C:\Users\tests\Desktop\Neuer Ordner\SetWindowsHookEx-Injector-master\x64\release\bin\hookloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
hookloader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
hookloader.exe
Resource
win10v2004-20240226-en
General
-
Target
hookloader.exe
-
Size
14KB
-
MD5
d2bf9a565046ed1a7af516c131c4c659
-
SHA1
7f533f539678518039d90c5aa906a1dc66ec8f1c
-
SHA256
cee52bc13aad12a9ad0d4f309ebee9382d96d116e7c4a9c7cc8fdbe2eb343c62
-
SHA512
6d1fe9cdb8e2b467171ee5e5aad86f5763f76125c781bc2a84a4e0f19da9958e93fa9fab1da9b8f29b933d377ddbb53ec1ff5d169309c4af8a728256fc37a1d6
-
SSDEEP
192:3rw/QnmFKqrDslO0W6eeUsWrYa7/6iaAws681EW5tfMcZfLC:bmQnmFKqrDDp7sUEaO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource hookloader.exe
Files
-
hookloader.exe.exe windows:6 windows x64 arch:x64
65170648f5315e07fcd38d66136d0fb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetFileAttributesW
GetProcAddress
LoadLibraryExW
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlCaptureContext
user32
PostThreadMessageW
SetWindowsHookExW
FindWindowW
UnhookWindowsHookEx
GetWindowThreadProcessId
msvcp140
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?good@ios_base@std@@QEBA_NXZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
__C_specific_handler
__current_exception
__current_exception_context
memset
memcpy
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
terminate
_crt_atexit
_initialize_onexit_table
_register_thread_local_exe_atexit_callback
_cexit
_c_exit
__p___wargv
__p___argc
system
_exit
exit
_initterm_e
_get_initial_wide_environment
_initialize_wide_environment
_configure_wide_argv
_set_app_type
_seh_filter_exe
_initterm
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ