C:\Users\Pietro\Desktop\ReXy Spoofing\x64\Release\Hus Loader.pdb
Static task
static1
General
-
Target
Temp.exe
-
Size
1.1MB
-
MD5
6b306d1a002d00d7959c21c1f03430f2
-
SHA1
2a0d651d5bbf70619592ed7a62e317a7936905c0
-
SHA256
ba199e3d51b3b15aefbcf20dd35331ce92b2e08bd5f209bb545d39289b0ef582
-
SHA512
26b14e0b9b0f7bb7398d0b477c983f7f2ac5228daefb69b22c3eafd811593821c13ae1bfdc4f7787c9e4e00d4e7522598076cf2f86257abfead02ca49a8ffb8e
-
SSDEEP
24576:V54Ew8JQmAwizKdF4J098PNvuWGncFTSpkPruGKFzXaC:V+Ew8J6Mqqg8jncFTFs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Temp.exe
Files
-
Temp.exe.exe windows:6 windows x64 arch:x64
a6d11034c2c8d0f3651689810f15991a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetFileSizeEx
GetSystemTimeAsFileTime
WaitForMultipleObjects
GetStdHandle
GetEnvironmentVariableA
WaitForSingleObjectEx
MoveFileExA
GetTickCount
VerifyVersionInfoA
GetSystemDirectoryA
SleepEx
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
PeekNamedPipe
EnterCriticalSection
FormatMessageA
SetLastError
LocalFree
CloseHandle
GetCurrentProcess
CreateDirectoryA
GetProcessHeap
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapReAlloc
GetLastError
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetCurrentProcessId
InitializeSListHead
OutputDebugStringW
CreateFileA
ReadFile
LeaveCriticalSection
GetFileType
InitializeCriticalSectionEx
HeapFree
GetModuleFileNameA
AllocConsole
Sleep
VerifyVersionInfoW
LoadLibraryA
GetProcAddress
GetModuleHandleA
FreeLibrary
QueryPerformanceFrequency
QueryPerformanceCounter
VerSetConditionMask
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
GetCurrentThreadId
user32
MessageBoxA
GetWindowRect
UpdateWindow
PostQuitMessage
PeekMessageA
GetDesktopWindow
TranslateMessage
FindWindowA
EnumDisplayMonitors
GetMonitorInfoA
MonitorFromWindow
LoadCursorA
OpenClipboard
DispatchMessageA
CloseClipboard
SetClipboardData
GetClipboardData
EmptyClipboard
DefWindowProcA
UnregisterClassA
RegisterClassExA
CreateWindowExA
IsChild
DestroyWindow
ShowWindow
SetLayeredWindowAttributes
SetWindowPos
IsIconic
BringWindowToTop
SetFocus
GetKeyState
GetCapture
SetWindowLongW
SetWindowLongA
GetWindowLongW
WindowFromPoint
ScreenToClient
ClientToScreen
GetCursorPos
SetCursor
SetCursorPos
AdjustWindowRectEx
GetClientRect
SetWindowTextW
ReleaseDC
GetDC
SetForegroundWindow
GetForegroundWindow
ReleaseCapture
SetCapture
gdi32
GetDeviceCaps
advapi32
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
ConvertSidToStringSidA
CopySid
IsValidSid
OpenProcessToken
GetLengthSid
GetTokenInformation
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
shell32
ShellExecuteA
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmGetContext
msvcp140
?always_noconv@codecvt_base@std@@QEBA_NXZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??Bid@locale@std@@QEAA_KXZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?_Xlength_error@std@@YAXPEBD@Z
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?_Xbad_function_call@std@@YAXXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
d3d9
Direct3DCreate9
urlmon
URLDownloadToFileA
normaliz
IdnToAscii
wldap32
ord27
ord32
ord33
ord26
ord22
ord35
ord79
ord30
ord41
ord50
ord45
ord60
ord211
ord46
ord217
ord143
ord200
ord301
crypt32
CertGetCertificateChain
CertFreeCertificateChainEngine
CertFreeCertificateChain
PFXImportCertStore
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CryptQueryObject
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CertCreateCertificateChainEngine
ws2_32
ntohl
gethostname
sendto
recvfrom
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
connect
closesocket
recv
send
WSAGetLastError
bind
getsockopt
getpeername
getsockname
htons
userenv
UnloadUserProfile
vcruntime140
__std_terminate
strstr
memchr
memcpy
memmove
memset
strchr
memcmp
__std_exception_copy
__current_exception_context
__current_exception
strrchr
__C_specific_handler
_CxxThrowException
__std_exception_destroy
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-string-l1-1-0
strcspn
strcmp
strncmp
strncpy
strspn
isupper
_strdup
strpbrk
tolower
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
_wfopen
fgetc
_lseeki64
fclose
fgets
fputc
fflush
fgetpos
fread
setvbuf
feof
fseek
_set_fmode
fputs
fopen
ungetc
ftell
__p__commode
fwrite
fsetpos
__stdio_common_vsprintf
_read
_write
_close
_open
__stdio_common_vsscanf
_get_stream_buffer_pointers
_fseeki64
api-ms-win-crt-heap-l1-1-0
malloc
calloc
free
realloc
_set_new_mode
_callnewh
api-ms-win-crt-utility-l1-1-0
qsort
rand
api-ms-win-crt-math-l1-1-0
acosf
_hypotf
sqrtf
sinf
cosf
ceilf
_dclass
__setusermatherr
fmodf
api-ms-win-crt-convert-l1-1-0
atoi
strtoull
strtod
strtol
strtoul
strtoll
api-ms-win-crt-runtime-l1-1-0
_resetstkoflw
_exit
_invalid_parameter_noinfo_noreturn
_invalid_parameter_noinfo
exit
strerror
system
_register_thread_local_exe_atexit_callback
_c_exit
__sys_nerr
_initterm_e
_initterm
_get_narrow_winmain_command_line
_set_app_type
_errno
_seh_filter_exe
_cexit
_beginthreadex
_crt_atexit
_getpid
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
terminate
_configure_narrow_argv
api-ms-win-crt-filesystem-l1-1-0
_access
_unlink
_lock_file
_unlock_file
remove
_stat64
_fstat64
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
localeconv
api-ms-win-crt-time-l1-1-0
_gmtime64
_time64
Sections
.text Size: 684KB - Virtual size: 684KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 400KB - Virtual size: 399KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ