Threat Database Trojans Trojan.MSIL.Inject.GNB

Trojan.MSIL.Inject.GNB

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.MSIL.Inject.GNB
Signature status: No Signature

Known Samples

MD5: c9119109ff42ffbf1cc006888629c465
SHA1: 126059eadd9a4252d172b1cf967ff88aaab19d9f
SHA256: A37E3A29D5EA350D6AC08E2780EA81DA97B69759D822B18EE9D4E607EA46840A
File Size: 3.05 MB, 3050787 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
File Description app3 Setup
Product Name app3
Product Version 0.1.0.1

File Traits

  • .NET
  • HighEntropy
  • RijndaelManaged
  • x86
  • ZYXDN

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-630as.tmp\126059eadd9a4252d172b1cf967ff88aaab19d9f_0003050787.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-66g6j.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-66g6j.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\is-66pin.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data

Registry Modifications

Key::Value Data API Name
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetComputerName
  • GetUserName
  • GetUserObjectInformation
Keyboard Access
  • GetKeyState

Shell Command Execution

"C:\Users\Xigwbxdf\AppData\Local\Temp\is-630AS.tmp\126059eadd9a4252d172b1cf967ff88aaab19d9f_0003050787.tmp" /SL5="$80114,2572353,153088,c:\users\user\downloads\126059eadd9a4252d172b1cf967ff88aaab19d9f_0003050787"

Trending

Most Viewed

Loading...