Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:09
Behavioral task
behavioral1
Sample
Injector.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Injector.exe
Resource
win10v2004-20241007-en
General
-
Target
Injector.exe
-
Size
16.3MB
-
MD5
e0ec4f575f876e515f7f56e372fa1142
-
SHA1
7a7a5a5fa0b2fa8a6a782f9f27344a1db40fb859
-
SHA256
43725dbdc733f409e34f9cd8c2daceb2d1b5c2baa2a5663452166522ff794586
-
SHA512
d03bf3ff1182c1764dc8e912229b0bf202660f29356890777bd36864a96b8509e8c44a2d2b9100041fa591f50f0609d43e8519f61fdcf8517827deacd9f3735f
-
SSDEEP
393216:I9YimSsewq3Obs2CltXMCHWUjurRQ7XbFsn6dEahcyorChF9DA33JX2E:I9YimRewq3ObRqtXMb8urRQ766dhcyo7
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 880 Injector.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 880 2100 Injector.exe 28 PID 2100 wrote to memory of 880 2100 Injector.exe 28 PID 2100 wrote to memory of 880 2100 Injector.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD53aad23292404a7038eb07ce5a6348256
SHA135cac5479699b28549ebe36c1d064bfb703f0857
SHA25678b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25
SHA512f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b