Static task
static1
Behavioral task
behavioral1
Sample
dll_injector64.exe
Resource
win7-20240221-en
General
-
Target
dll_injector64.exe
-
Size
413KB
-
MD5
46015764521a67cfa82200e15b85c2f0
-
SHA1
736cd2e88dc64587a21ffb2b9011c60596fab0fd
-
SHA256
e7c84fca3155a2b49d0452f977cb8f206d5d5ab871d22fb27eddc45cade708a0
-
SHA512
d401bf5b4d40cfbbb907a0ed0fc08bcc0b1f7acc63a75f6c4b2f00ce49574e00acc3473175ddf695461da6dc278cac45d27951485f119d0bc539e4e0adcd8f20
-
SSDEEP
6144:WrDP9Oj5xSkR1/nei2unyj5Z2tex+E/boyDJCZ6DQXixAlFA8unohwk7Mpi5:WrMjrSk1/e2KrJFo2FoCq5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dll_injector64.exe
Files
-
dll_injector64.exe.exe windows:6 windows x64 arch:x64
f85f0d8146f3438741453738dc85efc2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OpenProcess
VirtualAllocEx
VirtualFreeEx
WriteProcessMemory
GetModuleHandleW
GetProcAddress
CloseHandle
GetCurrentThread
Sleep
CreateRemoteThread
IsWow64Process
K32EnumProcessModulesEx
K32GetModuleFileNameExW
GetStdHandle
GetConsoleScreenBufferInfo
FlushConsoleInputBuffer
SetConsoleTextAttribute
WaitForSingleObject
GetLastError
CreateProcessW
GetCurrentProcess
ResumeThread
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RaiseException
RtlUnwindEx
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
GetExitCodeProcess
CreateProcessA
GetFileAttributesExW
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleW
ReadConsoleW
HeapSize
CreateFileW
advapi32
ImpersonateSelf
AdjustTokenPrivileges
OpenThreadToken
LookupPrivilegeValueA
Sections
.text Size: 270KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ