Static task
static1
Behavioral task
behavioral1
Sample
injector.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
injector.exe
Resource
win10v2004-20231215-en
General
-
Target
injector.exe
-
Size
1.9MB
-
MD5
b8b4a3092e5ed1c63f698813492d8f56
-
SHA1
c7a3197e9b4dea9407c093096dab3684987fb00a
-
SHA256
c6817881e1178b0b49ad76b002e11e69f74fc97de69d47f57d503f1e743a745b
-
SHA512
b7ca17830dcbbf341561ec811318ef07a0fba41d520a8e24da125195e7c1b2e5b140dde6e2d301ef2be31e3bfaa14a08eff69cf457c896173061145d1b8f88fb
-
SSDEEP
24576:ppxIKcXjS1i5vVd6jgYCF01zmpaAWOjKWmFpimuaQFLoB5dkGJcAN4UH3Uvjrd5w:VIKcSE+MqprC45JhNBHkvjr2nJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource injector.exe
Files
-
injector.exe.exe windows:6 windows x64 arch:x64
ffd4e9ae3d36967cda50c81cb89360a8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
QueryPerformanceFrequency
CreateIoCompletionPort
PostQueuedCompletionStatus
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateEventW
CancelWaitableTimer
GetProcessTimes
GetCurrentProcessId
GetThreadPriorityBoost
GetThreadPriority
GetProcessVersion
SetPriorityClass
GetPriorityClass
GetProcessId
GetThreadContext
FlushInstructionCache
GetThreadTimes
OpenProcess
IsProcessorFeaturePresent
GetProcessHandleCount
GetProcessPriorityBoost
SetProcessPriorityBoost
GetThreadIOPendingFlag
GetSystemInfo
GetNativeSystemInfo
SetSystemTimeAdjustment
CreateFileMappingW
FlushViewOfFile
SetProcessWorkingSetSize
GetWriteWatch
ResetWriteWatch
CreateMemoryResourceNotification
IsProcessInJob
AssignProcessToJobObject
SetInformationJobObject
IsWow64Process
DisableThreadLibraryCalls
FreeResource
GetModuleFileNameA
GetModuleFileNameW
LockResource
GlobalUnlock
GlobalCompact
GlobalUnfix
GlobalUnWire
LocalUnlock
LocalShrink
LocalCompact
GetProcessAffinityMask
GetProcessIoCounters
ConvertFiberToThread
CreateFiberEx
CreateFiber
ConvertThreadToFiber
PulseEvent
GlobalDeleteAtom
InitAtomTable
DeleteAtom
SetHandleCount
SetMessageWaitingIndicator
ClearCommBreak
ClearCommError
EscapeCommFunction
GetCommMask
GetCommModemStatus
GetCommTimeouts
TransmitCommChar
PrepareTape
EraseTape
CreateTapePartition
GetTapeStatus
MulDiv
GetMailslotInfo
GetNamedPipeHandleStateW
AddAtomW
GetNamedPipeHandleStateA
MapUserPhysicalPagesScatter
Sleep
ExitProcess
GlobalSize
LocalSize
GlobalFlags
GlobalHandle
LocalHandle
GetModuleHandleW
GetProcAddress
WriteConsoleW
CloseHandle
GetConsoleMode
GetConsoleOutputCP
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindClose
HeapFree
HeapAlloc
GetModuleHandleExW
WriteFile
RtlPcToFileHeader
RaiseException
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLastError
RtlUnwindEx
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetNamedPipeInfo
PeekNamedPipe
DisconnectNamedPipe
SetLastError
SetHandleInformation
DecodeSystemPointer
EncodeSystemPointer
DecodePointer
EncodePointer
UnlockFileEx
UnlockFile
SetFileValidData
SetFilePointerEx
SetFilePointer
SetEndOfFile
LockFileEx
LockFile
GetFileTime
GetFileType
GetFileSizeEx
GetFileSize
GetFileInformationByHandle
QueryPerformanceCounter
GetFileAttributesExW
FlushFileBuffers
FindNextChangeNotification
FindFirstFileExW
CreateFileW
SetStdHandle
SetMailslotInfo
GetStdHandle
user32
IsCharUpperW
GetFocus
GetKeyState
GetKeyboardState
GetKeyNameTextW
ToAsciiEx
ToUnicode
OemKeyScan
SendInput
MapVirtualKeyExW
GetCapture
IsWindowEnabled
GetMenuStringW
SetMenuItemBitmaps
TrackPopupMenuEx
GrayStringW
WindowFromDC
GetWindowRgn
ExcludeUpdateRgn
InvalidateRgn
ScrollDC
SetScrollRange
GetCursor
ScreenToClient
ChildWindowFromPointEx
UnionRect
OffsetRect
GetClassWord
FindWindowExW
GetTopWindow
GetLastActivePopup
GetWindow
DlgDirSelectComboBoxExW
GetScrollInfo
ChangeDisplaySettingsExW
BlockInput
GetCursorInfo
GetTitleBarInfo
GetMenuBarInfo
GetScrollBarInfo
IsCharAlphaW
CharPrevExA
CharLowerBuffW
GetClipboardSequenceNumber
GetDialogBaseUnits
GetNextDlgTabItem
GetNextDlgGroupItem
SetDlgItemTextW
GetDlgItemInt
AnyPopup
IsWindowVisible
DeferWindowPos
ShowOwnedPopups
GetLayeredWindowAttributes
GetClassInfoW
DefWindowProcW
WaitForInputIdle
EnableWindow
GetCursorPos
ChildWindowFromPoint
DefDlgProcA
InvalidateRect
InsertMenuItemA
FindWindowA
CharLowerBuffA
GetSystemMenu
GetMessageA
CheckMenuRadioItem
DispatchMessageA
GetWindowRect
GetMenu
LoadCursorA
DestroyWindow
SetWindowPos
CheckRadioButton
SetActiveWindow
PostMessageA
EndDialog
GetSystemMetrics
CreatePopupMenu
DialogBoxParamA
GetWindowPlacement
DestroyCursor
TrackPopupMenu
wsprintfA
GetSubMenu
GetActiveWindow
IsWindow
OpenClipboard
TranslateAcceleratorA
GetDlgItemTextA
SetTimer
RedrawWindow
DestroyIcon
IsDialogMessageA
SetMenuItemInfoA
IsMenu
SetWindowLongA
GetClassInfoExW
ClientToScreen
CloseClipboard
CallWindowProcA
DestroyAcceleratorTable
EmptyClipboard
GetWindowTextA
LoadAcceleratorsA
GetWindowLongA
SetWindowPlacement
wvsprintfA
SetWindowTextA
MessageBoxA
GetSysColor
MoveWindow
EnumClipboardFormats
IsDlgButtonChecked
RegisterClassA
DestroyMenu
SetDlgItemInt
EnableMenuItem
GetSysColorBrush
PostQuitMessage
CheckDlgButton
KillTimer
UnregisterClassA
GetDlgItem
SetFocus
TranslateMessage
GetClientRect
CheckMenuItem
RemoveMenu
AppendMenuA
CharUpperA
LoadIconA
CreateDialogParamA
SetCursor
SetClipboardData
SendMessageA
SetDlgItemTextA
GetClassInfoA
SendDlgItemMessageA
GetClipboardData
gdi32
AbortPath
GetObjectA
DeleteObject
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
GetStockObject
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegDeleteKeyA
GetUserNameA
LookupPrivilegeValueA
RegQueryValueExA
RegSetValueA
RegCloseKey
AdjustTokenPrivileges
RegCreateKeyA
RegOpenKeyExA
OpenProcessToken
ole32
OleSetAutoConvert
OleGetAutoConvert
OleRegGetMiscStatus
OleRegGetUserType
OleGetIconOfFile
IsAccelerator
GetRunningObjectTable
GetClassFile
MonikerRelativePathTo
BindMoniker
CoInstall
CoDosDateTimeToFileTime
CoFileTimeToDosDateTime
CoIsOle1Class
CoGetInstanceFromIStorage
CoGetInstanceFromFile
CoRevokeInitializeSpy
CoFileTimeNow
CoTaskMemFree
CoTaskMemAlloc
CoInvalidateRemoteMachineBindings
CoGetTreatAsClass
CoWaitForMultipleHandles
StringFromGUID2
IIDFromString
CLSIDFromString
StringFromCLSID
CoTestCancel
CoCancelCall
CoSetCancelObject
CoGetCancelObject
CoQueryAuthenticationServices
CoImpersonateClient
CoCopyProxy
CoSetProxyBlanket
CoQueryProxyBlanket
CoGetCallContext
CoGetStandardMarshal
CoLockObjectExternal
CoDisconnectObject
CoUnmarshalHresult
CoMarshalHresult
CoUnmarshalInterface
CoMarshalInterface
CoResumeClassObjects
CoRevokeClassObject
CoGetClassObject
CoGetObjectContext
CoGetContextToken
CoGetCallerTID
CoGetMalloc
CoRevokeMallocSpy
comctl32
ImageList_Destroy
ImageList_Create
ImageList_Remove
ImageList_SetBkColor
ImageList_ReplaceIcon
InitCommonControlsEx
CreateToolbarEx
dxgi
CreateDXGIFactory
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 228KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ