C:\Users\EFK IS BACK !\Downloads\Windows-DLL-Injector-master\Windows-DLL-Injector-master\InjectorBuild\bin\Release\Win32\Injector.pdb
Overview
overview
7Static
static
7Infracted ...er.exe
windows7-x64
5Infracted ...er.exe
windows10-2004-x64
6Infracted ...or.exe
windows7-x64
1Infracted ...or.exe
windows10-2004-x64
1Infracted ...te.dll
windows7-x64
1Infracted ...te.dll
windows10-2004-x64
1Infracted ...ry.dll
windows7-x64
1Infracted ...ry.dll
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Infracted Loader/Infracted Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Infracted Loader/Infracted Loader.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Infracted Loader/Injector/injector.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Infracted Loader/Injector/injector.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Infracted Loader/Injector/skiddedpaste.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Infracted Loader/Injector/skiddedpaste.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Infracted Loader/Memory.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Infracted Loader/Memory.dll
Resource
win10v2004-20240226-en
General
-
Target
Infracted Loader_cJ8dMVto4ow1dAe.zip
-
Size
6.4MB
-
MD5
cc24482e3d36a5cc1039eab2e1f75815
-
SHA1
c87cacea28b531563c149ef57ba57eaec5fb8b38
-
SHA256
00bebc3b8c8b324d07c69b74f4bc6bbad2b7a63822d139ec0338a9847811a038
-
SHA512
afefc2a11b1d7fc2d93fc91b8a07e81a6b4042c025dcac847ab9a741caa30e63246fdecc62871604aa20fdd5ff91d2a494715e9038af50431e1ce4c74e4e7a82
-
SSDEEP
98304:hkh0mu9LGqnHM0jSG7rSLzVgu9AzsR9H7bqH6pW6O7FgJjjIZUg+4Fl0XPVbJv1c:Ch0m4jRmLzi7zsRFHqHv7Fk/B8Kd98
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Infracted Loader/Injector/skiddedpaste.dll vmprotect -
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/Infracted Loader/Infracted Loader.exe unpack001/Infracted Loader/Injector/injector.exe unpack001/Infracted Loader/Injector/skiddedpaste.dll unpack001/Infracted Loader/Memory.dll
Files
-
Infracted Loader_cJ8dMVto4ow1dAe.zip.zip
-
Infracted Loader/Infracted Loader.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 376KB - Virtual size: 375KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Infracted Loader/Injector/injector.exe.exe windows:6 windows x86 arch:x86
498b25acb8c8faeed0c3af956e4c9dfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
GetProcAddress
VirtualAllocEx
CreateRemoteThread
VirtualFreeEx
GetStdHandle
WriteFile
GetSystemDefaultLangID
GetCurrentThread
LocalFree
FormatMessageA
GetVersionExA
GetLastError
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32Next
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
Sleep
GetModuleHandleA
WaitForSingleObject
Process32First
WriteProcessMemory
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
advapi32
LookupPrivilegeValueA
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
vcruntime140
memset
__current_exception_context
__current_exception
_except_handler4_common
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
__p__commode
_set_fmode
__acrt_iob_func
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_cexit
__p___argv
_get_initial_narrow_environment
__p___argc
system
_crt_atexit
_controlfp_s
terminate
_initialize_narrow_environment
_configure_narrow_argv
_c_exit
_initterm
_exit
_initialize_onexit_table
_initterm_e
_set_app_type
_seh_filter_exe
exit
_register_onexit_function
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Infracted Loader/Injector/skiddedpaste.dll.dll windows:6 windows x86 arch:x86
0830299552c6ffd52afb2c4ba5a37a6b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ClientToScreen
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
xinput1_3
ord4
msvcp140
?_Xlength_error@std@@YAXPBD@Z
imm32
ImmGetContext
d3dcompiler_43
D3DCompile
vcruntime140
memmove
api-ms-win-crt-stdio-l1-1-0
ftell
api-ms-win-crt-heap-l1-1-0
calloc
api-ms-win-crt-math-l1-1-0
_libm_sse2_sqrt_precise
api-ms-win-crt-convert-l1-1-0
strtoull
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-string-l1-1-0
strncpy
wtsapi32
WTSSendMessageW
Exports
Exports
m�����-�y��d�� '��}���&���ҏ����D�����k"�#3<=[z����k�%< � =�%���)͝94��R�"h̔��Ȝ]��6�<ik��36��&_v���I����e�T��͆� લ��K6�ޚy*���$B���^A�T��^_Z�HU��1����w��t3�8�|���()�1֪b��B6ey^�2הD,�^~I���^�� g ~�;��4I �=�2��A�["*(�R�fm�h^�%�{��HS�pvb���-X ��J6ڼUp�s��Nh��A�x��f �_}f�j��ocT K��غD��NK)�m�ȳ �����`d����v�*�n�aNkj�j�E��=�� y���w�#�Ì����q�۷-3��G�+^�E3�A����aH���m�hH׃zZ&�����O�j��w�8�OqIy�Ձy�υ��cQ�RE��T8Vc����r%g��i�hhT[n��%Ge"���op$,��� �#��F,��?����Yn2�� %��p_(��=Y���U;9�����6���,I"" ��퍭������m�/�̼�����N�3{�l���/�uf���B@����hF� 9���E �U<@������it,µ���TR_��� b�Q�6��#�_�Đmj���5����m��~�'ö`��6�0��e��Tr'\�2�Z��n���ܠ[�&�N+��O�l1'w,��;H��r`��=���oL���<e�����Ph�I҅$�����(��+*b��w�B�]m��B��~XCR�E58ڼ��t�������|�������s]�@⋲!�χN�O+w%A4%Tڇ��Ը��5̫����o)�2����ȶ}B�T����Szf{|��EV��:L���ӐX��F���w�rT-�X��M{����dN����fTD.K��*z�d{��4t��[��Xڈ]���-���/?Co��j��6�K�}����B]�y�q�!��͊`Fo-X�� 1�~�+ڽK'H�l��}���3y�R����(��V���yu8��j��x'e12dzW6t6�7��O��;?�Z�kmQ�">������Za7K�d�p��L�~�K���Ɩ�F������npIsCV~�ι.�h){�=���!��K�xf�B�2��u'�%����=I0Ƣp*&��������i\����S�E���=��Qq���(��{ f�Y����8.mh��gw�d��sp/-�Y����um�TsH��)��������ւ�ytT,ț��LT��sX��۶9Qqt_K 휍s�"ʨ��,nO�mV3�C�ݬ]+7*��faG1�E��82�)a<��I��W�������J�$l(Q/�� �����SV~����O���8c���#RVҰ��1$w�Ů��B�;��P����v�D#"�$�'j�M\B*��)�.� ���ǟ�����˜}��|�f��@z3tņ�LDQܬ��*��[�琓����<�L@�u�73~~�?���+�BCs�%z����6�<�$�5�]kr\�d�{O�@��;�.Zo��ܽ��)L& ���I/]������E���s�})�ITn�s`�X{e�d�$)~�%�x� v�X���;N(�]��aS�������4�T;r�>�\���i���H��oJ����X�ab1-$K�E��P�ICl��!�ro�}�����P���l�:/6�?�� �,7��M�#?��:�������w7QŸ(���H�?p�� ��~�Yy��H"���ݗ(�����,ZUY����p�0��}+���L#�[��%��f�.�QbK�ڬ�[R���1"��U�� Lٱ���M���J.�o'�Qғ[�� Eюʰ�~%�=3�e��p�3٭�X 8���2�C�����6�{���D��H�MK��<S���5������� ��X:y�P�9n���@c.����D5ˊ;;ѹ����RY5�ͩ�]�>�4!�jQ4�� Qˍb�k�UH��{�.���1ier�=�As�)#p��)����m�J ?<����5S4���V���֡�V�P�F0�o)=)D��T���Z&\W{b�>({��}v�<;�ۚ9}��rҘD=S�@Ti�4�US�fS�}Ք�Q\`�dX��o�s>�v�뎸�أ�F;CNYC�����_}D ����������С��Z!j|��V����P�eE��f�~R� ��c��o����!�/e3`9�㙃�����Ȼ=7��J�Z�� ͍�R�1{���΄˭���r(����ɫE��Un��,���.����Y����`����:k#�n|B)�ʜ}D���j#����:��.����]����C�� ��t�k�� ��#@z�U Mr���gv^K �Hi0�]���΅�m�*�ߢM��K��J7|v�C����~����D6{�bM� =��q��V'�%�j�:Zs=���Wẽcj'nl�f�3�ՃѯY6����1�>��xS�ꐇ��~�M�P�a\N�D�$���s�x�#��w��*����jQ2Q����v⧁��?�w�$���˖lbw���`5hZ9'�c���3���4x�y���E̙;S����B$!դ�bҙ ^e5��Dͯv�vjVv��~�E�iB ��Z邲ɔ�p�GP��ۏc�8A���-�EO���8�ڋ����X�x.�s���N�}};q��e\8h� ��Ijr��`�-�o+O�YD��I�,����+�i;8w���@{"�B��Jw�T��� ]R��z�hy&��l�xU�+�]�b�g � k�櫁���1�L��T��WQ8��-�K�YZ�����:���W®�W)Pr�T?q�k��_v�H#�|�A`˕�g��"�0����O ����Y��0�/���'���x�'��= r���ч2ի#�愐ٙ�HDÔn����Af~{�Q����8�%�wB20I���~��8�I?F��Yl�CSN��r٠��qɰ:��j�+2���[f �=���.���X�330�|"�Ҧ �
Sections
.text Size: - Virtual size: 369KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.1MB - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Infracted Loader/Memory.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\projects\memory-dll\Memory\obj\x64\Debug\netstandard2.0\Memory.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ