Static task
static1
Behavioral task
behavioral1
Sample
keymaker.exe
Resource
win10-20240404-en
General
-
Target
keymaker.exe
-
Size
22KB
-
MD5
1c4174ad9a472a494b8516b910142260
-
SHA1
a67576ad9c228e3795a428c32c288bde9f4b8f7a
-
SHA256
8dc3b20bbb4ea65ea113f2c95711b671c520619cee6ce71de5d0c1ead0c6247d
-
SHA512
04c0ae8f2e8b3657b1962e5047ded622b8bbfab6efda921ad7f8c1b2cfde3b63d237b8d8e58b095cf97e23a1216b5e3e3c560c58c8969d25609256496add5d04
-
SSDEEP
384:+qMTwIEKDD7YRDV2cliISpENkwPtYUJ45o4AlV+unkwtc5lZZN6rdeaq7uA6D:+qywIE2clUp9wPSY+ujtc/ZZX7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource keymaker.exe
Files
-
keymaker.exe.exe windows:4 windows x64 arch:x64
5de9db21468d7be2461d9708711c1dea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
memset
memmove
memcpy
_localtime64
_mktime64
wcslen
wcscpy
wcsncpy
strlen
wcscmp
malloc
free
kernel32
GetModuleHandleW
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
InitializeCriticalSection
GetCommandLineW
HeapAlloc
HeapFree
WriteFile
CreateFileW
SetFilePointer
HeapReAlloc
GetLocalTime
AllocConsole
GetStdHandle
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
SetConsoleTitleW
FlushFileBuffers
SetConsoleMode
ReadConsoleW
EnterCriticalSection
ReadFile
GetLastError
LeaveCriticalSection
WriteConsoleW
MultiByteToWideChar
WideCharToMultiByte
user32
CharUpperW
Sections
.code Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE