E:\buildVersion\br_bugfix_PC_V7R3B05D105\inodemgr\Build\ReleasePdb\DAMSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ba53b28a6b32f83d46a0617cf4573023fdf39d37b2a2090425afb4b9f564cd27.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ba53b28a6b32f83d46a0617cf4573023fdf39d37b2a2090425afb4b9f564cd27.exe
Resource
win10v2004-20240611-en
General
-
Target
ba53b28a6b32f83d46a0617cf4573023fdf39d37b2a2090425afb4b9f564cd27
-
Size
10.1MB
-
MD5
6683f0eb2dad247093563b0482d68927
-
SHA1
efea2040e08e303c29ae5a72a5db15a0098b316d
-
SHA256
ba53b28a6b32f83d46a0617cf4573023fdf39d37b2a2090425afb4b9f564cd27
-
SHA512
8870a15bb1847f4266dafba0f81c999d4c6e21311ff286851d4cd87c5b3239f38e8f2eea00f5be22d402c6fa5fdf03731656b4eddcd72611576dd18b19b9a39c
-
SSDEEP
196608:dq25JeWS/GOv5LWYwXsxLRUwAxjMNJeHiM/EeuVj1Tjn3Co7kJc7EYANu6rVPfln:YpWS/G+5LWCUwaMNJeHiM/EDj1Tjn3je
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba53b28a6b32f83d46a0617cf4573023fdf39d37b2a2090425afb4b9f564cd27
Files
-
ba53b28a6b32f83d46a0617cf4573023fdf39d37b2a2090425afb4b9f564cd27.exe windows:5 windows x86 arch:x86
3e9e1c3fdcfd82698a73e3cf79336da2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
GetDiskFreeSpaceA
GetSystemDirectoryA
GetSystemInfo
ReadFile
GetEnvironmentVariableA
WaitForSingleObject
GetCurrentProcess
MultiByteToWideChar
FindClose
FindNextFileA
FindFirstFileA
LocalAlloc
SetFileAttributesA
GetFileAttributesA
RemoveDirectoryA
GetTickCount
GetFileAttributesExA
CreateProcessA
GetStartupInfoA
CreatePipe
WriteConsoleW
SetStdHandle
FormatMessageA
lstrlenA
GetModuleHandleA
OpenProcess
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateMutexA
OpenMutexA
CreateEventA
SetEvent
GetModuleFileNameA
DeleteFileA
MoveFileA
GetWindowsDirectoryA
CopyFileA
GetPrivateProfileIntA
LoadLibraryExA
GetProcAddress
Sleep
CreateDirectoryA
GetLocalTime
CreateFileA
GetLastError
CreateFileW
SetFilePointer
WriteFile
GetCurrentThreadId
CloseHandle
LocalFree
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
MoveFileExA
LoadLibraryW
FreeLibrary
GetExitCodeProcess
GetConsoleMode
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
ExitThread
CreateThread
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThread
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
HeapCreate
HeapDestroy
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetStringTypeW
GetLocaleInfoW
HeapReAlloc
HeapSize
FatalAppExitA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
GetConsoleCP
user32
ExitWindowsEx
advapi32
RegDeleteValueA
GetUserNameA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
QueryServiceConfigA
QueryServiceStatusEx
StartServiceA
SetServiceStatus
LockServiceDatabase
QueryServiceLockStatusA
UnlockServiceDatabase
ChangeServiceConfigA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ole32
CoCreateGuid
Sections
.text Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ