hstart.exe

Hidden Start

Alexander Avdonin

The executable hstart.exe, “Hidden Start (32-bit)” has been detected as malware by 4 anti-virus scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘Hstart - email_batch_file.bat’.
Publisher:
NTWind Software  (signed by Alexander Avdonin)

Product:
Hidden Start

Description:
Hidden Start (32-bit)

Version:
4.2.0.0

MD5:
f5d783ba9020eaa13004d468f9a99ea9

SHA-1:
2cdbab23b80de985ced8c831b373c97d2180f921

SHA-256:
e55440da56f4216e1f2a70ccf69b17adfa825d29035700421091b7137f7ca828

Scanner detections:
4 / 68

Status:
Malware

Analysis date:
4/25/2024 10:46:53 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Evo-gen [Susp]
160807-0

Dr.Web
hacktool program Tool.HideApp.53
9.0.1.05190

ESET NOD32
Win32/HiddenStart.B potentially unsafe application
6.3

Reason Heuristics
Win.HiddenStart
16.11.10.9

File size:
1.2 MB (1,228,416 bytes)

Product version:
4.2.0.0

Copyright:
© 2013 NTWind Software

Original file name:
hstart.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\hstart_4.2-bin\hstart.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
3/21/2012 3:00:00 AM

Valid to:
3/22/2015 2:59:59 AM

Subject:
CN=Alexander Avdonin, O=Alexander Avdonin, STREET=Menshikovsky pr. 3-25, L=Saint Petersburg, S=Saint Petersburg, PostalCode=195067, C=RU

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0CF1F3DD67017040C6C52F66A828FCCC

File PE Metadata
Compilation timestamp:
3/18/2013 9:46:53 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:vLUKZqpiHlp72DYNFZWoqDus0kF+DwIo4:vLUKZ0iFp72DYNFZWoqDCwV4

Entry address:
0x1B00

Entry point:
E8, 57, 25, 00, 00, E9, 79, FE, FF, FF, 6A, 0C, 68, 18, 1C, 41, 00, E8, 5E, 23, 00, 00, 8B, 75, 08, 85, F6, 74, 75, 83, 3D, E0, 48, 41, 00, 03, 75, 43, 6A, 04, E8, 96, 27, 00, 00, 59, 83, 65, FC, 00, 56, E8, BE, 27, 00, 00, 59, 89, 45, E4, 85, C0, 74, 09, 56, 50, E8, DF, 27, 00, 00, 59, 59, C7, 45, FC, FE, FF, FF, FF, E8, 0B, 00, 00, 00, 83, 7D, E4, 00, 75, 37, FF, 75, 08, EB, 0A, 6A, 04, E8, 82, 26, 00, 00, 59, C3, 56, 6A, 00, FF, 35, 04, 46, 41, 00, FF, 15, C4, E0, 40, 00, 85, C0, 75, 16, E8, B3, 25, 00...
 
[+]

Entropy:
0.8471

Code size:
52 KB (53,248 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Hstart - email_batch_file.bat

Command:
"C:\users\{user}\downloads\hstart_4.2-bin\hstart.exe" \noconsole \runas \d="C:\exports\circulation_kik" \delay=2 "C:\exports\circulation_kik\email_batch_file.bat"


Remove hstart.exe - Powered by Reason Core Security