D:\a\Process-Dump\Process-Dump\x64\Release\pd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
pd64.exe
Resource
win11-20240802-en
General
-
Target
pd64.exe
-
Size
602KB
-
MD5
20e16a9b6650ccae7eb60e56d3f63472
-
SHA1
acfb71a3f6d37f37f96305c6499544b114588962
-
SHA256
f2c2d46331ddf2a4982ada7f3f2ea3a0946b99204d172b68d7bd6301eac5bb95
-
SHA512
bf248bb3d83d5adc031c7c65f6cb14b30d43d2722703506c1662c67e75d34ccdba1429ed7c0b4ed131409e3376ac10e2d58dd395470ecc7bb11b5e08a23716fa
-
SSDEEP
12288:x0TE3neTuWLIJfrBE6VJSRf1E5dxFvrb36k5hKXMCZyJmg5oLwbB5H:q43cL0trbvhKXZEmg5qw3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource pd64.exe
Files
-
pd64.exe.exe windows:5 windows x64 arch:x64
8c60452e4006b89e3e28951c71802cc7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shlwapi
PathMatchSpecW
PathFileExistsA
kernel32
CloseHandle
GetCurrentProcessId
Process32FirstW
Process32NextW
Sleep
OpenProcess
Module32FirstW
GetLastError
VirtualQueryEx
ReadProcessMemory
lstrcmpW
GetFullPathNameW
FindClose
FindFirstFileExW
WaitForSingleObject
GetCurrentProcess
SetConsoleCtrlHandler
FindNextFileW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
CreateToolhelp32Snapshot
ExpandEnvironmentStringsA
GetFileAttributesA
DeleteCriticalSection
lstrlenW
GetModuleFileNameA
FormatMessageW
LocalAlloc
LocalSize
LocalFree
WriteProcessMemory
VirtualFreeEx
VirtualAllocEx
VirtualProtectEx
OpenThread
ResumeThread
WriteConsoleW
CreateFileW
FlushFileBuffers
SetStdHandle
HeapSize
SetEndOfFile
LeaveCriticalSection
SetUnhandledExceptionFilter
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
TryEnterCriticalSection
WideCharToMultiByte
QueryPerformanceCounter
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
MultiByteToWideChar
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
SetEvent
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
ExitProcess
GetModuleHandleExW
ReadFile
ExitThread
HeapAlloc
HeapFree
HeapReAlloc
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetProcessHeap
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
psapi
GetModuleInformation
EnumProcessModulesEx
GetModuleBaseNameA
GetModuleFileNameExA
advapi32
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
Sections
.text Size: 405KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ