Analysis
-
max time kernel
6s -
max time network
6s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-10-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
injector.exe
Resource
win11-20240802-en
General
-
Target
injector.exe
-
Size
120KB
-
MD5
0a7a91f693eb6d20de8795a567349efa
-
SHA1
640a3e7327badeb315c06b96a7007a042fb6bb3f
-
SHA256
260a37f38b28fe51db6bb879d309aa6e8aec292c508e797fc669bc227341f185
-
SHA512
a55c95136a24252bee0736139509ecec9b7bf94d9299f87b6dd102adc69e5406e0ba883ad39df8e6ea728adf3c864931b52c8d900212bc3d49a01920f13c4c89
-
SSDEEP
3072:i7DhdC6kzWypvaQ0FxyNTBf3T7/16yYCQonyvzPXD:iBlkZvaF4NTBvTj1xFS7XD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injector.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3872 2276 injector.exe 79 PID 2276 wrote to memory of 3872 2276 injector.exe 79 PID 3872 wrote to memory of 3320 3872 cmd.exe 80 PID 3872 wrote to memory of 3320 3872 cmd.exe 80 PID 3872 wrote to memory of 2100 3872 cmd.exe 83 PID 3872 wrote to memory of 2100 3872 cmd.exe 83 PID 3320 wrote to memory of 3980 3320 msedge.exe 84 PID 3320 wrote to memory of 3980 3320 msedge.exe 84 PID 3872 wrote to memory of 616 3872 cmd.exe 86 PID 3872 wrote to memory of 616 3872 cmd.exe 86 PID 3872 wrote to memory of 4632 3872 cmd.exe 88 PID 3872 wrote to memory of 4632 3872 cmd.exe 88 PID 3872 wrote to memory of 1012 3872 cmd.exe 89 PID 3872 wrote to memory of 1012 3872 cmd.exe 89 PID 3872 wrote to memory of 4440 3872 cmd.exe 90 PID 3872 wrote to memory of 4440 3872 cmd.exe 90 PID 3872 wrote to memory of 1028 3872 cmd.exe 92 PID 3872 wrote to memory of 1028 3872 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\injector.exe"C:\Users\Admin\AppData\Local\Temp\injector.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\91C0.tmp\91C1.tmp\91C2.bat C:\Users\Admin\AppData\Local\Temp\injector.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://fbi.bet/3⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8e5973cb8,0x7ff8e5973cc8,0x7ff8e5973cd84⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,12228892935284831890,5352196474321227942,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1876 /prefetch:24⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,12228892935284831890,5352196474321227942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:34⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,12228892935284831890,5352196474321227942,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:84⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,12228892935284831890,5352196474321227942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:14⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,12228892935284831890,5352196474321227942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:14⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,12228892935284831890,5352196474321227942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2728 /prefetch:14⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,12228892935284831890,5352196474321227942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:14⤵PID:6124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,12228892935284831890,5352196474321227942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 /prefetch:84⤵PID:7792
-
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2100
-
-
C:\Windows\system32\cmd.execmd3⤵PID:616
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4632
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1012
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4440
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1028
-
-
C:\Windows\system32\cmd.execmd3⤵PID:232
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3952
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1864
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4404
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2580
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1604
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3144
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3808
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3008
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4456
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1656
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4568
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2596
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5052
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2804
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4824
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2180
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5056
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3052
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3564
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4592
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1524
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4720
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5036
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4276
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4224
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3368
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5072
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1476
-
-
C:\Windows\system32\cmd.execmd3⤵PID:564
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1084
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1500
-
-
C:\Windows\system32\cmd.execmd3⤵PID:408
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2828
-
-
C:\Windows\system32\cmd.execmd3⤵PID:952
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1468
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1288
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3132
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2608
-
-
C:\Windows\system32\cmd.execmd3⤵PID:404
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5048
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3260
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1672
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2556
-
-
C:\Windows\system32\cmd.execmd3⤵PID:724
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2320
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1680
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3120
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2036
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1332
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5080
-
-
C:\Windows\system32\cmd.execmd3⤵PID:920
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4712
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5216
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5248
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5260
-
-
C:\Windows\system32\cmd.execmd3⤵PID:2584
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1396
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3800
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5452
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5356
-
-
C:\Windows\system32\cmd.execmd3⤵PID:5632
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3652
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4520
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3948
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6152
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6160
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6168
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6176
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6184
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6192
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6200
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6216
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6232
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6248
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6260
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6272
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6288
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6304
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6316
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6328
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6344
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6360
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6376
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6388
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6400
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6408
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6416
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6424
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6432
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6440
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6448
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6456
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6464
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6480
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6496
-
-
C:\Windows\system32\cmd.execmd3⤵PID:7468
-
-
C:\Windows\system32\cmd.execmd3⤵PID:7952
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8036
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8044
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8052
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8060
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8068
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8076
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8084
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8092
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8100
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8108
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8116
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8124
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8132
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8140
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8148
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8156
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8164
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8172
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8180
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8188
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6924
-
-
C:\Windows\system32\cmd.execmd3⤵PID:6880
-
-
C:\Windows\system32\cmd.execmd3⤵PID:4464
-
-
C:\Windows\system32\cmd.execmd3⤵PID:7508
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1348
-
-
C:\Windows\system32\cmd.execmd3⤵PID:3452
-
-
C:\Windows\system32\cmd.execmd3⤵PID:1652
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8200
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8208
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8216
-
-
C:\Windows\system32\cmd.execmd3⤵PID:8224
-
-
C:\Windows\explorer.exeexplorer.exe3⤵PID:8232
-
-
C:\Windows\explorer.exeexplorer.exe3⤵PID:8240
-
-
C:\Windows\explorer.exeexplorer.exe3⤵PID:8248
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
Filesize
5KB
MD50fe60ba5bd4fd1d95894021715db8fb9
SHA130dcc53a2c6df064edb3663fb70b257335877628
SHA25655e925126dbad7c8c7165ca082988c437c06e26d726508ca152c4d9727b8a522
SHA5127ec2e5a3b32c7348f66380824771a725a33a5bd3686223509c89c61933e02de820ae50571ac961900d57ff269d04f7e0ca05046bf104d042e8cd1f21205fecb4
-
Filesize
31KB
MD5f0a1f5fa1341f0d6bd26070a99213776
SHA14c78966eb5ad7bf03d1d028c13af9b04dc587e22
SHA2561875d0cb02299a76927356863699bcd6c796d4be2d668c9c805cd9233516817c
SHA5125315e38f0934d02902aa92b217897c0b52e43c5be8adfce3b5db828326b12686be45cb6fe2e5f5d5679f7b6123a4426f3c762fe2bb6ed4461ba6bcbc0821c818