D:\build\xra_common\commonhelper\Release_cqhhyd\hhydasst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
131210eb3cbc3468d218ad9baabd3d528774268d9ae5e5313ab4d1e366318ed0.exe
Resource
win7-20240903-en
General
-
Target
131210eb3cbc3468d218ad9baabd3d528774268d9ae5e5313ab4d1e366318ed0
-
Size
456KB
-
MD5
d1f250705b7835067083494b3b7dc36d
-
SHA1
63f6929145319f306ae8b2102e57e3d6573049bf
-
SHA256
131210eb3cbc3468d218ad9baabd3d528774268d9ae5e5313ab4d1e366318ed0
-
SHA512
237b3e141765bb34d729abb89b6a3bd5cd6bc7ee8e832ab2378ae7f502978db463cd691a0350158783cbf16cbb4578b33a51e6c63cf161798e811c205904b885
-
SSDEEP
6144:R4+lLqcCnjTxN+q0y2Zqj/qmPlJw0cB2OETiPZWVamcAOV+5vF9fHrymSSvnsEHV:R4+JEZOm9Jw0cB2/TG4amcb+5rCSVCY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 131210eb3cbc3468d218ad9baabd3d528774268d9ae5e5313ab4d1e366318ed0
Files
-
131210eb3cbc3468d218ad9baabd3d528774268d9ae5e5313ab4d1e366318ed0.exe windows:5 windows x86 arch:x86
2f6723c91364fce4df14f0570512e399
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
WriteConsoleW
CloseHandle
GetTickCount
GetCommandLineW
OutputDebugStringW
GetPrivateProfileStringW
WideCharToMultiByte
SetProcessShutdownParameters
MultiByteToWideChar
GetVersionExW
LoadLibraryExW
CreateMutexW
lstrcmpiW
InitializeCriticalSectionAndSpinCount
SetLastError
GetLastError
GetCurrentThreadId
RaiseException
InterlockedDecrement
InterlockedIncrement
DecodePointer
GetModuleFileNameW
WritePrivateProfileStringW
GetPrivateProfileIntW
FindResourceExW
FindResourceW
GetModuleHandleW
LoadLibraryW
SizeofResource
LoadResource
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
LCMapStringW
CompareStringW
GetTimeZoneInformation
GetStringTypeW
GetFileType
GetACP
GetStdHandle
ExitProcess
FreeLibraryAndExitThread
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapDestroy
GetProcAddress
FreeLibrary
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FlushFileBuffers
WriteFile
FindClose
LockResource
CreateFileW
lstrcmpA
DeviceIoControl
GetSystemWindowsDirectoryW
FreeResource
Sleep
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleExW
CancelWaitableTimer
SetWaitableTimer
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
InterlockedExchange
InterlockedCompareExchange
GetCurrentThread
GetThreadIOPendingFlag
ResumeThread
SetEvent
ResetEvent
WaitForSingleObject
DuplicateHandle
CreateEventW
CreateWaitableTimerW
user32
DispatchMessageW
SendMessageW
UnregisterClassW
PostMessageW
RegisterClassExW
TranslateMessage
PeekMessageW
CallWindowProcW
DestroyWindow
IsWindow
CreateWindowExW
GetMessageW
DefWindowProcW
GetClassInfoExW
DrawFocusRect
ShowWindow
PostQuitMessage
LoadCursorW
GetParent
SetWindowLongW
GetWindowLongW
ScreenToClient
GetClientRect
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetAsyncKeyState
CharNextW
MsgWaitForMultipleObjectsEx
EnumThreadWindows
CopyRect
OffsetRect
SetCursor
UnionRect
PtInRect
EqualRect
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateDIBSection
GetObjectW
RectVisible
SetViewportOrgEx
DeleteDC
DeleteObject
RestoreDC
SelectObject
SaveDC
OffsetViewportOrgEx
advapi32
RegDeleteValueW
GetTokenInformation
OpenServiceW
OpenSCManagerW
CreateServiceW
CloseServiceHandle
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
OpenProcessToken
shell32
ShellExecuteW
SHGetSpecialFolderPathW
ord165
ShellExecuteExW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoCreateGuid
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CoInitializeSecurity
oleaut32
SysAllocStringLen
VarUI4FromStr
VariantClear
VariantInit
SysAllocString
SysFreeString
SysStringLen
shlwapi
SHGetValueW
StrToIntW
StrToInt64ExW
wnsprintfW
ord213
ord214
StrCmpNIW
StrCmpIW
StrTrimA
StrStrIA
StrStrIW
PathRemoveFileSpecW
PathCombineW
PathFileExistsW
PathAppendW
comctl32
InitCommonControlsEx
_TrackMouseEvent
gdiplus
GdiplusStartup
GdipCreateSolidFill
GdipDeleteBrush
GdipCreateFromHDC
GdipDeleteGraphics
GdipFillRectangleI
GdipGetImageHeight
GdipGetImageWidth
GdipDrawImageRectRect
secur32
GetUserNameExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
iphlpapi
GetAdaptersInfo
winhttp
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpSetOption
WinHttpSetTimeouts
WinHttpSetStatusCallback
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpSetCredentials
WinHttpQueryHeaders
WinHttpReceiveResponse
Sections
.text Size: 258KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE