Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 17:41
Behavioral task
behavioral1
Sample
Extreme Injector v3.7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Extreme Injector v3.7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Extreme Injector v3.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Extreme Injector v3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
xyoungsokin.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
xyoungsokin.dll
Resource
win10v2004-20240426-en
General
-
Target
Extreme Injector v3.exe
-
Size
1.9MB
-
MD5
ec801a7d4b72a288ec6c207bb9ff0131
-
SHA1
32eec2ae1f9e201516fa7fcdc16c4928f7997561
-
SHA256
b65f40618f584303ca0bcf9b5f88c233cc4237699c0c4bf40ba8facbe8195a46
-
SHA512
a07dd5e8241de73ce65ff8d74acef4942b85fc45cf6a7baafd3c0f9d330b08e7412f2023ba667e99b40e732a65e8fb4389f7fe73c7b6256ca71e63afe46cdcac
-
SSDEEP
49152:NNEVtO1U1y1DDDDDD7Llngq7NNMqU0p2Vhk9a:NNEVJyZlng4p2V
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
Extreme Injector v3.exedescription pid process Token: SeDebugPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: SeDebugPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe Token: 33 2168 Extreme Injector v3.exe Token: SeIncBasePriorityPrivilege 2168 Extreme Injector v3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Extreme Injector v3.exedescription pid process target process PID 2168 wrote to memory of 2636 2168 Extreme Injector v3.exe WerFault.exe PID 2168 wrote to memory of 2636 2168 Extreme Injector v3.exe WerFault.exe PID 2168 wrote to memory of 2636 2168 Extreme Injector v3.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Extreme Injector v3.exe"C:\Users\Admin\AppData\Local\Temp\Extreme Injector v3.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2168 -s 11362⤵PID:2636
-