Analysis
-
max time kernel
26s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 09:33
Behavioral task
behavioral1
Sample
injector.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
injector.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
injector.exe
-
Size
985KB
-
MD5
e5ad89e0cce625fde0ddec73721e1459
-
SHA1
42dbcc7f946bc373313cae17e9d940d916d24638
-
SHA256
8e0428963b01a1588da55251c97762e89e723105119df57f4d25480395eefb8e
-
SHA512
71afe5ad4bcb4099bcfd5b4944d8426887abbdee9f4d7e9946f5a50c70de7904bd781cc0d6a80d41d087a17235ba6160f835adea49930337df55281c137202b3
-
SSDEEP
24576:b5TUg+vOIcVZmtfA/yq+oPMIdvtkYGciFag:btg04fTqNP3vSFfs
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4864-132-0x00000000002D0000-0x00000000004D6000-memory.dmp vmprotect behavioral2/memory/4864-133-0x00000000002D0000-0x00000000004D6000-memory.dmp vmprotect behavioral2/memory/4864-135-0x00000000002D0000-0x00000000004D6000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
injector.exepid process 4864 injector.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
injector.exepid process 4864 injector.exe 4864 injector.exe