H:\iNodeCode\br_patch_PC_V7R3B05D131\inodemgr\Build\ReleasePdb\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
56bc14edcfa27cd7f771cdeeb5e603bbce126744468d7e852a1bd75f97bf4ba9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
56bc14edcfa27cd7f771cdeeb5e603bbce126744468d7e852a1bd75f97bf4ba9.exe
Resource
win10v2004-20240802-en
General
-
Target
56bc14edcfa27cd7f771cdeeb5e603bbce126744468d7e852a1bd75f97bf4ba9
-
Size
9.7MB
-
MD5
b962e0d15ff53f01eabe7008c4386f9d
-
SHA1
bcfa0c259a03c5c14aeea3a7c0a032db45f1025b
-
SHA256
56bc14edcfa27cd7f771cdeeb5e603bbce126744468d7e852a1bd75f97bf4ba9
-
SHA512
ec796fa60b22d5a47581990eae38660b0bbf9d4a89005488dc155376367db000fedff53a38937cf5cf9df7abc1acb93e141bb7c106b895e7c300f6ff0be67753
-
SSDEEP
196608:u9iHfdAiSkhVB8H9OxvsByWG2xxcKIgJlKIpJU2DtUGteFpXR7th:8i/dD5V6dOCyWG2NIgJ5pJdDtUGUrXRr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56bc14edcfa27cd7f771cdeeb5e603bbce126744468d7e852a1bd75f97bf4ba9
Files
-
56bc14edcfa27cd7f771cdeeb5e603bbce126744468d7e852a1bd75f97bf4ba9.exe windows:5 windows x86 arch:x86
ebab04c36d90f6ea25abc47408c06902
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
dbghelp
MakeSureDirectoryPathExists
kernel32
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GetCurrentThreadId
WriteFile
SetFilePointer
GetLastError
CreateFileA
GetLocalTime
Sleep
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetSystemDefaultLangID
CopyFileA
GetModuleFileNameA
CreateEventA
GetDiskFreeSpaceA
GetSystemDirectoryA
GetSystemInfo
ReadFile
GetEnvironmentVariableA
WaitForSingleObject
MultiByteToWideChar
GetPrivateProfileSectionNamesA
MoveFileExA
SetFileAttributesA
GetFileAttributesA
RemoveDirectoryA
GetTickCount
GetPrivateProfileIntA
CreateProcessA
GetStartupInfoA
CreatePipe
DeviceIoControl
GetVersionExA
GetComputerNameA
WideCharToMultiByte
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
HeapSize
FatalAppExitA
LCMapStringW
GetLocaleInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
HeapDestroy
GetCurrentProcess
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
OpenProcess
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
WriteConsoleW
SetEndOfFile
GetProcessHeap
CreateFileW
InterlockedCompareExchange
GetFileAttributesExA
HeapCreate
ExitProcess
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
ExitThread
CreateThread
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
EncodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
InterlockedDecrement
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
user32
ExitWindowsEx
CreateDialogParamA
GetDesktopWindow
GetWindowRect
SetWindowPos
UpdateWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
EndDialog
SetDlgItemTextA
SetWindowTextA
GetDlgItem
ShowWindow
SendMessageA
SetFocus
GetWindowTextLengthA
GetWindowTextA
MessageBoxA
PostQuitMessage
advapi32
RegSetValueExA
GetUserNameA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegCreateKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
Sections
.text Size: 422KB - Virtual size: 421KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 816KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ