Static task
static1
Behavioral task
behavioral1
Sample
hdwwiz.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hdwwiz.exe
Resource
win10v2004-20230220-en
General
-
Target
hdwwiz.exe
-
Size
58KB
-
MD5
40ea3d35006b22ff91e8e92c0e85082e
-
SHA1
d88f2b8241505ff2695cc0c0baeabee5766f3104
-
SHA256
a6f25ac7aa2332fcd208f0ccc43dad9025bd4b5ff1fe83e6618a72c656e6d678
-
SHA512
be421b7155385de6215502de250cd68b2f2cb370c674ba665bf89009b4d52347c8ea2fa513ec0999ac029cb1d63b98d100fa72f383dea72386c7b25fe2deaea8
-
SSDEEP
384:8tqSF0o084l6W6yWT4650Ingu+n6aJTIXFJhjhxhWM1hvYvfeHviODnMObvuqxpf:uqG2lu/4G0In3BhzhWM1GOVz17
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource hdwwiz.exe
Files
-
hdwwiz.exe.exe windows x86
d68ee550428f6725d6b2e00c2cbb47b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
LoadLibraryW
GetProcAddress
ExitProcess
FreeLibrary
GetCurrentProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
TerminateProcess
msvcrt
_acmdln
__setusermatherr
_controlfp
_except_handler4_common
_initterm
_ismbblead
__p__fmode
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
?terminate@@YAXXZ
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 942B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ