C:\Users\ahariail\Desktop\Projects\LockHotkey\Debug\LockHotkey.pdb
Static task
static1
Behavioral task
behavioral1
Sample
95e66aa35c47fbb82ce771e6620a6c2c0e807610242ab2a0f1b5ec60a57618c8.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
95e66aa35c47fbb82ce771e6620a6c2c0e807610242ab2a0f1b5ec60a57618c8.exe
Resource
win10v2004-20240709-en
General
-
Target
95e66aa35c47fbb82ce771e6620a6c2c0e807610242ab2a0f1b5ec60a57618c8
-
Size
208KB
-
MD5
ab8dc56f7e9d3ae3b0b59ea10a0147db
-
SHA1
247cf1bff52986de43757e49af9c2caeab990d38
-
SHA256
95e66aa35c47fbb82ce771e6620a6c2c0e807610242ab2a0f1b5ec60a57618c8
-
SHA512
43a2467da81fc2b03b518e4b235ce6af31ce852ad2e657303141801f16f803e506849b7219f91938b9537fd5f512a9c2d726f0fd1b6534791f6e29c9e4509f63
-
SSDEEP
6144:F1J+1Zk6tik77777BQDaF/p/uwONct43j92UKA:FS1Zk9k77777aa9pGHNu4B2Uj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95e66aa35c47fbb82ce771e6620a6c2c0e807610242ab2a0f1b5ec60a57618c8
Files
-
95e66aa35c47fbb82ce771e6620a6c2c0e807610242ab2a0f1b5ec60a57618c8.exe windows:6 windows x86 arch:x86
5df3d74ec2c2278879f5a38278244f78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc140ud
ord5393
ord14184
ord10763
ord17181
ord13868
ord4477
ord14049
ord10945
ord13645
ord13644
ord6832
ord12115
ord12111
ord12113
ord12114
ord12112
ord17378
ord1610
ord3313
ord3027
ord5156
ord9876
ord12081
ord3899
ord3902
ord16164
ord7549
ord2736
ord9006
ord9164
ord1652
ord1662
ord1176
ord12076
ord6994
ord17154
ord16776
ord3752
ord3751
ord4017
ord4016
ord4759
ord12304
ord13299
ord12901
ord10840
ord1223
ord2928
ord5037
ord11018
ord3312
ord16160
ord7547
ord14092
ord14183
ord14233
ord9885
ord14215
ord7198
ord4493
ord8268
ord1095
ord16367
ord15450
ord7728
ord17261
ord7729
ord17262
ord7727
ord17260
ord9592
ord14599
ord17050
ord13920
ord2012
ord2379
ord9533
ord15117
ord4757
ord4819
ord11212
ord17188
ord9511
ord17182
ord14609
ord14610
ord2887
ord6470
ord10024
ord5352
ord9589
ord5501
ord15030
ord15098
ord12265
ord14223
ord10108
ord1606
ord3024
ord5153
ord10210
ord3089
ord7941
ord493
ord14137
ord11044
ord9016
ord15857
ord12252
ord8649
ord550
ord3763
ord10126
ord5992
ord5993
ord7426
ord14518
ord2045
ord7224
ord16090
ord16100
ord7229
ord16098
ord7228
ord3088
ord5392
ord13333
ord7251
ord10618
ord11166
ord1266
ord2942
ord5057
ord9875
ord11021
ord13721
ord13716
ord6486
ord14141
ord4483
ord5499
ord14063
ord11046
ord14041
ord13398
ord12231
ord11115
ord11238
ord2033
ord5894
ord5961
ord5906
ord5924
ord5918
ord5912
ord5971
ord5955
ord5900
ord5977
ord5932
ord5870
ord5885
ord5946
ord5405
ord7021
ord11511
ord5391
ord3635
ord17183
ord9512
ord17189
ord8290
ord13636
ord16093
ord7225
ord3220
ord14085
ord4596
ord3976
ord3977
ord3856
ord14132
ord1102
ord8273
ord6303
ord6711
ord6991
ord11164
ord6679
ord6306
ord6537
ord6282
ord9264
ord9265
ord9254
ord6535
ord9889
ord11017
ord1517
ord963
ord15341
ord1660
ord8456
ord4739
ord12887
ord11065
ord3857
ord16316
ord14245
ord14241
ord1978
ord2000
ord1225
ord2026
ord2616
ord9165
ord13921
ord1653
ord2804
kernel32
RaiseException
DecodePointer
SetLastError
OutputDebugStringW
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EnterCriticalSection
FreeLibrary
VirtualQuery
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
CloseHandle
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
GetLastError
user32
UnregisterHotKey
UnregisterClassW
RegisterHotKey
LockWorkStation
ExitWindowsEx
PostQuitMessage
LoadCursorW
PeekMessageW
gdi32
DeleteDC
oleaut32
SysFreeString
gdiplus
GdiplusShutdown
vcruntime140d
__vcrt_LoadLibraryExW
__vcrt_GetModuleHandleW
__vcrt_GetModuleFileNameW
__std_type_info_destroy_list
_except_handler4_common
__vcrt_InitializeCriticalSectionEx
memset
__CxxFrameHandler3
memmove
ucrtbased
free
malloc
_CrtDbgReportW
_seh_filter_exe
_set_app_type
__setusermatherr
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_set_fmode
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
_CrtDbgReport
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
_controlfp_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
_invalid_parameter_noinfo
_errno
_recalloc
__stdio_common_vswprintf_s
__stdio_common_vswprintf
wcslen
wcscpy_s
__stdio_common_vsnwprintf_s
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 409B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ