inject.pdb
Static task
static1
Behavioral task
behavioral1
Sample
inject.dll
Resource
win11-20240802-en
General
-
Target
inject.dll
-
Size
1.8MB
-
MD5
6dd4c5a5128a5339d1bfe77f7103001e
-
SHA1
0c71cd1b702bf7ea18ed6c7259ee9511295ea7ff
-
SHA256
ab3dc1034b38e76b07515d39faaeb8876e61e5f7d946cfd05e20d67afa116d97
-
SHA512
a96a99b63ec675346bdbe81c5ab1ceb2688f28a517566ec23f7ccc942f54137a9fdb66558036cb7ebb617b8dd61ce75d95d2bfa520c97752a039e33804cac48a
-
SSDEEP
24576:sGQ5b2bRBQmY0zTXgIvHIlu2EbLJe7laQaNCYpe50X5296Hs:sGQ5b2bRBNZ5voObLJu1aNCv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource inject.dll
Files
-
inject.dll.dll windows:6 windows x64 arch:x64
9c316c021b44608d92ea98fc07d53b71
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
bcryptprimitives
ProcessPrng
api-ms-win-core-synch-l1-2-0
WakeByAddressAll
WaitOnAddress
WakeByAddressSingle
bcrypt
BCryptGenRandom
advapi32
RegOpenKeyExW
SystemFunction036
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
kernel32
FreeEnvironmentStringsW
DeleteProcThreadAttributeList
CompareStringOrdinal
SetThreadStackGuarantee
GetCurrentThread
CreateWaitableTimerExW
SetWaitableTimer
Sleep
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetCurrentThreadId
GetCommandLineW
SetFileInformationByHandle
GetCurrentProcess
DuplicateHandle
GetProcessHeap
HeapFree
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetConsoleWindow
CreateMutexW
AllocConsole
ReleaseMutex
OpenThread
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetStdHandle
GetCurrentProcessId
GetLastError
WriteFileEx
SleepEx
GetExitCodeProcess
FormatMessageW
HeapReAlloc
lstrlenW
HeapAlloc
FindClose
CreateFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
LoadLibraryExA
WaitForSingleObject
FindFirstFileW
DeleteFileW
CopyFileExW
CreateThread
VirtualProtect
GetConsoleMode
VirtualAlloc
GetModuleFileNameW
ExitProcess
GetModuleHandleW
CreateNamedPipeW
ReadFileEx
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
GetFullPathNameW
GetModuleHandleA
GetProcAddress
CloseHandle
InitializeSListHead
IsDebuggerPresent
TerminateThread
UnhandledExceptionFilter
CreateMutexA
WaitForSingleObjectEx
LoadLibraryA
IsProcessorFeaturePresent
ntdll
RtlNtStatusToDosError
NtSetInformationThread
NtWriteFile
user32
ShowWindow
oleaut32
SysFreeString
SysStringLen
vcruntime140
memset
__CxxFrameHandler3
memcpy
__std_type_info_destroy_list
__C_specific_handler
memcmp
memmove
api-ms-win-crt-runtime-l1-1-0
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_seh_filter_dll
_cexit
_initterm_e
_execute_onexit_table
_initterm
api-ms-win-crt-heap-l1-1-0
free
Exports
Exports
DllMain
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 689KB - Virtual size: 688KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ