C:\Users\Xeda\Desktop\C++ sources\hydrogenesis[alkad]\x64\Release\Hydrogenesis.pdb
Static task
static1
Behavioral task
behavioral1
Sample
98f0e99bc0ab233c480347a104ddb76407b278885f59a9a2bf9803f601ea9407.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
98f0e99bc0ab233c480347a104ddb76407b278885f59a9a2bf9803f601ea9407.dll
Resource
win10v2004-20240802-en
General
-
Target
98f0e99bc0ab233c480347a104ddb76407b278885f59a9a2bf9803f601ea9407.exe
-
Size
737KB
-
MD5
dd72c5ef9a0a00f3f20f93ca21dadbd7
-
SHA1
c393e9c256ca4b15af9f815d67ef89a68f03f781
-
SHA256
98f0e99bc0ab233c480347a104ddb76407b278885f59a9a2bf9803f601ea9407
-
SHA512
5e595618ef85821dd4537ee4b84021dc4c56e0c4f01fcf61c292a695ea93f822df6d1299f2610ae90028b3d3a4f34509fe7b06e286d0d41783c201464b8d51c6
-
SSDEEP
12288:jNDmrE6EKq1ec2dnJY48m2N0VnPu3LLevV:j1mPjc2VJj8m80Vnm3LL+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98f0e99bc0ab233c480347a104ddb76407b278885f59a9a2bf9803f601ea9407.exe
Files
-
98f0e99bc0ab233c480347a104ddb76407b278885f59a9a2bf9803f601ea9407.exe.dll windows:6 windows x64 arch:x64
78264a212090df6451cf4e94ab17c141
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcp140
_Query_perf_counter
_Query_perf_frequency
_Thrd_sleep
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
_Xtime_get_ticks
d3dcompiler_47
D3DCompile
d3d11
D3D11CreateDeviceAndSwapChain
user32
SetClipboardData
CloseClipboard
OpenClipboard
SetWindowLongPtrW
GetWindowLongPtrW
MessageBoxW
EmptyClipboard
GetAsyncKeyState
CreateWindowExA
RegisterClassExA
CallWindowProcW
DefWindowProcW
LoadCursorW
IsChild
GetClipboardData
GetKeyState
GetCapture
SetCapture
ReleaseCapture
GetForegroundWindow
GetClientRect
SetCursorPos
SetCursor
GetCursorPos
ClientToScreen
ScreenToClient
GetSystemMetrics
imm32
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
kernel32
GetLastError
InitializeSListHead
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
SetLastError
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
WaitForSingleObjectEx
ResetEvent
TerminateProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetProcAddress
FlushInstructionCache
SetThreadContext
GetThreadContext
ResumeThread
SuspendThread
OpenThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
HeapFree
HeapReAlloc
HeapAlloc
HeapCreate
CloseHandle
InitializeCriticalSectionAndSpinCount
SetEvent
GetVolumeInformationW
Beep
Sleep
CreateThread
GetCurrentThread
VirtualProtect
DisableThreadLibraryCalls
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
QueryPerformanceCounter
QueryPerformanceFrequency
MultiByteToWideChar
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
vcruntime140
memchr
_purecall
strstr
__std_exception_copy
__std_exception_destroy
_CxxThrowException
memcpy
memmove
memset
memcmp
__C_specific_handler
__std_type_info_destroy_list
api-ms-win-crt-runtime-l1-1-0
_configure_narrow_argv
_seh_filter_dll
_cexit
_initialize_narrow_environment
_initterm
_initterm_e
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_execute_onexit_table
_initialize_onexit_table
_crt_atexit
api-ms-win-crt-utility-l1-1-0
rand
qsort
api-ms-win-crt-convert-l1-1-0
strtol
atof
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsscanf
fwrite
fflush
_wfopen
__acrt_iob_func
__stdio_common_vsprintf_s
__stdio_common_vsprintf
__stdio_common_vfprintf
ftell
fseek
fread
fputs
fclose
fopen_s
__stdio_common_vswprintf
api-ms-win-crt-filesystem-l1-1-0
_mkdir
_stat64i32
api-ms-win-crt-multibyte-l1-1-0
_mbsicmp
api-ms-win-crt-math-l1-1-0
atan2f
fmodf
pow
powf
acosf
api-ms-win-crt-string-l1-1-0
strncpy
strcmp
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
Sections
.text Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 202KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ