D:\CrackCode\SetWindowsHookEx-Injector-master\x64\release\bin\hookloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Skin_Injector.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Skin_Injector.exe
Resource
win10v2004-20240709-en
General
-
Target
Skin_Injector.exe
-
Size
3.3MB
-
MD5
8ea32acbd08d56307476fb04a3fa45ea
-
SHA1
4e4b6a3f28fd64fc668c99dfb13a8d7f84b8c3af
-
SHA256
6c0957602031d857fa55b3d391e8c66340227b257e5ca2aeed576e3ce3e7674a
-
SHA512
df284c7cf8412d175f3b96e99ddfa07c775e4bc422f327112a6ef539ac12846fde115c04e97c9fa3fcef028b72b5e8f529146f4c3635de04111af215932e2cbd
-
SSDEEP
49152:7pYVLbll2nMOjaRLjXhgzJQFiUzcaT4oJMN4t8TtNyAoOWIwn2As7BcINCJm:iVLRl8MbRLTqJQ8aT4oN4oIwnUcMZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Skin_Injector.exe
Files
-
Skin_Injector.exe.exe windows:6 windows x64 arch:x64
c2ab5695ca3d975486dc439042782c1d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
FindFirstFileW
FindNextFileW
LoadLibraryExA
GetTempPathW
CreateMutexW
FindClose
OpenProcess
Sleep
GetTempPathA
GetLastError
DeleteFileW
CloseHandle
GetProcAddress
GetSystemTimeAsFileTime
GetTempFileNameA
GetProcessTimes
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlCaptureContext
user32
PostQuitMessage
PostThreadMessageW
SetWindowsHookExW
FindWindowW
TranslateMessage
UnhookWindowsHookEx
DispatchMessageW
MessageBeep
CallNextHookEx
MessageBoxW
GetMessageW
GetWindowThreadProcessId
msvcp140
?_Throw_Cpp_error@std@@YAXH@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?_Xout_of_range@std@@YAXPEBD@Z
?_Throw_C_error@std@@YAXH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Xlength_error@std@@YAXPEBD@Z
_Cnd_do_broadcast_at_thread_exit
_Thrd_detach
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
??1_Lockit@std@@QEAA@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
??Bid@locale@std@@QEAA_KXZ
??0_Lockit@std@@QEAA@H@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcmp
memcpy
memset
__current_exception_context
__current_exception
_CxxThrowException
__C_specific_handler
__std_terminate
__std_exception_copy
__std_exception_destroy
memmove
api-ms-win-crt-stdio-l1-1-0
setvbuf
fgetpos
fwrite
fread
_fseeki64
ungetc
fsetpos
fgetc
_get_stream_buffer_pointers
fclose
fflush
fputc
_set_fmode
__p__commode
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_get_narrow_winmain_command_line
_initterm
_cexit
_exit
_c_exit
_register_thread_local_exe_atexit_callback
_crt_atexit
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_beginthreadex
terminate
_initialize_onexit_table
_initialize_narrow_environment
_seh_filter_exe
exit
_configure_narrow_argv
_initterm_e
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
_lock_file
api-ms-win-crt-heap-l1-1-0
malloc
free
_set_new_mode
_callnewh
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
iphlpapi
GetInterfaceInfo
msvcrt
_wcsnicmp
psapi
GetMappedFileNameW
advapi32
RegSetValueExA
shell32
SHGetFolderPathW
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ