Resubmissions
22-08-2024 15:14
240822-smnbsatepf 10Analysis
-
max time kernel
20s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 15:14
Behavioral task
behavioral1
Sample
Injector.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Injector.exe
Resource
win10v2004-20240802-en
General
-
Target
Injector.exe
-
Size
152.0MB
-
MD5
27f2dbc37cba31780461ca971834c470
-
SHA1
c369476c5c7e31dd22e78ed049c3f762f5e14e4c
-
SHA256
c5f513dc12c9ef48e960d235428575de55c4c45091c9ecac3a1af5a7ea10f9fa
-
SHA512
f7a68816a6c053b3bf762a1ca12e43dcbdc6098eaf8ed2101674e4c4d06d1f7ac57f220f9f9da4a95b4903c6a213961bd6ecec59cc5ce6dcddf2c1e576af513f
-
SSDEEP
1572864:KYLX5WJoWbgWRSgkNOXWxtQSNBasQIEzSmySOI+Br26VGnz1QrKMcsEkKFcwe:nX5M3gZcKCRsqzSmySb+I6deMfEkzwe
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
Injector.exepid Process 4064 Injector.exe 4064 Injector.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Injector.exedescription pid Process procid_target PID 588 wrote to memory of 4064 588 Injector.exe 96 PID 588 wrote to memory of 4064 588 Injector.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Injector.exe"C:\Users\Admin\AppData\Local\Temp\Injector.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\Injector.exe"C:\Users\Admin\AppData\Local\Temp\Injector.exe"2⤵
- Loads dropped DLL
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4388,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4072 /prefetch:81⤵PID:2232
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
1.7MB
MD54719f992c339f290fc7b4ef0be8b3701
SHA180bd1bda816bb6c0b2e447e0dd33e580dce24479
SHA2566607c74b72920ee28363cc89878feb886238502416767be4d561b41bfe0577fc
SHA51260d1ab27692c08c9f915f1708c0b69a7b475d0f04fdbbfd9f363d5f60142e944ca68f79e31ef5bc5140119e5296f377c272439a53c75d0db4480640d8e44fc24
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081