C:\projects\processhacker\bin\Release64\plugins\Updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d8284026fc7d24409c083be1c961239993ac8208b326412a3045fba0c889732e.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d8284026fc7d24409c083be1c961239993ac8208b326412a3045fba0c889732e.dll
Resource
win10v2004-20240611-en
General
-
Target
d8284026fc7d24409c083be1c961239993ac8208b326412a3045fba0c889732e
-
Size
116KB
-
MD5
a9b43e062a55f31454cdb858d4c3e501
-
SHA1
999a15e72e06751c36534ed9c2c3896e4f6ed3f1
-
SHA256
d8284026fc7d24409c083be1c961239993ac8208b326412a3045fba0c889732e
-
SHA512
382bf7f5f0082f663c5cbe8ca7fb8d69926b35f38a79ac54e0167e797de86488fd6fb49da4560579ac97745cce21b92a35465307b42aeeea93b0948e6efa2887
-
SSDEEP
3072:ybgIm4+7iRisr5Iq7nUuZfb22HgHkM5sWbuh3nK7aDmEarlAGu:J4KinnUsfzo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d8284026fc7d24409c083be1c961239993ac8208b326412a3045fba0c889732e
Files
-
d8284026fc7d24409c083be1c961239993ac8208b326412a3045fba0c889732e.dll windows:6 windows x64 arch:x64
5c7c442b7b8b1d724b9c2984aeedd058
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
processhacker.exe
PhSetWindowContext
PhHexStringToBuffer
PhQuerySystemTime
PhCreateBytesEx
PhFormatSize
PhCreateCacheFile
PhGetJsonValueAsString
PhSplitStringRefAtLastChar
PhFormatString
PhfWaitForEvent
PhCreateThread
PhInitializeStringBuilder
PhConcatStrings2
PhGetPhVersion
PhStringToInteger64
PhDeleteAutoPool
PhGetStringSetting
PhGetJsonValueAsLong64
PhGetPhVersionNumbers
PhReferenceEmptyString
PhSetStringSetting2
PhGetWindowContext
PhSplitStringRefAtChar
PhFinalStringBuilderString
PhFreeJsonParser
PhQueryRegistryString
PhAppendCharStringBuilder
PhInitializeAutoPool
PhCreateAlloc
PhAppendStringBuilder2
PhCreateJsonParser
PhRemoveWindowContext
PhfResetEvent
PhFormatUInt64
PhMainWndHandle
PhBufferToHexString
PhShowStatus
PhCreateFileWin32
PhFormatDateTime
PhConcatStrings
PhQueryRegistryUlong
PhOpenKey
PhGetApplicationDirectory
PhGetGlobalWorkQueue
PhQueueItemWorkQueue
PhFormatString_V
PhAutoDereferenceObject
PhCreateThread2
PhReferenceObject
PhfSetEvent
PhInitializeLayoutManager
PhDeleteLayoutManager
PhSaveWindowPlacementToSetting
PhGetIntegerPairSetting
PhLoadWindowPlacementFromSetting
PhAddLayoutItem
PhSetIntegerSetting
PhCenterWindow
PhInstanceHandle
PhLoadIcon
PhLayoutManagerLayout
PhInsertEMenuItem
PhPluginCreateEMenuItem
PhAddSettings
PhGetGeneralCallback
PhRegisterCallback
PhGetIntegerSetting
PhRegisterPlugin
PhGetPluginCallback
PhAllocate
PhCountStringZ
WindowsVersion
PhCreateStringEx
PhReAllocate
PhGetMessage
PhFree
PhMapFlags1
PhDereferenceObject
PhEqualStringRef
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
NtDelayExecution
NtWriteFile
NtClose
RtlSecondsSince1970ToTime
LdrGetDllHandle
kernel32
FileTimeToSystemTime
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
InterlockedFlushSList
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryExA
GetProcAddress
GetModuleHandleW
FreeLibrary
VirtualQuery
VirtualProtect
GetSystemInfo
RaiseException
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
FileTimeToLocalFileTime
GetLastError
GetUserDefaultLangID
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
SetStdHandle
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ