP
384:aGAsmo91HmotmWiyWL4650Ingu+n6aJTIXFJhjhxhWM1hvYvfeHviODnMObvuqxe:aGVLtKH4G0In3BhzhWM1GOVz17t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource hdwwiz.exe
Files
-
hdwwiz.exe.exe windows x86
d68ee550428f6725d6b2e00c2cbb47b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
LoadLibraryW
GetProcAddress
ExitProcess
FreeLibrary
GetCurrentProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
TerminateProcess
msvcrt
_acmdln
__setusermatherr
_controlfp
_except_handler4_common
_initterm
_ismbblead
__p__fmode
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
?terminate@@YAXXZ
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 938B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ