C:\Users\malwation\Downloads\al-khaser-master\al-khaser-master\x64\Release\al-khaser.pdb
Static task
static1
Behavioral task
behavioral1
Sample
al-khaser.exe
Resource
win10-20240404-en
General
-
Target
al-khaser.exe
-
Size
239KB
-
MD5
bfd04d4264a27f52b4dbd65153205b82
-
SHA1
e76c99a1c5eddd96339e267d2491fed8376bd8ed
-
SHA256
330e59c586a56a30905ec4645df3c7961de00f20c54b0983537ac8294053adfe
-
SHA512
055617c1a3146fdb10615bb83f36518bd8fc81e0f859fad2958502c2dffb44ea51fcc5d9557780619f67bfc8b9ed033b97464376908b1f5872fecacf66c22364
-
SSDEEP
3072:cZNQvM2N1FAoK9TbbDSkDJmEHdojgguT5AZHdvKEfZTHy4QG4BCPOClK22JXtU6G:cZsqfukDJmEdo80g57NX2NNNylSHT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource al-khaser.exe
Files
-
al-khaser.exe.exe windows:6 windows x64 arch:x64
8d79df6b44247081b2a035f52abce6f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SetLastError
OutputDebugStringW
GetLastError
GetModuleHandleExW
VirtualQuery
OpenProcess
K32GetModuleFileNameExW
GetWindowsDirectoryW
QueryInformationJobObject
GetCurrentProcessId
K32GetProcessImageFileNameW
QueryDosDeviceW
GetSystemDirectoryW
GetEnvironmentVariableW
GetModuleFileNameW
K32GetMappedFileNameW
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
CreateMutexW
SetHandleInformation
CreateEventW
SetEvent
CreateThread
SwitchToThread
WaitForSingleObject
SetUnhandledExceptionFilter
RaiseException
GetWriteWatch
GlobalGetAtomNameW
GetBinaryTypeW
HeapQueryInformation
ReadProcessMemory
ResetWriteWatch
GetModuleHandleW
GetComputerNameW
GetComputerNameExW
GetSystemWindowsDirectoryW
CreateFileW
LocalAlloc
DeviceIoControl
LocalFree
GetTickCount
GlobalMemoryStatusEx
GetDiskFreeSpaceExW
Wow64DisableWow64FsRedirection
VerSetConditionMask
ExpandEnvironmentStringsW
LoadLibraryA
GetStdHandle
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetConsoleTitleW
GetConsoleWindow
FormatMessageW
lstrlenW
LocalSize
MultiByteToWideChar
GetFileAttributesW
HeapAlloc
HeapFree
Process32FirstW
Process32NextW
CreateWaitableTimerW
SetWaitableTimer
CancelWaitableTimer
CreateTimerQueue
CreateTimerQueueTimer
DeleteTimerQueueEx
VerifyVersionInfoW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
LoadLibraryW
GetProcAddress
K32GetModuleInformation
VirtualProtect
GetSystemInfo
GetProcessHeap
IsDebuggerPresent
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
VirtualFree
GetCurrentThread
GetThreadContext
VirtualAlloc
CloseHandle
GetCurrentProcess
Wow64RevertWow64FsRedirection
CheckRemoteDebuggerPresent
user32
GetLastInputInfo
FindWindowW
MoveWindow
GetSystemMetrics
KillTimer
DispatchMessageW
GetShellWindow
GetWindowThreadProcessId
wsprintfW
SetTimer
GetMessageW
GetCursorPos
TranslateMessage
advapi32
OpenSCManagerW
GetTokenInformation
OpenProcessToken
EnumServicesStatusExW
CloseServiceHandle
GetUserNameW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
oleaut32
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
VariantClear
SysAllocString
SysFreeString
SafeArrayUnaccessData
msvcp140
_Equivalent
?_Xinvalid_argument@std@@YAXPEBD@Z
_To_wide
?_Syserror_map@std@@YAPEBDH@Z
?_Xlength_error@std@@YAXPEBD@Z
shlwapi
PathFindFileNameW
PathRemoveExtensionW
StrChrW
StrCmpNIW
ord156
StrStrW
PathCombineW
StrStrIW
StrCmpW
wnsprintfW
StrCmpIW
PathGetDriveNumberW
mpr
WNetGetProviderNameW
iphlpapi
IcmpCloseHandle
IcmpSendEcho
GetAdaptersInfo
IcmpCreateFile
winmm
timeKillEvent
timeGetDevCaps
timeEndPeriod
timeSetEvent
setupapi
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
powrprof
GetPwrCapabilities
slwga
SLIsGenuineLocal
vcruntime140
__std_exception_copy
__std_exception_destroy
wcsstr
__C_specific_handler
__current_exception_context
memset
_CxxThrowException
memcpy
__current_exception
memmove
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf
__p__commode
__stdio_common_vfwprintf
_wfopen_s
__acrt_iob_func
_set_fmode
fputc
__stdio_common_vswprintf_s
getchar
__stdio_common_vfprintf
fclose
api-ms-win-crt-string-l1-1-0
_wcsicmp
strtok_s
isxdigit
api-ms-win-crt-runtime-l1-1-0
_exit
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_invalid_parameter_noinfo_noreturn
_crt_atexit
_cexit
_errno
_seh_filter_exe
_set_app_type
terminate
_get_initial_narrow_environment
_initterm
_initterm_e
exit
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
api-ms-win-crt-heap-l1-1-0
malloc
calloc
_set_new_mode
_callnewh
realloc
free
api-ms-win-crt-convert-l1-1-0
_wcstoui64_l
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
_get_current_locale
api-ms-win-crt-time-l1-1-0
_wasctime_s
_time64
_localtime64_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ