Behavioral task
behavioral1
Sample
injection.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
injection.exe
Resource
win10v2004-20240802-en
General
-
Target
injection.exe
-
Size
10.7MB
-
MD5
6c48accb248bd16111dc31c1409b8999
-
SHA1
2c4d922d360f35e0a1957ca38092fb98422756b8
-
SHA256
2306b8a80aaffee2150275f73c65b2e453842aa8a1e0f0af0c435fa0503ddef5
-
SHA512
db9d0b21d956cde8f64ab8ef380a27990e5d9810f2e3a75547292292c0a9578e50216a3eebea19bcce26b306c465545a0a3d5648643ca212bd77ad2d19efe3f9
-
SSDEEP
196608:1Qg+uqbans0iWxuqwTFWHfdNzP+rI6iqG0aH2KgMFf8p1uylxNLGikGPKUcUzHq1:1Q1uqbqJiAy4nzahiL0aH2K7FU1uylxU
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource injection.exe
Files
-
injection.exe.exe windows:6 windows x64 arch:x64
c049c7018bd0679ccec2df6eaab9c090
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LeaveCriticalSection
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetClipboardData
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
gdi32
CreateSolidBrush
advapi32
CryptGetHashParam
shell32
SHGetFolderPathW
msvcp140
_Query_perf_counter
ntdll
RtlInitAnsiString
dbghelp
ImageRvaToVa
d3d11
D3D11CreateDeviceAndSwapChain
imm32
ImmReleaseContext
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
d3dcompiler_43
D3DCompile
dwmapi
DwmExtendFrameIntoClientArea
rpcrt4
UuidCreate
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-runtime-l1-1-0
_beginthreadex
api-ms-win-crt-stdio-l1-1-0
fwrite
api-ms-win-crt-heap-l1-1-0
calloc
api-ms-win-crt-math-l1-1-0
_dsign
api-ms-win-crt-convert-l1-1-0
strtod
api-ms-win-crt-filesystem-l1-1-0
_unlink
api-ms-win-crt-string-l1-1-0
strncpy
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-time-l1-1-0
_localtime64
ws2_32
ntohl
normaliz
IdnToAscii
crypt32
CertOpenStore
wldap32
ord60
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 948KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 647KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 8.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 10.7MB - Virtual size: 10.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ