Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.InjectorX-gen.13685.31540.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.InjectorX-gen.13685.31540.exe
Resource
win10v2004-20220901-en
General
-
Target
SecuriteInfo.com.Win32.InjectorX-gen.13685.31540.exe
-
Size
101KB
-
MD5
b297defbaac2c9177461f7ea644b8376
-
SHA1
49778c320a1c6cac46f091ed18053e39fc9791de
-
SHA256
573df4c6cb3cc99ce7ea624196414890d4a742e001f60b51b09ebaeb3bded22f
-
SHA512
224d7073bbf304091519b09537eb420809af2a6b48055b9266749330f778e447f9b227e2cecfb70125d0c1adefcc33b63fcdf198e9700182cb5f1b7168134d18
-
SSDEEP
3072:Xk+xKoUhq3kxJ1ARzrajNFrkAbO6zO19wzzDpouRh2S:X8F4+1vjpOAuS
Malware Config
Signatures
Files
-
SecuriteInfo.com.Win32.InjectorX-gen.13685.31540.exe.exe windows x86
d61f20f6dc2e653fd39be3d278f4f253
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetProcessHeap
WaitForSingleObject
ExitProcess
GetExitCodeProcess
CreateProcessW
VirtualAlloc
AssignProcessToJobObject
SetInformationJobObject
LocalFree
GetBinaryTypeW
lstrcpyW
lstrcatW
lstrlenW
CreateJobObjectA
CompareStringW
WideCharToMultiByte
GetOEMCP
EnumLanguageGroupLocalesW
WriteConsoleW
SetConsoleCtrlHandler
DecodePointer
GetConsoleMode
GetConsoleCP
HeapAlloc
HeapReAlloc
HeapSize
SetFilePointerEx
GetLastError
LCMapStringW
WriteFile
ReadFile
GetFullPathNameW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFileSize
GetFileAttributesW
FindFirstFileW
FindClose
GetStdHandle
CreateFileW
GetEnvironmentVariableW
FlushFileBuffers
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
GetModuleFileNameW
GetModuleHandleExW
CloseHandle
msi
ord23
ord159
ord161
ord62
ord154
ord138
avifil32
AVIFileOpenW
AVIStreamGetFrameClose
AVIPutFileOnClipboard
msvfw32
DrawDibStop
ICCompressorFree
resutils
ResUtilGetBinaryValue
ResUtilDupString
ResUtilSetBinaryValue
ResUtilEnumPrivateProperties
ResUtilGetResourceNameDependency
ResUtilVerifyPropertyTable
rpcrt4
NdrPointerMarshall
RpcSsFree
RpcMgmtSetComTimeout
NdrCorrelationPass
RpcServerInqDefaultPrincNameW
I_RpcServerAllocateIpPort
RpcEpRegisterW
NdrEncapsulatedUnionFree
loadperf
UnloadPerfCounterTextStringsW
UnloadPerfCounterTextStringsA
comdlg32
GetSaveFileNameW
GetOpenFileNameW
FindTextW
ChooseColorA
GetSaveFileNameA
PrintDlgW
GetFileTitleW
shell32
ShellExecuteExW
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ