Static task
static1
Behavioral task
behavioral1
Sample
RiptermsInjector.exe
Resource
win11-20240426-en
General
-
Target
RiptermsInjector.exe
-
Size
3.1MB
-
MD5
bc950945dde852b1b5eb13fa2e2517d8
-
SHA1
895edc2dd2cc235938789f77cea4c74bde91fd38
-
SHA256
f0aa2ad2251931302c06af9bee23ac4d5377bd91eae2222455fc9611ac1cb1b9
-
SHA512
ccde830d0751a947224091f0019a8f5819ac697108d903fff6fcb3e311c0ffb7b14db962df4f64528cd1151197296d8888dd76a38748082c93a87967c631e4c4
-
SSDEEP
24576:cem3GhdkJiVVca3l9zYKrcYDsTOPTOPTipQ0oH5eJSFTSpkPHn11V:7m3lJU995U0kNFTFHn11
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RiptermsInjector.exe
Files
-
RiptermsInjector.exe.exe windows:6 windows x64 arch:x64
8e4bbba00cb3e0100dea98561d0cdf02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteProcessMemory
ReadProcessMemory
CloseHandle
WaitForSingleObject
K32EnumProcessModulesEx
OpenProcess
K32GetModuleBaseNameA
K32GetModuleInformation
VirtualProtectEx
VirtualAllocEx
CreateRemoteThread
VirtualFreeEx
RtlLookupFunctionEntry
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
IsDebuggerPresent
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
RtlCaptureContext
user32
GetWindowTextA
EnumWindows
GetWindowThreadProcessId
msvcp140
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?ignore@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z
?good@ios_base@std@@QEBA_NXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Xlength_error@std@@YAXPEBD@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exceptions@std@@YAHXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
memmove
memchr
__std_exception_destroy
_CxxThrowException
__std_exception_copy
__std_terminate
__C_specific_handler
__current_exception
memset
memcmp
__current_exception_context
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_configure_narrow_argv
_exit
_initterm
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_get_initial_narrow_environment
_set_app_type
_seh_filter_exe
terminate
_cexit
_crt_atexit
_invalid_parameter_noinfo_noreturn
_initialize_narrow_environment
_register_onexit_function
__p___argc
_initialize_onexit_table
exit
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
_set_new_mode
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-string-l1-1-0
strcmp
tolower
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ