PortableDeviceClassExtension.pdb
Static task
static1
Behavioral task
behavioral1
Sample
PortableDeviceClassExtension.dll
Resource
win10v2004-20240508-en
General
-
Target
PortableDeviceClassExtension.dll
-
Size
108KB
-
MD5
7127bd0fdb143a030435b645a03b1de6
-
SHA1
08f714a1e92af1cc286d75b4dd9bd33ee995cfec
-
SHA256
874adeec98b1002d9d5dba96c925a5fca3a88c0b250f9802449726c097873348
-
SHA512
25509d46ef2452c40f8d422cddb06bc5878800fcb8ecdebafb733845cf29f1fe01a66d7d25fc8634f575ec5b018d2fa2770fc4ba32ca692b50cb1afbd78c2119
-
SSDEEP
1536:H22KzfUhJHBGIf1U8tOAEIiH9pBvmC+9xQJ7D+SGTLVYLOEkRy+VL:2zUhJhGIlejH9HOCoudibZYyEay
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PortableDeviceClassExtension.dll
Files
-
PortableDeviceClassExtension.dll.dll regsvr32 windows:10 windows x86 arch:x86
8214c5c8de12edca8abd3d2877444626
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcscat_s
_purecall
_vsnwprintf
_wcsicmp
wcscpy_s
memcpy_s
_CxxThrowException
free
malloc
wcsncpy_s
memmove_s
_vscwprintf
vswprintf_s
_callnewh
_XcptFilter
_amsg_exit
_initterm
?terminate@@YAXXZ
_except_handler4_common
??1type_info@@UAE@XZ
_errno
realloc
_lock
_unlock
__dllonexit
_onexit
memcmp
__CxxFrameHandler3
memset
advapi32
RegQueryValueExW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetSecurityInfo
TraceMessage
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
kernel32
HeapDestroy
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
OutputDebugStringA
DelayLoadFailureHook
ResolveDelayLoadedAPI
CreateThread
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryExW
GetModuleHandleW
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceExW
GetModuleFileNameW
InitializeCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
CreateEventW
LocalFree
SetEvent
OpenEventW
WaitForSingleObject
CloseHandle
WaitForMultipleObjects
LockResource
user32
UnregisterClassA
CharNextW
ole32
CoCreateFreeThreadedMarshaler
StringFromGUID2
PropVariantClear
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
rpcrt4
CStdStubBuffer_Disconnect
NdrDllGetClassObject
NdrDllRegisterProxy
CStdStubBuffer_DebugServerRelease
NdrOleAllocate
CStdStubBuffer_QueryInterface
CStdStubBuffer_CountRefs
NdrDllUnregisterProxy
IUnknown_Release_Proxy
CStdStubBuffer_AddRef
NdrOleFree
CStdStubBuffer_DebugServerQueryInterface
IUnknown_AddRef_Proxy
CStdStubBuffer_Invoke
CStdStubBuffer_IsIIDSupported
NdrDllCanUnloadNow
CStdStubBuffer_Connect
NdrCStdStubBuffer_Release
IUnknown_QueryInterface_Proxy
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Microsoft_WDF_UMDF_Version
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ