E:\SVN_DIR\svn\es\shuttle\ET_oem_branches\ET199Auto_JZBank_bug40111_COS14_NOINPUTSAFE\source\CheckTool_JZBANK_NOCZ\bin\Assistant.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6b2a94406f9958b52e8c174a2218e601fecc5025c54286f260a3f69eaac60a34.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b2a94406f9958b52e8c174a2218e601fecc5025c54286f260a3f69eaac60a34.exe
Resource
win10v2004-20240226-en
General
-
Target
6b2a94406f9958b52e8c174a2218e601fecc5025c54286f260a3f69eaac60a34
-
Size
7.5MB
-
MD5
1a7e8e828b1a6eb4e497eddd9fa04d4b
-
SHA1
51199ed0f63c8908aef6bafd76f604dfa39d4cab
-
SHA256
6b2a94406f9958b52e8c174a2218e601fecc5025c54286f260a3f69eaac60a34
-
SHA512
d9799c01098a95f6c582ecd8ea64630aa8f0eea7363bdc203be4ee195fe5e287eeb89e4c14620c4ee6b03345198378ebd98ef2db97df9392f29d45982d9a110a
-
SSDEEP
196608:tuwUeYUlCAVLCfWWsZmJKTOgcN9P91t3CIq9yL9rvB:gUljVufRsvhcN9PLX0yLtB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b2a94406f9958b52e8c174a2218e601fecc5025c54286f260a3f69eaac60a34 -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_2
Files
-
6b2a94406f9958b52e8c174a2218e601fecc5025c54286f260a3f69eaac60a34.exe windows:5 windows x86 arch:x86
a719e6b3c7b10ccd7ab2f08a9c74e6ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsUNCA
PathStripToRootA
PathFindExtensionA
UrlUnescapeA
PathFileExistsA
PathFindFileNameA
wininet
InternetGetConnectedState
DeleteUrlCacheEntry
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
kernel32
SetErrorMode
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
VirtualQuery
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetStartupInfoA
RtlUnwind
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
HeapCreate
VirtualFree
GetACP
IsValidCodePage
GetStringTypeA
GetFileAttributesA
GetTimeZoneInformation
GetStdHandle
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
WritePrivateProfileStringA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GlobalMemoryStatus
GetVersion
GetTickCount
GetOEMCP
GetCPInfo
GlobalFlags
GetFileTime
GetFileSizeEx
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetThreadLocale
GetModuleFileNameW
LocalAlloc
GetCurrentProcessId
SetLastError
MulDiv
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
CreateThread
OutputDebugStringA
GetExitCodeProcess
GetPrivateProfileStringA
DeleteFileA
CreateProcessA
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameA
LoadLibraryExA
RaiseException
lstrlenW
IsDBCSLeadByte
lstrcmpiA
lstrlenA
WaitForSingleObject
CreateMutexA
LoadLibraryW
Sleep
GetTempPathA
GetVersionExA
CreateToolhelp32Snapshot
GetModuleHandleA
GetSystemInfo
Process32Next
GetSystemDirectoryA
TerminateProcess
OpenProcess
WriteFile
GetProcessHeap
Process32First
HeapFree
GetCurrentProcess
HeapAlloc
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
CloseHandle
OpenMutexA
lstrcpyA
lstrcatA
lstrcmpA
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
MultiByteToWideChar
LocalFree
FormatMessageA
GetStringTypeW
user32
PostThreadMessageA
DestroyMenu
UnregisterClassA
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
MessageBeep
GetNextDlgGroupItem
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetSystemMetrics
wsprintfA
MessageBoxA
EnableWindow
SetWindowContextHelpId
MapDialogRect
RegisterClipboardFormatA
CharUpperA
PostQuitMessage
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
SetRect
IsRectEmpty
CopyAcceleratorTableA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CharNextA
RegisterWindowMessageA
PostMessageA
GetProcessWindowStation
GetUserObjectInformationW
CharNextW
GetKeyState
GetAsyncKeyState
LoadIconA
SendMessageA
GetClientRect
IsIconic
DrawIcon
SetWindowPos
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
GetWindowThreadProcessId
GetDesktopWindow
UnhookWindowsHookEx
GetWindow
GetDlgCtrlID
CopyRect
PtInRect
OffsetRect
GetDlgItem
IsWindow
GetWindowRect
GetWindowPlacement
SystemParametersInfoA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
IntersectRect
SetWindowLongA
DefWindowProcA
CallWindowProcA
GetMenu
gdi32
DeleteObject
GetMapMode
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetDeviceCaps
GetStockObject
GetObjectA
GetBkColor
GetTextColor
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
CreateRectRgnIndirect
GetRgnBox
SaveDC
RestoreDC
SetMapMode
SetViewportExtEx
GetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
oledlg
ord8
ole32
CoRegisterMessageFilter
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoGetClassObject
OleIsCurrentClipboard
CoUninitialize
CoInitialize
CoCreateInstance
StringFromGUID2
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
StgOpenStorageOnILockBytes
OleUninitialize
oleaut32
SysFreeString
SysAllocStringLen
VariantInit
VariantClear
SysAllocStringByteLen
SysStringByteLen
VariantCopy
VarUI4FromStr
RegisterTypeLi
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantChangeType
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
urlmon
URLDownloadToFileA
Sections
.text Size: 388KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.8MB - Virtual size: 14.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ