D:\a\deno\deno\target\release\deps\deno.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Hate.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Hate.exe
Resource
win10v2004-20241007-en
General
-
Target
Hate.exe
-
Size
34.1MB
-
MD5
c57f8aa1f7b98f7d0d3011738ec1b520
-
SHA1
eb769cd46ca323b2a3ca3277ae4278b67029ea0b
-
SHA256
b3a11b9dd184a515c7b4f32c0f8d5fa5ad6ecd4a16f99927d939bca9fd2fe864
-
SHA512
bf98fa07fa6f3ca14b022c9e236a844a418db8f20b6cc8d582626bc69ae81a1ff988bf96bea943dea0dee944e5a7fb653c21e5a6e89fdd9598c6294dc29c2a39
-
SSDEEP
393216:En9rZJPHCjypBXz1eChoxBG3in/8bsf3rBIKz6TPKZ1:En9FJNfXz12C3in/4INIKejKj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Hate.exe
Files
-
Hate.exe.exe windows:6 windows x64 arch:x64
b3cf2897b0ce24792a5a42225359641c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
powrprof
CallNtPowerInformation
iphlpapi
GetAdaptersAddresses
ntdll
NtCancelIoFileEx
RtlPcToFileHeader
RtlUnwindEx
RtlNtStatusToDosError
RtlCaptureStackBackTrace
RtlDeleteFunctionTable
RtlAddFunctionTable
VerSetConditionMask
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
NtCreateFile
NtDeviceIoControlFile
RtlUnwind
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
dbghelp
SymGetModuleBase64
SymSetOptions
SymGetLineFromAddr64
SymFromAddr
SymInitialize
SymFunctionTableAccess64
StackWalk64
SymSetSearchPathW
SymGetSearchPathW
kernel32
GetOEMCP
GetACP
IsValidCodePage
MultiByteToWideChar
SetStdHandle
HeapSize
GetFileSizeEx
GetConsoleOutputCP
EnumSystemLocalesW
GetUserDefaultLCID
FindFirstFileExW
SetEndOfFile
GetStringTypeW
MoveFileExW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetCommandLineA
GetCPInfo
FreeLibraryAndExitThread
ExitThread
SwitchToThread
SetConsoleMode
CloseHandle
LeaveCriticalSection
SetConsoleCursorPosition
lstrlenW
WaitForSingleObject
GetLastError
GetExitCodeProcess
GetCurrentProcessId
GetCommandLineW
GetProcessHeap
HeapFree
AddVectoredExceptionHandler
HeapAlloc
HeapReAlloc
GetStdHandle
GetFileInformationByHandleEx
GetConsoleMode
EnterCriticalSection
Sleep
CreateHardLinkW
DeviceIoControl
ReadFile
TerminateProcess
FreeLibrary
RegisterWaitForSingleObject
GetProcessId
GetConsoleScreenBufferInfo
SetEnvironmentVariableW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetErrorMode
SetThreadErrorMode
LoadLibraryW
GetProcAddress
OpenProcess
SetCurrentDirectoryW
CreateToolhelp32Snapshot
Process32First
Process32Next
SetFileTime
GetOverlappedResult
WriteFile
CancelIoEx
SetFileCompletionNotificationModes
CreateIoCompletionPort
GetQueuedCompletionStatusEx
PostQueuedCompletionStatus
CreateFileW
CreateSemaphoreW
WaitForSingleObjectEx
ReadDirectoryChangesW
ReleaseSemaphore
CancelIo
GetSystemInfo
GetModuleHandleA
SetFileInformationByHandle
SetHandleInformation
GetConsoleCursorInfo
SetConsoleCursorInfo
ReadConsoleInputW
FillConsoleOutputCharacterA
FillConsoleOutputAttribute
GetFileInformationByHandle
TlsGetValue
TlsSetValue
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
SetLastError
GetEnvironmentVariableW
WriteConsoleW
GetCurrentProcess
GetCurrentThread
ReleaseMutex
GetCurrentDirectoryW
LoadLibraryA
CreateMutexA
TlsAlloc
FormatMessageW
GetTempPathW
GetModuleFileNameW
FlushFileBuffers
DuplicateHandle
SetFilePointerEx
FindNextFileW
CreateDirectoryW
ReadConsoleW
TryEnterCriticalSection
FindFirstFileW
CreateProcessW
CreateNamedPipeW
CreateEventW
WaitForMultipleObjects
ExitProcess
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
FindClose
DeleteFileW
SetEvent
RemoveDirectoryW
SetFileAttributesW
CopyFileExW
CreateThread
GetFinalPathNameByHandleW
UnregisterWaitEx
SetConsoleTextAttribute
GetSystemTimes
GlobalMemoryStatusEx
GetVersionExA
GetTimeZoneInformation
WideCharToMultiByte
GetThreadTimes
GetCurrentThreadId
DeleteFileA
GetTempPathA
GetTempFileNameA
GetFileType
OutputDebugStringA
VerifyVersionInfoW
VirtualAlloc
VirtualFree
IsDebuggerPresent
TlsFree
QueryThreadCycleTime
GetThreadPriority
SetThreadPriority
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
TryAcquireSRWLockExclusive
AcquireSRWLockShared
ReleaseSRWLockShared
VirtualProtect
LoadLibraryExW
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceExecuteOnce
SetUnhandledExceptionFilter
GetNativeSystemInfo
InitializeConditionVariable
OpenThread
SuspendThread
GetThreadContext
ResumeThread
CreateSemaphoreA
ResetEvent
GetModuleHandleExW
EncodePointer
RaiseException
IsProcessorFeaturePresent
GetStartupInfoW
UnhandledExceptionFilter
InitializeSListHead
InitializeCriticalSectionAndSpinCount
ole32
CoTaskMemFree
shell32
SHGetKnownFolderPath
ws2_32
getaddrinfo
freeaddrinfo
WSAStartup
WSACleanup
recvfrom
setsockopt
recv
send
shutdown
WSASend
sendto
getpeername
WSASocketW
getsockname
getsockopt
connect
accept
ioctlsocket
socket
WSAIoctl
WSAGetLastError
listen
bind
closesocket
winmm
timeGetTime
Exports
Exports
CrashForExceptionInNonABICompliantCodeRange
Sections
.text Size: 22.3MB - Virtual size: 22.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10.5MB - Virtual size: 10.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 883KB - Virtual size: 883KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ