C:\Users\Prxd8\Desktop\loader\IOCTL_Kernel_Manual_Map-main\IOCTL_Kernel_Manual_Map-main\x64\Release\Injector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
injector.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
injector.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
injector.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
injector.exe
Resource
win11-20240221-en
General
-
Target
injector.exe
-
Size
35KB
-
MD5
e3cc068d8abfc48a151cf2d30aa29156
-
SHA1
91d723592c3461ef26f4f3634954f123ec44c1fa
-
SHA256
ab70437b63fc4d39cece80ab3a304fd40f3200afa3cde93800ffb0ff49eee09d
-
SHA512
709120df19b8273a91067f40b8bacfe146efd460e799823e2f847540bf1fae18117c0c643d42cfe1f01b59ad81dbcd67574ce78ba321d9fcc0e0228bfb53c625
-
SSDEEP
768:XY1OB8nJV/nxq0lTy4t5Zw+0+rq9mlQyye8v3kH:XjB8nJNnxq0lTy4t5Zgeq9kQIN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource injector.exe
Files
-
injector.exe.exe windows:6 windows x64 arch:x64
b400b7efa19992f2e010ab1b2f1e33e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
DeviceIoControl
CreateFileW
CloseHandle
ReadFile
VirtualFree
GetCurrentProcess
VirtualAlloc
GetModuleHandleA
CreateToolhelp32Snapshot
Process32NextW
LoadLibraryA
Process32FirstW
K32GetModuleInformation
GetFileSize
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
GetModuleHandleW
RtlVirtualUnwind
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
user32
SetWinEventHook
EnumWindows
GetWindowThreadProcessId
UnhookWinEvent
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_copy
__std_exception_destroy
__current_exception_context
_CxxThrowException
__current_exception
memset
memcpy
__C_specific_handler
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
__p__commode
_set_fmode
__stdio_common_vfprintf
api-ms-win-crt-heap-l1-1-0
free
malloc
_callnewh
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_register_onexit_function
_cexit
__p___argc
terminate
_get_initial_narrow_environment
_c_exit
_exit
__p___argv
_initterm_e
_initterm
_initialize_narrow_environment
_configure_narrow_argv
_register_thread_local_exe_atexit_callback
_set_app_type
_seh_filter_exe
_crt_atexit
exit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ