f:\jnks\workspace\K29_Production_Build\build4647\SxS\src\Release\hpUrlLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
972f84fadea447b24028f36fc1bfbf73e8c61e829e63c717aa30e4bdcbbd2247.exe
Resource
win7-20240221-en
General
-
Target
972f84fadea447b24028f36fc1bfbf73e8c61e829e63c717aa30e4bdcbbd2247
-
Size
835KB
-
MD5
889991aa43f2cc6b978e8743ddfe9866
-
SHA1
3f42e7cb0f65cc99dbf719af5b4d25dbf4adc313
-
SHA256
972f84fadea447b24028f36fc1bfbf73e8c61e829e63c717aa30e4bdcbbd2247
-
SHA512
eb3253788441293bee655dcae55ebdd73f8d5474680ce68778b70c296dff0dfc0cb6770c5bc1c91192b3a9d2321349cf6297d18a76f42959680f30b25f4bdf0c
-
SSDEEP
24576:B2FcAE+bvsqjnhMgeiCl7G0nehbGZpbD:B9AzbTDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 972f84fadea447b24028f36fc1bfbf73e8c61e829e63c717aa30e4bdcbbd2247
Files
-
972f84fadea447b24028f36fc1bfbf73e8c61e829e63c717aa30e4bdcbbd2247.exe windows:5 windows x86 arch:x86
95a40134eadf1da63f0c5b8c889eee5d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
OpenDesktopW
GetKeyState
SendMessageCallbackW
GetMessageW
SetTimer
RegisterWindowMessageW
DestroyIcon
MsgWaitForMultipleObjectsEx
WaitForInputIdle
GetAsyncKeyState
OpenWindowStationW
CloseWindowStation
GetProcessWindowStation
SetProcessWindowStation
GetThreadDesktop
SetThreadDesktop
wsprintfW
CloseDesktop
ExitWindowsEx
AllowSetForegroundWindow
PeekMessageW
MsgWaitForMultipleObjects
GetSystemMetrics
SystemParametersInfoW
LoadIconW
shlwapi
PathRemoveFileSpecW
PathFindFileNameW
PathIsFileSpecW
PathFindExtensionW
psapi
GetModuleFileNameExW
EnumProcesses
GetModuleBaseNameW
EnumProcessModules
kernel32
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
CreateFileW
Sleep
SetFilePointer
WriteFile
CloseHandle
OutputDebugStringW
GetCurrentThreadId
QueryPerformanceCounter
OpenProcess
GetFileAttributesExW
GetCommandLineW
GetTempFileNameW
GetLongPathNameW
SearchPathW
FormatMessageW
LocalFree
CreateMutexW
WaitForSingleObject
CreateFileMappingW
MapViewOfFile
ReleaseMutex
UnmapViewOfFile
SetLastError
LoadLibraryW
GetProcAddress
FreeLibrary
QueryPerformanceFrequency
WideCharToMultiByte
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
GetCurrentProcessId
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RaiseException
RtlUnwind
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
CreateThread
SetStdHandle
ReadConsoleW
WriteConsoleW
HeapSize
InitializeCriticalSection
ExpandEnvironmentStringsW
GetModuleFileNameW
GetLastError
CopyFileW
SetFileAttributesW
VerifyVersionInfoW
ExitThread
FreeLibraryAndExitThread
SetUnhandledExceptionFilter
MoveFileExW
GetSystemDirectoryW
DeviceIoControl
GetFileTime
SizeofResource
LockResource
LoadResource
FindResourceExW
FindResourceW
GlobalFree
GlobalUnlock
GlobalLock
ProcessIdToSessionId
GlobalAlloc
LocalAlloc
GetUserDefaultLangID
SetCurrentDirectoryW
GetCurrentDirectoryW
GetComputerNameExW
DeleteFileW
FindFirstFileW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetVersionExW
CreateProcessW
GetTempPathW
GetDiskFreeSpaceExW
GetExitCodeThread
GetExitCodeProcess
TerminateThread
OpenEventW
ResetEvent
SetEvent
GetLocalTime
GetSystemTime
GetFileAttributesW
OpenMutexW
CreateDirectoryW
GetShortPathNameW
GetFileSizeEx
CreateNamedPipeW
ConnectNamedPipe
DisconnectNamedPipe
WaitNamedPipeW
PeekNamedPipe
GetEnvironmentVariableW
TryEnterCriticalSection
WaitForMultipleObjects
CreatePipe
GlobalMemoryStatusEx
OpenFileMappingW
FlushViewOfFile
GetSystemDefaultLCID
advapi32
GetUserNameW
CheckTokenMembership
OpenProcessToken
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
shell32
ShellExecuteW
ExtractIconW
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetFolderPathW
ole32
CoInitialize
CoUninitialize
CLSIDFromString
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
secur32
GetUserNameExW
Sections
.text Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 804B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 580KB - Virtual size: 584KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE