d:\Projects\AKL\kh\Release\kh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9debeb853ab5e0f5c22c27bba2577550N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9debeb853ab5e0f5c22c27bba2577550N.dll
Resource
win10v2004-20240802-en
General
-
Target
9debeb853ab5e0f5c22c27bba2577550N.exe
-
Size
7KB
-
MD5
9debeb853ab5e0f5c22c27bba2577550
-
SHA1
1eebd17676eb4f3a568e0127ed73fd93b8f0afc4
-
SHA256
1f515119f19140178848795922412b048bf212afd9c38ebd304cf8346a542d63
-
SHA512
52ac35f8903450da9e6ec61608add625f7bdb3dd7865cc7cf1ad46365ee6c2897cf696a1fdee012a51046358386e1e6efc0ecb116fa34531ea72f08cf3ab1845
-
SSDEEP
96:6Kh3utCJNQCZQvXO20C5RyYLB+cwfUzC1GWCj0KMRZQDLHel2mIXT6pDYW:R3ugNs+ZC5RyYVAtCmRZoEyD6pUW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9debeb853ab5e0f5c22c27bba2577550N.exe
Files
-
9debeb853ab5e0f5c22c27bba2577550N.exe.dll windows:4 windows x86 arch:x86
56a0310cc21e13f1fbc0b10b145ff8ee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
LoadLibraryA
GetLastError
InterlockedExchange
FreeLibrary
GetProcAddress
LocalFree
LocalAlloc
RaiseException
user32
GetFocus
CallNextHookEx
SendMessageW
SetWindowsHookExW
RegisterWindowMessageW
IsWindow
GetKeyboardState
ToUnicodeEx
PostMessageW
keybd_event
MapVirtualKeyW
UnhookWindowsHookEx
GetKeyboardLayout
Exports
Exports
AddMonitoredWnd
ClearKeyHook
ClearMsgHook
ClearWndCallHook
RemoveMonitoredWnd
SetKeyHook
SetMsgHook
SetWndCallHook
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JOE Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ