Static task
static1
Behavioral task
behavioral1
Sample
Rokkit Injector.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Rokkit Injector.exe
Resource
win10v2004-20240226-en
General
-
Target
Rokkit Injector.exe
-
Size
4.5MB
-
MD5
fe929943d96db3df2e0c70e26a5a1255
-
SHA1
559f0119508fb0a5112d0a5f9557f530b0d56739
-
SHA256
4657a7b86fb058329887e3ec9f577225de2adc74060e60431ad3d3fe76442544
-
SHA512
d317c53b8f48e24bc9875ff946e556607a5d9bc9b90fe11dd4c633016ec4e6615964bee042782afd1788d6989901bad02efe6fa42e1de60d19160d589491cae6
-
SSDEEP
98304:J1ZQjCshdhiHrHH5mvwKSgBpNyp73oJHbwM9K:J2vThir1Tmnyp7YNHg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Rokkit Injector.exe
Files
-
Rokkit Injector.exe.exe windows:6 windows x64 arch:x64
963b34af25a65a380d803697a252bd84
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SwitchToThread
GetCurrentThreadId
CloseHandle
FindClose
SetEnvironmentVariableW
GetLastError
CopyFileExW
GetFileInformationByHandleEx
MoveFileExW
RemoveDirectoryW
WakeConditionVariable
WriteProcessMemory
SetLastError
OpenProcess
IsWow64Process
VirtualAllocEx
GetModuleHandleA
GetProcAddress
AcquireSRWLockShared
ReleaseSRWLockShared
GetTickCount64
AddVectoredExceptionHandler
SetThreadStackGuarantee
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
ReleaseMutex
GetSystemInfo
TryAcquireSRWLockExclusive
PostQueuedCompletionStatus
WaitForSingleObjectEx
LoadLibraryA
GetCurrentProcessId
CreateMutexA
RtlLookupFunctionEntry
WakeAllConditionVariable
SetUnhandledExceptionFilter
Sleep
lstrlenW
SetHandleInformation
SetFilePointerEx
GetProcessId
GetQueuedCompletionStatusEx
CreateIoCompletionPort
SetFileCompletionNotificationModes
SleepConditionVariableSRW
GetModuleHandleW
GetComputerNameExW
LoadLibraryExW
VirtualQuery
FreeLibrary
GetStdHandle
GetConsoleMode
WaitForSingleObject
MultiByteToWideChar
WriteConsoleW
GetCurrentDirectoryW
GetEnvironmentVariableW
FormatMessageW
GetTempPathW
GetModuleFileNameW
GetCommandLineW
CreateFileW
GetFileInformationByHandle
GetFullPathNameW
GetFinalPathNameByHandleW
FindNextFileW
CreateDirectoryW
FindFirstFileW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringOrdinal
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
CreateNamedPipeW
CreateThread
ReadFileEx
SleepEx
WriteFileEx
ExitProcess
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
DeleteFileW
SetFileInformationByHandle
ReadProcessMemory
GetProcessTimes
GetSystemTimes
GetProcessIoCounters
LocalFree
VirtualQueryEx
LoadLibraryW
LoadLibraryExA
GetUserDefaultUILanguage
LCIDToLocaleName
OutputDebugStringA
OutputDebugStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
TerminateProcess
IsProcessorFeaturePresent
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
InitializeSListHead
CreateEventW
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
ws2_32
getpeername
getsockname
shutdown
recv
WSARecv
WSASend
socket
bind
connect
setsockopt
accept
ioctlsocket
WSAIoctl
WSASocketW
send
freeaddrinfo
WSAStartup
WSACleanup
select
getsockopt
WSAGetLastError
closesocket
listen
getaddrinfo
dbghelp
MiniDumpWriteDump
user32
EnumWindows
SetMenu
GetWindowThreadProcessId
GetWindowTextLengthW
MonitorFromPoint
EnumDisplayMonitors
GetWindowTextW
CheckMenuItem
SetMenuItemInfoW
GetCursorPos
SetCursor
CreateIcon
GetClientRect
DestroyWindow
RegisterTouchWindow
CloseTouchInputHandle
ScreenToClient
GetTouchInputInfo
LoadCursorW
MonitorFromRect
TrackMouseEvent
GetAsyncKeyState
MessageBoxW
ShowCursor
ClipCursor
GetClipCursor
EnumChildWindows
ClientToScreen
SetForegroundWindow
GetWindowLongPtrW
GetKeyState
ToUnicodeEx
GetForegroundWindow
MapVirtualKeyExW
GetKeyboardState
ReleaseCapture
SetCapture
SetWindowLongW
SendMessageW
EnableMenuItem
GetSystemMenu
GetMonitorInfoW
SetWindowPlacement
ChangeDisplaySettingsExW
IsProcessDPIAware
MonitorFromWindow
GetDC
PostThreadMessageW
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
SendInput
ShowWindow
PostQuitMessage
DefWindowProcW
RegisterClassExW
SetWindowTextW
IsWindowVisible
DestroyAcceleratorTable
DestroyIcon
AdjustWindowRectEx
GetMenu
GetWindowLongW
InvalidateRgn
SetWindowPos
RegisterWindowMessageA
SetWindowDisplayAffinity
IsWindow
CreateAcceleratorTableW
FlashWindowEx
CreateMenu
DispatchMessageA
GetKeyboardLayout
GetMessageA
AppendMenuW
GetActiveWindow
MapVirtualKeyW
GetUpdateRect
GetSystemMetrics
RedrawWindow
ValidateRect
GetRawInputData
RegisterRawInputDevices
VkKeyScanW
SetWindowLongPtrW
CreateWindowExW
TranslateAcceleratorW
GetAncestor
PostMessageW
MsgWaitForMultipleObjectsEx
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
SetCursorPos
comctl32
SetWindowSubclass
DefSubclassProc
RemoveWindowSubclass
secur32
AcceptSecurityContext
QueryContextAttributesW
FreeCredentialsHandle
ApplyControlToken
AcquireCredentialsHandleA
DeleteSecurityContext
EncryptMessage
InitializeSecurityContextW
FreeContextBuffer
DecryptMessage
pdh
PdhRemoveCounter
PdhCloseQuery
shell32
CommandLineToArgvW
SHGetKnownFolderPath
ShellExecuteW
DragQueryFileW
DragFinish
SHCreateItemFromParsingName
crypt32
CertGetCertificateChain
CertVerifyCertificateChainPolicy
CertDuplicateCertificateChain
CertFreeCertificateContext
CertEnumCertificatesInStore
CertAddCertificateContextToStore
CertDuplicateCertificateContext
CertFreeCertificateChain
CertDuplicateStore
CertOpenStore
CertCloseStore
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CreateStreamOnHGlobal
CoUninitialize
RevokeDragDrop
CoInitializeEx
RegisterDragDrop
OleInitialize
bcrypt
BCryptGenRandom
advapi32
EventUnregister
EventWriteTransfer
EventSetInformation
EventRegister
RegCloseKey
GetLengthSid
CopySid
RegGetValueW
IsValidSid
GetTokenInformation
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
SystemFunction036
ntdll
RtlGetVersion
NtReadFile
NtWriteFile
NtCancelIoFileEx
NtQueryInformationProcess
NtCreateFile
NtDeviceIoControlFile
NtQuerySystemInformation
RtlNtStatusToDosError
powrprof
CallNtPowerInformation
uxtheme
SetWindowTheme
gdi32
CreateRectRgn
DeleteObject
GetDeviceCaps
dwmapi
DwmEnableBlurBehindWindow
oleaut32
SysFreeString
SysStringLen
SetErrorInfo
GetErrorInfo
psapi
EnumProcessModules
GetModuleInformation
GetModuleFileNameExW
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
_set_app_type
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
__p___argc
_register_onexit_function
__p___argv
_cexit
_c_exit
signal
_set_invalid_parameter_handler
_invoke_watson
_initialize_onexit_table
_register_thread_local_exe_atexit_callback
abort
_crt_atexit
terminate
api-ms-win-crt-math-l1-1-0
trunc
__setusermatherr
round
pow
ceil
floor
api-ms-win-crt-string-l1-1-0
wcslen
strcpy_s
strlen
_wcsicmp
wcsncmp
api-ms-win-crt-convert-l1-1-0
wcstol
_ultow_s
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
calloc
malloc
_set_new_mode
free
_callnewh
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ