C:\Users\James\Documents\Visual Studio 2017\Projects\ModInjector\build\InjectorGUI\x64\InjectorGUI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ModInjector.exe
Resource
win10v2004-20240426-en
General
-
Target
ModInjector.exe
-
Size
698KB
-
MD5
a9877c20d13bc70c4e5292d704e31279
-
SHA1
4744a2f5f0a7449f70263704ae2d886f21d99acd
-
SHA256
594be2f32251f2936153df84d18b89081d1fa2d2191cfbdb1832f89f1d67ab7b
-
SHA512
719332b092e700c421b2217d257b162547e3cbf1807a6a919c49e58feb89bc41f494a9ed8b99856a630b0ebde5535f8ca77297f1193d76d850f6c035234951fd
-
SSDEEP
12288:zvtKMem0IMQ5z1ARfF6r53SmD9Vwax5mbiHcUZ:5KMBoRgr53RVwax5mbiHcUZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ModInjector.exe
Files
-
ModInjector.exe.exe windows:6 windows x64 arch:x64
331e68670d540167500bcbcaa8533b64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcp140
?__ExceptionPtrDestroy@@YAXPEAX@Z
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z
??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z
??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ
?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z
??Bid@locale@std@@QEAA_KXZ
?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z
??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z
?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z
?_Incref@facet@locale@std@@UEAAXXZ
?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z
?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A
?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ
?__ExceptionPtrCopy@@YAXPEAXPEBX@Z
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
__stdio_common_vfprintf
__stdio_common_vsprintf_s
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
kernel32
CreateToolhelp32Snapshot
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
OpenProcess
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
Process32First
FreeLibrary
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetModuleHandleA
LoadLibraryA
Sleep
SetDllDirectoryA
CloseHandle
VirtualQuery
GetStartupInfoW
Process32Next
api-ms-win-crt-runtime-l1-1-0
system
_invalid_parameter_noinfo_noreturn
_seh_filter_dll
_execute_onexit_table
_crt_atexit
abort
_initialize_narrow_environment
_cexit
_initialize_onexit_table
_register_onexit_function
terminate
_crt_at_quick_exit
_configure_narrow_argv
api-ms-win-crt-string-l1-1-0
_strlwr
memset
vcruntime140
__vcrt_LoadLibraryExW
__vcrt_GetModuleFileNameW
_CxxThrowException
__std_exception_destroy
__std_exception_copy
__C_specific_handler
__CxxExceptionFilter
__CxxQueryExceptionSize
__FrameUnwindFilter
memmove
__CxxDetectRethrow
__CxxUnregisterExceptionObject
__CxxRegisterExceptionObject
advapi32
OpenProcessToken
AdjustTokenPrivileges
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-environment-l1-1-0
getenv
mscoree
_CorExeMain
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.nep Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 609KB - Virtual size: 609KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ