C:\Users\Booty\Desktop\InjektorReal\InjektorReal\build\injector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
inj.exe
Resource
win10v2004-20240426-en
General
-
Target
inj.exe
-
Size
1.1MB
-
MD5
ee94ab8d4860695bad4f4ac82600beef
-
SHA1
934b7974216ce328239fa7bf0651084ac9f5a588
-
SHA256
32b46f7eaec943665c7c9c315bac218c84b00824823ca4e1fbcf4e2dac50ecd6
-
SHA512
fa3abc7b409feab3875a61563a52d2d9e2010e4b078fe339de0c99231f4af36c0950ae4b6c241482eeb01c6d506f9274a5d27ac047b3f60cd8029efd3d36b1bb
-
SSDEEP
24576:8U9QqMVCssGgPUh1VNn9UQ7+YymQAXDdVOaCoua71+J0fgbGSh4s3sXYX7bCiFpb:2xKEPKRlwPdJD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource inj.exe
Files
-
inj.exe.exe windows:6 windows x64 arch:x64
579af052eb9c32d75f32de8e02761e0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetModuleHandleA
CreateToolhelp32Snapshot
Sleep
Process32NextW
CreateFileA
LoadLibraryA
Process32FirstW
CloseHandle
LoadLibraryW
GetProcAddress
CreateFileW
GetModuleHandleW
FreeLibrary
GetExitCodeProcess
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
WaitForSingleObject
Thread32First
Thread32Next
LoadLibraryExA
VirtualAlloc
DeviceIoControl
GetCurrentProcess
VirtualFree
GetCurrentProcessId
ReadFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapReAlloc
ReadConsoleW
CreateProcessW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
MultiByteToWideChar
LocalFree
FormatMessageA
GetLocaleInfoEx
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
GetFullPathNameW
SetFileInformationByHandle
GetTempPathW
AreFileApisANSI
GetLastError
GetFileInformationByHandleEx
WideCharToMultiByte
QueryPerformanceCounter
GetCurrentThreadId
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WaitForSingleObjectEx
GetExitCodeThread
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
WakeAllConditionVariable
SleepConditionVariableSRW
GetStringTypeW
CompareStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetFileSizeEx
SetFilePointerEx
GetFileType
HeapAlloc
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
RtlUnwind
user32
GetAsyncKeyState
UnhookWindowsHookEx
PostThreadMessageW
SetWindowsHookExW
advapi32
RegCreateKeyA
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
ntdll
RtlInitUnicodeString
NtQuerySystemInformation
RtlAnsiStringToUnicodeString
RtlInitAnsiString
dbghelp
ImageDirectoryEntryToData
ImageRvaToVa
ImageNtHeader
Sections
.text Size: 962KB - Virtual size: 962KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ