C:\code\pc\ytjsq\Release\Huyue.pdb
Static task
static1
Behavioral task
behavioral1
Sample
98eb18ac5d1c50a599cd370c01b493f46f25ad29b2af4aabfe1590976c1b8f00.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98eb18ac5d1c50a599cd370c01b493f46f25ad29b2af4aabfe1590976c1b8f00.exe
Resource
win10v2004-20240910-en
General
-
Target
98eb18ac5d1c50a599cd370c01b493f46f25ad29b2af4aabfe1590976c1b8f00
-
Size
1.5MB
-
MD5
a29288e95aaa23caf9673d6408ab1f47
-
SHA1
faf23141517ac48b4e177b18b9517f8cd4e71f13
-
SHA256
98eb18ac5d1c50a599cd370c01b493f46f25ad29b2af4aabfe1590976c1b8f00
-
SHA512
a203a9208289c6b291c1d2572959f0c766769b65e5968e3f68a96731f8ed8abbfc74d66dd3453d92e889a8da048c34f9f3889b24725e18f5add766c835cfe682
-
SSDEEP
24576:c+S3PBuwzh79TgD2yyUMH4DnBfcEmCAxla2rWweH72RCL03Cm:+Blh79A2V4FfcEmrXHCPH72RCL03Cm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98eb18ac5d1c50a599cd370c01b493f46f25ad29b2af4aabfe1590976c1b8f00
Files
-
98eb18ac5d1c50a599cd370c01b493f46f25ad29b2af4aabfe1590976c1b8f00.exe windows:6 windows x86 arch:x86
58762446928ba50bcba86bedeac5bc63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
windivert
WinDivertClose
WinDivertHelperCalcChecksums
WinDivertHelperParsePacket
WinDivertOpen
WinDivertRecv
WinDivertSend
kernel32
GetCurrentProcessId
GetCurrentThread
GetSystemTimeAsFileTime
GetLocalTime
VirtualQuery
GetModuleFileNameW
GetModuleHandleW
FormatMessageW
MoveFileW
WideCharToMultiByte
WriteConsoleW
GetEnvironmentVariableW
GetCurrentDirectoryW
OutputDebugStringW
GetCurrentThreadId
SuspendThread
ResumeThread
GetThreadId
GetThreadContext
FreeLibrary
GetProcAddress
LoadLibraryW
MultiByteToWideChar
CreateDirectoryW
SetUnhandledExceptionFilter
CreateIoCompletionPort
GetQueuedCompletionStatus
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateEventW
TerminateProcess
CreateThread
CreateProcessW
OpenProcess
GetSystemInfo
FindResourceExW
LoadResource
LockResource
SizeofResource
LocalFree
FindResourceW
GetPrivateProfileStringW
WritePrivateProfileStringW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetExitCodeProcess
TerminateThread
SetEvent
ResetEvent
CreatePipe
Sleep
GetStartupInfoW
PostQueuedCompletionStatus
SystemTimeToFileTime
GetOverlappedResult
DeviceIoControl
CancelIoEx
GetTickCount
GetCurrentProcess
GetPrivateProfileIntW
GlobalMemoryStatusEx
GetVersionExW
GlobalMemoryStatus
lstrcmpiW
FindClose
FindFirstFileW
FindNextFileW
RemoveDirectoryW
GetSystemDefaultLCID
GetComputerNameW
IsValidLocale
GetACP
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RtlUnwind
QueryPerformanceFrequency
GetSystemTime
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
EncodePointer
InitializeSListHead
QueryPerformanceCounter
IsDebuggerPresent
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetOEMCP
GetCommandLineA
GetCommandLineW
InitializeCriticalSection
CloseHandle
WriteFile
SetFilePointer
SetFileAttributesW
SetEndOfFile
ReadFile
GetFileSize
GetFileAttributesW
FindFirstFileExW
DeleteFileW
CreateFileW
GetStdHandle
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
SetStdHandle
SetFilePointerEx
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
DecodePointer
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
ReadConsoleW
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetNativeSystemInfo
user32
IsWindow
UpdateWindow
LoadCursorW
LoadIconW
IsWindowVisible
GetKeyState
CreateWindowExW
CreatePopupMenu
DestroyMenu
AppendMenuW
TrackPopupMenu
RegisterClassW
PostQuitMessage
DefWindowProcW
SendMessageTimeoutW
SendMessageW
FindWindowW
MessageBoxW
SetForegroundWindow
SetTimer
IsIconic
ShowWindow
PostMessageW
DispatchMessageW
TranslateMessage
GetCursorPos
DestroyWindow
GetWindowThreadProcessId
GetMessageW
SetWindowPos
KillTimer
GetSystemMetrics
SetWindowLongW
GetWindowLongW
MessageBoxA
SetFocus
GetWindowRect
SetWindowTextW
MoveWindow
gdi32
GetStockObject
advapi32
RegOpenKeyExA
GetUserNameW
RegCloseKey
RegEnumKeyA
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
SystemFunction036
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
RegDeleteValueW
shell32
ExtractIconExW
ShellExecuteA
Shell_NotifyIconW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
ws2_32
getaddrinfo
getsockname
WSACreateEvent
WSACloseEvent
send
recv
ioctlsocket
connect
WSASocketW
WSASend
WSARecv
WSAGetLastError
gethostname
inet_ntop
WSAIoctl
WSAStartup
gethostbyname
socket
shutdown
setsockopt
sendto
select
recvfrom
ntohs
ntohl
inet_ntoa
inet_addr
htons
htonl
closesocket
bind
freeaddrinfo
__WSAFDIsSet
mprapi
MprConfigGetFriendlyName
MprConfigServerDisconnect
MprConfigServerConnect
iphlpapi
CreateIpForwardEntry
GetAdaptersInfo
NotifyAddrChange
DeleteIpForwardEntry
FlushIpNetTable
GetAdapterIndex
GetAdaptersAddresses
GetIpForwardTable
GetExtendedUdpTable
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
dbghelp
SymSetOptions
UnDecorateSymbolName
SymGetSymFromAddr64
SymInitialize
SymGetLineFromAddr64
SymGetModuleBase64
SymGetModuleInfo64
SymFunctionTableAccess64
SymCleanup
SymGetOptions
StackWalk64
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 250KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 185KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ