i:\自动编译_1.61\HummerPack\QQ1.61_2107\AutoProject\HummerSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bbb9f8c48a8dd9c02eb10d1965ad7311.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbb9f8c48a8dd9c02eb10d1965ad7311.exe
Resource
win10v2004-20240226-en
General
-
Target
bbb9f8c48a8dd9c02eb10d1965ad7311
-
Size
1.5MB
-
MD5
bbb9f8c48a8dd9c02eb10d1965ad7311
-
SHA1
c011f896388a325b745d0e8ea0912c374158a5cb
-
SHA256
6af93e45750bbd6f9639d077a767e3448be9adb75582f83e425bbaf3404ca89f
-
SHA512
6e978e2d78d5c706be8f374d30a7681c5f9d1eff2673916059c255eda52936aa8e811c0bf33e8b1c62631fb61b60fb4559738cbe63e7a289a300ff952310cfab
-
SSDEEP
24576:50aE1e64wzV2ZkK3OrCUg2kjOMsZp/BwLIS9sPh5gabJ19PR5xe1rKgVg8g1rf:/Erd8ZkKerHg2kyMsv/BgmHBhpz9guVV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbb9f8c48a8dd9c02eb10d1965ad7311
Files
-
bbb9f8c48a8dd9c02eb10d1965ad7311.exe windows:4 windows x86 arch:x86
99414c8b1cc07ca5be5ef0ed5ad93aed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
Shell_NotifyIconW
CommandLineToArgvW
SHFileOperationW
SHBrowseForFolderW
SHCreateDirectoryExW
msi
ord137
ord141
ord88
ord70
ord32
ord118
ord8
ord169
ord160
ord195
ord159
ord92
advapi32
RegQueryValueExW
OpenServiceW
ChangeServiceConfigW
RegDeleteValueW
RegSetValueExW
RegCreateKeyW
CloseServiceHandle
RegCloseKey
OpenSCManagerW
QueryServiceStatus
RegOpenKeyExW
RegEnumKeyW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
StartServiceW
shlwapi
PathCombineW
PathAppendW
PathFileExistsW
PathStripToRootW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
psapi
EnumProcessModules
GetModuleFileNameExW
ws2_32
htonl
htons
gethostbyname
WSAStartup
connect
socket
inet_ntoa
recv
WSACleanup
send
inet_addr
closesocket
kernel32
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetStartupInfoA
GetFileType
SetHandleCount
FlushFileBuffers
GetStdHandle
HeapCreate
HeapDestroy
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetConsoleMode
GetConsoleCP
ExitProcess
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCPInfo
FormatMessageW
LocalFree
GetLastError
GetSystemDirectoryW
GetVersionExW
SetFileAttributesW
LeaveCriticalSection
CreateProcessW
GetModuleFileNameW
EnterCriticalSection
FindFirstFileW
CloseHandle
CreateMutexW
GetCurrentDirectoryW
GetFileAttributesW
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
VirtualFree
VirtualAlloc
FreeResource
GetDriveTypeW
FindResourceW
LoadResource
CreateDirectoryW
WriteFile
SizeofResource
CreateFileW
MultiByteToWideChar
LockResource
GlobalUnlock
GlobalAlloc
GlobalLock
Sleep
CopyFileW
CreateThread
SuspendThread
GetDiskFreeSpaceExW
FreeLibrary
FindNextFileW
GetPrivateProfileStringW
LoadLibraryW
MoveFileExW
GetProcAddress
RemoveDirectoryW
FindClose
GetPrivateProfileIntW
WideCharToMultiByte
DeleteFileW
ResumeThread
WritePrivateProfileStringW
GetTempPathW
GetTickCount
GetWindowsDirectoryW
MoveFileW
QueryPerformanceFrequency
QueryPerformanceCounter
IsBadReadPtr
IsBadWritePtr
Process32NextW
WaitForSingleObject
lstrcmpiW
TerminateProcess
DeleteFileA
OpenProcess
lstrcatA
GetACP
lstrcmpW
Process32FirstW
CreateToolhelp32Snapshot
RemoveDirectoryA
GetCommandLineW
GetModuleHandleW
GetSystemTimeAsFileTime
GetProcessTimes
GetCurrentProcessId
SetFilePointer
LoadLibraryA
VirtualQuery
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
SetProcessAffinityMask
GetProcessAffinityMask
RaiseException
InterlockedIncrement
InterlockedDecrement
RtlUnwind
GetStartupInfoW
GetProcessHeap
GetVersionExA
HeapSize
HeapReAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapAlloc
HeapFree
InterlockedExchange
InterlockedCompareExchange
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CreateFileA
SetEndOfFile
GetThreadLocale
ReadFile
LocalAlloc
user32
GetClassNameW
DefWindowProcW
GetActiveWindow
ExitWindowsEx
GetClassInfoExW
GetDesktopWindow
RegisterClassExW
SetWindowLongW
BringWindowToTop
SetCursor
EnumWindows
SetDlgItemTextW
GetWindowThreadProcessId
PtInRect
CharNextW
GetWindowRect
GetKeyState
CreateDialogParamW
GetDlgCtrlID
OffsetRect
DestroyWindow
SetWindowPos
GetClientRect
PostMessageW
DrawTextW
GetWindowTextW
DrawIconEx
MapVirtualKeyW
TranslateMessage
GetWindow
SetWindowRgn
SetWindowsHookExW
UnhookWindowsHookEx
BeginPaint
GetParent
TrackMouseEvent
ReleaseCapture
DestroyIcon
SetTimer
ShowWindow
GetDlgItem
SetWindowTextW
EnableWindow
LoadAcceleratorsW
DispatchMessageW
EndDialog
MessageBoxW
DialogBoxParamW
TranslateAcceleratorW
GetMessageW
SendMessageW
EndPaint
CallNextHookEx
GetDC
LoadBitmapW
LoadImageW
InvalidateRect
UpdateWindow
KillTimer
IsWindow
GetFocus
GetDlgItemTextW
CreateWindowExW
SetFocus
SetClassLongW
PostQuitMessage
ScreenToClient
GetWindowDC
GetCursorPos
ReleaseDC
LoadCursorW
GetWindowLongW
IsWindowVisible
gdi32
CreateCompatibleDC
OffsetRgn
CreateRectRgn
CombineRgn
SetBkColor
BitBlt
CreateCompatibleBitmap
GetStockObject
DeleteObject
SelectObject
DeleteDC
GetTextExtentExPointW
GetTextExtentPointW
SetTextColor
CreateFontW
SetBkMode
ole32
CoCreateInstance
CoInitializeEx
StringFromCLSID
CreateStreamOnHGlobal
CoUninitialize
oleaut32
SysAllocString
SysStringLen
SysFreeString
Sections
.text Size: 368KB - Virtual size: 366KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39.5MB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ