Static task
static1
Behavioral task
behavioral1
Sample
inject_x64.exe
Resource
win10-20240221-en
General
-
Target
inject_x64.exe
-
Size
22KB
-
MD5
be1d296f84503e230323486d895e4c5a
-
SHA1
695cb145c28e9350f7b53627ea6f45f87e84293e
-
SHA256
0896effc18a3e4c77c8abb2cc38341ea53238887f19a5e2297020cf83261faaf
-
SHA512
79851a398f5d2d09beb850a5bc334b03de400f740ef60b56095ce22efdaa63dcd89febbb412892e40ffe252ba017e6bbac679dcc2bad8d1fe27714cc892658b7
-
SSDEEP
384:Z5NHCPbZGqOyzma9JinjRrCCCUX7XixqhmHZU:Z5e1Jz/zinjR1Cgjhg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource inject_x64.exe
Files
-
inject_x64.exe.exe windows:4 windows x64 arch:x64
b6116240f3984d5bd2c88c6ed2516547
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CheckRemoteDebuggerPresent
CloseHandle
ContinueDebugEvent
CreateProcessA
CreateRemoteThread
DebugActiveProcess
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetExitCodeThread
GetLastError
GetModuleFileNameW
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
QueryPerformanceCounter
ReadProcessMemory
ResumeThread
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SearchPathA
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualAllocEx
VirtualFreeEx
VirtualProtect
VirtualQuery
WaitForDebugEvent
WaitForSingleObject
WideCharToMultiByte
WriteProcessMemory
__C_specific_handler
msvcrt
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_exit
_fmode
_initterm
_onexit
_snwprintf
abort
calloc
exit
fprintf
fputs
free
fwprintf
fwrite
malloc
memcpy
memset
puts
raise
signal
strlen
strncmp
vfprintf
wcscpy
user32
MessageBoxW
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE