Static task
static1
Behavioral task
behavioral1
Sample
ConfigHppHackv4/Hpp4new.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ConfigHppHackv4/Hpp4new.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ConfigHppHackv4/extremeinjectorv3.7.2.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ConfigHppHackv4/extremeinjectorv3.7.2.exe
Resource
win10v2004-20231215-en
General
-
Target
3aebd058fed3a57d5fd21f0e9a148409
-
Size
1.6MB
-
MD5
3aebd058fed3a57d5fd21f0e9a148409
-
SHA1
99c030466183b79fc5a6974a25ea1b5e6027160f
-
SHA256
45915f7fe9d25686c29294504512bf4c7c714de5e76faa909a0f77bf07135afb
-
SHA512
0009be62c8f8527b44b3c45e5f85636033971f37f07d71d0c277d5cb550454ca1198d50da927d199c224c2bb74f84436bea7a23fb958c40bf14611aac07b8610
-
SSDEEP
49152:OPdkdyLvIEgGti5k83Jju2g/q5STOy8+/dCiOPvM:skYLvCX5kqs/qcD14E
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/ConfigHppHackv4/Hpp4new.dll unpack001/ConfigHppHackv4/extremeinjectorv3.7.2.exe
Files
-
3aebd058fed3a57d5fd21f0e9a148409.rar
-
ConfigHppHackv4/Hpp Hack/CS 1.6/Default/AimBot.ini
-
ConfigHppHackv4/Hpp Hack/CS 1.6/Default/Kreedz.ini
-
ConfigHppHackv4/Hpp Hack/CS 1.6/Default/Main.ini
-
ConfigHppHackv4/Hpp Hack/CS 1.6/Default/Visuals.ini
-
ConfigHppHackv4/Hpp4new.dll.dll windows:6 windows x86 arch:x86
cda691003bcb19caa17b5830ca809ad3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WritePrivateProfileStringA
SetFileAttributesA
RemoveDirectoryA
GetPrivateProfileStringA
IsBadCodePtr
Sleep
CreateThread
HeapAlloc
GetProcessHeap
lstrcmpiA
GetTickCount
VirtualProtect
GetCurrentProcess
TerminateProcess
FlushInstructionCache
GetFullPathNameA
GlobalAlloc
GlobalLock
GlobalUnlock
QueryPerformanceFrequency
DeleteFileA
HeapSize
CreateFileW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
HeapReAlloc
OutputDebugStringW
GetFileAttributesA
GetLastError
FindClose
FindNextFileA
SetLastError
FindFirstFileA
CreateDirectoryA
GetProcAddress
GetModuleHandleA
SetFilePointerEx
ReadConsoleW
DeleteFileW
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
GetACP
DisableThreadLibraryCalls
QueryPerformanceCounter
GetModuleFileNameA
GetFileAttributesExW
HeapFree
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadFile
GetLocalTime
WriteConsoleW
GetModuleFileNameW
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
InterlockedFlushSList
SetEndOfFile
RaiseException
RtlUnwind
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
SetEvent
FreeLibrary
VirtualQuery
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
CloseHandle
user32
SetWindowLongA
MessageBoxA
FindWindowA
wsprintfA
CallWindowProcA
ShowCursor
GetKeyState
GetWindowRect
GetWindowLongA
GetDesktopWindow
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetAsyncKeyState
shell32
SHGetFolderPathA
imm32
ImmGetContext
ImmSetCompositionWindow
opengl32
glGetIntegerv
glPushAttrib
glOrtho
glDrawElements
glColorPointer
glTexImage2D
glTexCoordPointer
glDeleteTextures
glTexParameteri
glDisableClientState
glScissor
glVertexPointer
glGenTextures
glPopAttrib
glEnableClientState
glViewport
glDepthFunc
glDisable
glLineWidth
glEnable
glBindTexture
glPolygonMode
glPushMatrix
glLoadIdentity
glMatrixMode
glPopMatrix
glClearColor
glBlendFunc
glClear
Sections
.text Size: 526KB - Virtual size: 525KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 609KB - Virtual size: 609KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ConfigHppHackv4/extremeinjectorv3.7.2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ConfigHppHackv4/settings.xml