D:\ProgramCode\KeyLogger2\x64\Release\keylogger2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ca38f7b10edf818619921b879e6f0bef01ac62d4b817e93199cdc4506783a3e3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca38f7b10edf818619921b879e6f0bef01ac62d4b817e93199cdc4506783a3e3.exe
Resource
win10v2004-20240319-en
General
-
Target
ca38f7b10edf818619921b879e6f0bef01ac62d4b817e93199cdc4506783a3e3
-
Size
1.3MB
-
MD5
4a94ed7c5a46379b9f9b0eb98db08e3c
-
SHA1
404d6fedc88c22f5479c71c22c1a0ee4ba586d63
-
SHA256
ca38f7b10edf818619921b879e6f0bef01ac62d4b817e93199cdc4506783a3e3
-
SHA512
8c1a8e83052ff002b07ac723de953848d347c23a83915a51148d1caa9b0b7dc77274289528269239a251f2aaa739975bae21b8575a8f8b60b31d88a5cddde81d
-
SSDEEP
24576:joJXY4fSfaJXJtUNh/GrnSih5Ti1h0TsmlvCPBzO92:89Y4fYA5CNRG7Su5TWhzQC1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca38f7b10edf818619921b879e6f0bef01ac62d4b817e93199cdc4506783a3e3
Files
-
ca38f7b10edf818619921b879e6f0bef01ac62d4b817e93199cdc4506783a3e3.exe windows:6 windows x64 arch:x64
1127ebb350ec46e4bd4f551de453fbd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
CallNextHookEx
FindWindowA
GetForegroundWindow
GetKeyState
GetKeyboardLayout
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
MapVirtualKeyExA
MessageBoxA
SetWindowsHookExA
ShowWindow
kernel32
CloseHandle
CompareStringW
CreateFileW
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetEnvironmentStringsW
GetFileSizeEx
GetFileType
GetLastError
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
HeapAlloc
HeapFree
HeapQueryInformation
HeapReAlloc
HeapSize
HeapValidate
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableW
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SwitchToThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WideCharToMultiByte
WriteConsoleW
WriteFile
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gxfg Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.retplne Size: 512B - Virtual size: 92B
.rsrc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ