InputInjectionBroker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
InputInjectionBroker.dll
Resource
win10v2004-20240426-en
General
-
Target
InputInjectionBroker.dll
-
Size
99KB
-
MD5
7743db98b7542ef699061ed13a9a5405
-
SHA1
11d64cef86bab3338764054e4400d915e6ce227d
-
SHA256
2b8c60268aec256cdbe26cf8b10e3b109577029912093e6fadbbba65208e6bea
-
SHA512
f66ba84eb8e764941d8c12a4b59992162865b5106aae691f74fd825775394107dbb86e8b1186fe4edec572825d1707ff7c9f7c3f8ee3b469ebc4b8e0eda9f926
-
SSDEEP
3072:6Y++G6qQmRE8EQFapgXIyOkFu6/UpqmIe:6dJ6qQmG8LFa+OkfUt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource InputInjectionBroker.dll
Files
-
InputInjectionBroker.dll.dll windows:10 windows x86 arch:x86
b7814fdcc20218452fa969fa5500a328
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_onexit
_unlock
__dllonexit
__CxxFrameHandler3
_initterm
_lock
ceil
_ftol2_sse
malloc
free
_amsg_exit
_XcptFilter
_purecall
_vsnprintf_s
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
_callnewh
??0exception@@QAE@ABQBD@Z
??0exception@@QAE@ABQBDH@Z
?what@exception@@UBEPBDXZ
_CxxThrowException
memcpy
memmove
?terminate@@YAXXZ
??1type_info@@UAE@XZ
??1exception@@UAE@XZ
??3@YAXPAX@Z
_except_handler4_common
memcpy_s
memcmp
_vsnwprintf
floor
_ftol2
memset
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleExW
DisableThreadLibraryCalls
GetModuleHandleW
GetProcAddress
GetModuleFileNameA
api-ms-win-core-synch-l1-1-0
EnterCriticalSection
LeaveCriticalSection
ReleaseSemaphore
InitializeCriticalSectionEx
CreateMutexExW
OpenSemaphoreW
ReleaseMutex
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateSemaphoreExW
WaitForSingleObjectEx
ReleaseSRWLockShared
AcquireSRWLockShared
DeleteCriticalSection
WaitForSingleObject
api-ms-win-core-heap-l1-1-0
GetProcessHeap
HeapFree
HeapAlloc
api-ms-win-core-errorhandling-l1-1-0
GetLastError
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcessId
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-debug-l1-1-0
OutputDebugStringW
DebugBreak
IsDebuggerPresent
api-ms-win-core-handle-l1-1-0
CloseHandle
rpcrt4
NdrOleAllocate
NdrStubForwardingFunction
CStdStubBuffer_Invoke
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrCStdStubBuffer2_Release
IUnknown_AddRef_Proxy
CStdStubBuffer_DebugServerQueryInterface
NdrOleFree
CStdStubBuffer_AddRef
IUnknown_Release_Proxy
NdrStubCall2
CStdStubBuffer_DebugServerRelease
IUnknown_QueryInterface_Proxy
CStdStubBuffer_IsIIDSupported
api-ms-win-core-com-midlproxystub-l1-1-0
NdrProxyForwardingFunction4
ObjectStublessClient6
CStdStubBuffer2_QueryInterface
ObjectStublessClient8
ObjectStublessClient13
ObjectStublessClient7
CStdStubBuffer2_Disconnect
ObjectStublessClient9
ObjectStublessClient10
CStdStubBuffer2_CountRefs
ObjectStublessClient11
NdrProxyForwardingFunction3
ObjectStublessClient16
ObjectStublessClient17
CStdStubBuffer2_Connect
ObjectStublessClient14
ObjectStublessClient18
ObjectStublessClient15
NdrProxyForwardingFunction5
ObjectStublessClient19
ObjectStublessClient12
api-ms-win-core-winrt-string-l1-1-0
WindowsGetStringRawBuffer
WindowsStringHasEmbeddedNull
WindowsIsStringEmpty
WindowsCreateString
api-ms-win-core-winrt-error-l1-1-0
RoOriginateError
RoOriginateErrorW
api-ms-win-core-com-l1-1-0
CoImpersonateClient
CoRevertToSelf
CoTaskMemFree
CoTaskMemAlloc
CoCreateFreeThreadedMarshaler
CoGetMalloc
api-ms-win-eventing-provider-l1-1-0
EventSetInformation
EventWriteTransfer
EventRegister
EventUnregister
api-ms-win-core-util-l1-1-0
DecodePointer
EncodePointer
api-ms-win-core-synch-l1-2-0
Sleep
InitOnceExecuteOnce
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
ext-ms-win-ntuser-rim-l1-1-0
RemoveInjectionDevice
InitializePointerDeviceInjection
InjectMouseInput
InjectKeyboardInput
InjectPointerInput
ext-ms-win-ntuser-rim-l1-1-1
InjectGenericHidInput
InitializeGenericHidInjection
api-ms-win-security-capability-l1-1-0
CapabilityCheck
ntdll
RtlSubscribeWnfStateChangeNotification
RtlUnsubscribeWnfNotificationWaitForCompletion
xboxgipsynthetic
SyntheticController_Connect
SyntheticController_SendReport
SyntheticController_GetDeviceId
SyntheticController_Disconnect
SyntheticController_CreateController
SyntheticController_RemoveController
SyntheticController_SetTargetProcess
Exports
Exports
DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ