Static task
static1
Behavioral task
behavioral1
Sample
Injector64.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Injector64.exe
Resource
win10v2004-20231023-en
General
-
Target
Injector64.exe
-
Size
99KB
-
MD5
fc430917eacee30d8c9c69892400ab30
-
SHA1
c9f393e1abcc5b4ea3434fd3e933585885ed03f4
-
SHA256
d16100561388a26131de03117209cddf71283ef1f84e258204ede745ad4c75b1
-
SHA512
c6a508ab5c257ae869dc9e3a748581ff79e81903819f6496460e5a92a3b949fb93af522966ee3618eef842184a5dfdd76804d0e19105729670407f9a44898b8b
-
SSDEEP
1536:RYCH2FH3YnH7DKpmRzT/9+q6u2AvYHcVMcMpL:fKH3YnGczT/9+buL0cVMcMpL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Injector64.exe
Files
-
Injector64.exe.exe windows:5 windows x64 arch:x64
3b1cf72e482bd7822b4eed28de435670
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
DeleteCriticalSection
GetCurrentProcessId
VerSetConditionMask
GetCurrentProcess
WaitForSingleObject
GetModuleHandleW
CreateRemoteThread
OpenProcess
VirtualFreeEx
EnterCriticalSection
TerminateProcess
VerifyVersionInfoW
GetLastError
GetProcAddress
VirtualAllocEx
GetExitCodeThread
CloseHandle
WriteProcessMemory
LeaveCriticalSection
InitializeCriticalSection
ReadProcessMemory
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetFileAttributesW
ExitProcess
GetCommandLineW
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
Sleep
HeapSize
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryW
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
SetFilePointer
GetConsoleCP
GetConsoleMode
CreateFileW
HeapReAlloc
LCMapStringW
GetStringTypeW
SetStdHandle
FlushFileBuffers
WriteConsoleW
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 830B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ