IOC Report
Setup_DigiSignerOne_x86.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup_DigiSignerOne_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\idp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\logo_digisign_nou.bmp
PC bitmap, Windows 3.x format, 40 x 33 x 24, image size 3962, resolution 11811 x 11811 px/m, cbSize 4016, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe
"C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp
"C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp" /SL5="$203D4,33657605,58368,C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe"

URLs

Name
IP
Malicious
http://www.innosetup.com/
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
unknown
http://www.remobjects.com/psU
unknown
http://bitbucket.org/mitrich_k/inno-download-plugin
unknown
http://www.remobjects.com/ps
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://mitrichsoftware.wordpress.comB
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence

Memdumps

Base Address
Regiontype
Protect
Malicious
2290000
heap
page read and write
428000
heap
page read and write
91000
stack
page read and write
49C0000
direct allocation
page read and write
19D000
stack
page read and write
353E000
stack
page read and write
3230000
direct allocation
page read and write
7C8000
heap
page read and write
2390000
direct allocation
page read and write
33FE000
stack
page read and write
2070000
direct allocation
page read and write
10034000
unkown
page readonly
650000
heap
page read and write
22E0000
heap
page read and write
4C0000
heap
page read and write
49D000
unkown
page write copy
2081000
direct allocation
page read and write
18F000
stack
page read and write
2081000
direct allocation
page read and write
3220000
direct allocation
page read and write
10030000
unkown
page read and write
412000
unkown
page readonly
2260000
direct allocation
page execute and read and write
3220000
direct allocation
page read and write
22D4000
heap
page read and write
10000000
unkown
page readonly
9B000
stack
page read and write
7AF000
heap
page read and write
2308000
direct allocation
page read and write
3240000
heap
page read and write
2390000
direct allocation
page read and write
760000
heap
page read and write
2090000
direct allocation
page read and write
2240000
heap
page read and write
7A6000
heap
page read and write
600000
heap
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
401000
unkown
page execute read
768000
heap
page read and write
4AE000
unkown
page readonly
2308000
direct allocation
page read and write
4A0000
unkown
page write copy
2144000
direct allocation
page read and write
3220000
direct allocation
page read and write
40E000
unkown
page write copy
10029000
unkown
page readonly
22A0000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
2880000
heap
page read and write
7CB000
heap
page read and write
2074000
direct allocation
page read and write
22F8000
direct allocation
page read and write
22E5000
heap
page read and write
401000
unkown
page execute read
22E9000
heap
page read and write
620000
heap
page read and write
3275000
heap
page read and write
22F0000
direct allocation
page read and write
7E3000
heap
page read and write
4AE000
unkown
page readonly
750000
heap
page read and write
22FC000
direct allocation
page read and write
28A0000
trusted library allocation
page read and write
401000
unkown
page execute read
34FF000
stack
page read and write
7BF000
heap
page read and write
22F7000
direct allocation
page read and write
7B1000
heap
page read and write
49E000
unkown
page read and write
232C000
direct allocation
page read and write
3230000
direct allocation
page read and write
3270000
heap
page read and write
412000
unkown
page readonly
400000
unkown
page readonly
7AC000
heap
page read and write
420000
heap
page read and write
49C000
unkown
page write copy
232D000
direct allocation
page read and write
22D0000
heap
page read and write
40C000
unkown
page read and write
10001000
unkown
page execute read
520000
heap
page read and write
363F000
stack
page read and write
49C000
unkown
page read and write
40C000
unkown
page write copy
There are 77 hidden memdumps, click here to show them.