Threat Database Trojans Trojan.Injector.KZS

Trojan.Injector.KZS

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 17,965
Threat Level: 80 % (High)
Infected Computers: 5
First Seen: June 5, 2022
Last Seen: August 23, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Injector.KZS
Packers: UPX
Signature status: No Signature

Known Samples

MD5: 61d387445d82bd7ee371cebe7805f730
SHA1: 28ca41e48b11910cffcd556d9093783d9f3b3559
SHA256: 036846B6C3FE14775E9C636A90AE63DAB4A9C8563B2529394E7F3DB0497DB2F9
File Size: 16.90 KB, 16896 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have resources
  • File doesn't have security information
  • File has been packed
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • .UPX
  • 2+ executable sections
  • HighEntropy
  • No Version Info
  • packed
  • upx
  • x86

Block Information

Total Blocks: 46
Potentially Malicious Blocks: 7
Whitelisted Blocks: 31
Unknown Blocks: 8

Visual Map

0 0 0 0 x x x 0 0 x 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 0 0 ? ? ? ? ? x ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\windows\sysinit.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\sysinit.exe Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\c:\users\user\downloads\28ca41e48b11910cffcd556d9093783d9f3b3559_0000016896 RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\policies\explorer\run::sysinit C:\WINDOWS\sysinit.exe RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\explorer::slowcontextmenuentries RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet  RegNtPreCreateKey
Show More
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection

Trending

Most Viewed

Loading...