Static task
static1
Behavioral task
behavioral1
Sample
Injector.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Injector.exe
Resource
win10v2004-20240802-en
General
-
Target
Injector.exe
-
Size
22KB
-
MD5
ebadf71aae5b81097f02003b13f3b2dd
-
SHA1
aa5618e281250014dc61bafe4bcc202e3938451c
-
SHA256
51e742a6997dbf7ca191d63bfc7e04e80ac8c41f5ea0505efd9df1014eff9c95
-
SHA512
19c54e7e26983e8d09b3cf6f0950bcafc2f4442297485e80f105c5a102aac331b28100371dbd496c8781420af3fe97add859326245a9ec9ffbb0eb69c54dca83
-
SSDEEP
384:2Km9UjiGHAbFafKIGydTzDlLXuvSkF4RIDzbkOfDu3a30i:Z/JpSvS7qkQ30
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Injector.exe
Files
-
Injector.exe.exe windows:6 windows x64 arch:x64
402dc02642be1924dd591a8a4dd61cd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ReadFile
CloseHandle
GetLastError
WaitForSingleObject
CreateRemoteThread
GetExitCodeThread
OpenProcess
VirtualAlloc
VirtualFree
VirtualAllocEx
WriteProcessMemory
GetFileSize
GetProcAddress
LoadLibraryA
Sleep
GetCurrentProcess
GetNativeSystemInfo
IsWow64Process
LocalFree
FormatMessageA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetFileAttributesA
CreateFileA
VirtualFreeEx
GetFullPathNameA
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleW
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?_Xinvalid_argument@std@@YAXPEBD@Z
vcruntime140
memset
__C_specific_handler
__current_exception_context
__current_exception
__std_exception_copy
__std_exception_destroy
_CxxThrowException
memcpy
memmove
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_c_exit
_cexit
_get_initial_narrow_environment
__p___argv
__p___argc
_register_onexit_function
_crt_atexit
terminate
_seh_filter_exe
_errno
_invalid_parameter_noinfo_noreturn
_exit
exit
_register_thread_local_exe_atexit_callback
_initterm_e
_initialize_narrow_environment
_configure_narrow_argv
_initialize_onexit_table
_set_app_type
_initterm
api-ms-win-crt-string-l1-1-0
_stricmp
isdigit
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
_set_fmode
puts
__stdio_common_vfprintf
__p__commode
api-ms-win-crt-convert-l1-1-0
strtoul
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
malloc
_callnewh
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ