Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 19:06
Behavioral task
behavioral1
Sample
injector.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
injector.exe
Resource
win10v2004-20250314-en
General
-
Target
injector.exe
-
Size
5.4MB
-
MD5
c92deac808244a32b6697b1339d1d2ba
-
SHA1
c40a3b14c3a03fd17d8145855ce4e6acfc03df48
-
SHA256
1d8d824ad70ea6f4fdf588461da74cc56c565571089e20b8364b508d95e1bac9
-
SHA512
a0ea7244f56c1fa40e0fc126a09063266192080226addf9d5ab7729a513ca5d74d101ef3c17430ac38045a2c979026208b090f771daaf1918953d039591dcd7a
-
SSDEEP
98304:2s0BEbbyXnmoDF71ICDtPfeE/joX5KzA0xZRdp3zi5u5D41fopr26/Y1C/aYOoK0:2sEEbGXjh1ICteEroXIzlxZV3Gu5D4Sl
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2152 injector.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2152 2156 injector.exe 31 PID 2156 wrote to memory of 2152 2156 injector.exe 31 PID 2156 wrote to memory of 2152 2156 injector.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5384349987b60775d6fc3a6d202c3e1bd
SHA1701cb80c55f859ad4a31c53aa744a00d61e467e5
SHA256f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8
SHA5126bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5