C:\assemblage\Builds\860500344220642890gckpctjutk\ChromeHookCLR-master\ChromeHook\assemblage_outdir_bin\ChromeHook64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
193af79e2b58d5e132bbb32dd51e85a45402a376587fc68bf5d5552571cc6ac7.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
193af79e2b58d5e132bbb32dd51e85a45402a376587fc68bf5d5552571cc6ac7.dll
Resource
win10v2004-20240802-en
General
-
Target
193af79e2b58d5e132bbb32dd51e85a45402a376587fc68bf5d5552571cc6ac7
-
Size
11KB
-
MD5
16805e0df2b70c557fd53ee43b4bd67f
-
SHA1
7e727998f4c64ac445287b770dd6a8dcfbef0a32
-
SHA256
193af79e2b58d5e132bbb32dd51e85a45402a376587fc68bf5d5552571cc6ac7
-
SHA512
2bc3afbc75a081bdacae04c456e4ac40c563e4bc77cef3c67f82f53681241d20bba41e9e13ebb141c9e8de40bab8e48e4c11ef42da7a85897001e3635e648839
-
SSDEEP
192:GbsvKNnUQ8wsC7WT6vbFsmNK7BdFNOy+I:dvoUmr9uzCu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 193af79e2b58d5e132bbb32dd51e85a45402a376587fc68bf5d5552571cc6ac7
Files
-
193af79e2b58d5e132bbb32dd51e85a45402a376587fc68bf5d5552571cc6ac7.dll windows:6 windows x64 arch:x64
94ff8308ad61bb4a785f72c66e67d0e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
IsWindow
SendNotifyMessageW
RegisterWindowMessageW
FindWindowW
CallNextHookEx
PostMessageW
vcruntime140
__std_type_info_destroy_list
memset
__C_specific_handler
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_initialize_narrow_environment
_initterm_e
_initterm
_execute_onexit_table
_cexit
_configure_narrow_argv
_seh_filter_dll
kernel32
GetCurrentThreadId
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
RtlCaptureContext
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
Exports
Exports
CallWndRetProc
GetMsgProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ