Windows Analysis Report
Tools.chm

Overview

General Information

Sample name: Tools.chm
Analysis ID: 1566858
MD5: a2d8bd5d5663f55d04f0a7c707fd4519
SHA1: cad4045a7db598c972741225cb2acf3da16dfb88
SHA256: df3a27254716fcec426384f34ee4aec7ac5576e938f3dabc502c3a5fa18bfcef

Detection

Score: 1
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Queries the volume information (name, serial number etc) of a device

Classification

Source: hh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3291304584.000001D986699000.00000004.00000800.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3290120004.000001D982899000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3
Source: hh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3W
Source: hh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3X
Source: hh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3k
Source: hh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3291864590.000001E18A874000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3p
Source: hh.exe, 00000000.00000002.3290120004.000001D982899000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.autoitscript.com/tools/
Source: classification engine Classification label: clean1.winCHM@1/7@0/0
Source: C:\Windows\hh.exe File created: C:\Users\user\AppData\Roaming\Microsoft\HTML Help Jump to behavior
Source: C:\Windows\hh.exe File created: C:\Users\user\AppData\Local\Temp\IMT91BB.tmp Jump to behavior
Source: C:\Windows\hh.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\hh.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: itss.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: ieframe.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: dataexchange.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: d3d11.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: dcomp.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: dxgi.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: twinapi.appcore.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: msiso.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: mshtml.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: srpapi.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: d2d1.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: dwrite.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: resourcepolicyclient.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: d3d10warp.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: dxcore.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: msimtf.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: msls31.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Windows\hh.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Windows\hh.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52A2AAAE-085D-4187-97EA-8C30DB990436}\InprocServer32 Jump to behavior
Source: C:\Windows\hh.exe Window found: window name: SysTabControl32 Jump to behavior
Source: C:\Windows\hh.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Access\Capabilities\UrlAssociations Jump to behavior
Source: C:\Windows\hh.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\hh.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\hh.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\hh.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\hh.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\hh.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\hh.exe Memory allocated: 1D986640000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\hh.exe Memory allocated: 1E18E7D0000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\hh.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Windows\hh.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Windows\hh.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Windows\hh.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Windows\hh.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Windows\hh.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Windows\hh.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
No contacted IP infos