G:\Code\Audit\InsideSrc\0801106204_proto_changed\target\release\symbols\client\Input.pdb
Static task
static1
Behavioral task
behavioral1
Sample
287f6f27211ffc742ae14d356814e069335b2bc1e54ea0fc60a05eb5fa25fb37.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
287f6f27211ffc742ae14d356814e069335b2bc1e54ea0fc60a05eb5fa25fb37.dll
Resource
win10v2004-20240508-en
General
-
Target
287f6f27211ffc742ae14d356814e069335b2bc1e54ea0fc60a05eb5fa25fb37
-
Size
151KB
-
MD5
3270c67e89f76bdbab12d99217323007
-
SHA1
78149c0bf82489940a73270df2dce3f64dda1bc7
-
SHA256
287f6f27211ffc742ae14d356814e069335b2bc1e54ea0fc60a05eb5fa25fb37
-
SHA512
9a3d743b5838e0e94f2dedae1c988439353709fcdfb749c2a84ca546702f5d379f9287c0ac9af85c73582ea4846155e0ef738d3714fc87b41eda300fdc308f2f
-
SSDEEP
1536:gc6PvPT2lkWqfEcCoBo1NTeyB/0UQDnmYliE:yPTFfq4oz1WhliE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 287f6f27211ffc742ae14d356814e069335b2bc1e54ea0fc60a05eb5fa25fb37
Files
-
287f6f27211ffc742ae14d356814e069335b2bc1e54ea0fc60a05eb5fa25fb37.dll windows:5 windows x86 arch:x86
95813c599edd9405d7669854a8f8f6bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTickCount
GetCurrentProcess
TerminateProcess
Sleep
GetProcAddress
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcessHeap
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateFileW
LoadLibraryW
HeapReAlloc
GetStringTypeW
WriteConsoleW
SetStdHandle
HeapSize
GetModuleFileNameW
LCMapStringW
GetLastError
CloseHandle
FlushFileBuffers
WriteFile
ReadFile
SetEndOfFile
SetFilePointer
CreateFileA
DeleteFileA
CreateDirectoryA
SetFileAttributesA
lstrcatA
CreateEventA
FindFirstFileA
FindNextFileA
FindClose
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetModuleFileNameA
SetEvent
DisableThreadLibraryCalls
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
GetStdHandle
SetHandleCount
ExitProcess
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetSystemTimeAsFileTime
DecodePointer
RtlUnwind
EncodePointer
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
user32
GetForegroundWindow
GetKeyNameTextA
GetWindowTextA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
imm32
ImmGetCompositionStringA
ImmReleaseContext
ImmGetContext
Exports
Exports
keybord_monitor_get_len
keybord_monitor_get_record
keybord_monitor_startup
keybord_monitor_stop
keybord_set_white_list
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Keybord Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ