D:\a\Process-Dump\Process-Dump\Release\pd.pdb
Overview
overview
3Static
static
3pd_latest (copy).zip
windows7-x64
1pd_latest (copy).zip
windows10-2004-x64
1pd_latest ...b8.zip
windows7-x64
1pd_latest ...b8.zip
windows10-2004-x64
1pd_latest ...32.exe
windows7-x64
1pd_latest ...32.exe
windows10-2004-x64
3pd_latest ...64.exe
windows7-x64
1pd_latest ...64.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
pd_latest (copy).zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
pd_latest (copy).zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
pd_latest (copy)/753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.zip
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
pd_latest (copy)/753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
pd_latest (copy)/pd32.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
pd_latest (copy)/pd32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
pd_latest (copy)/pd64.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
pd_latest (copy)/pd64.exe
Resource
win10v2004-20240802-en
General
-
Target
pd_latest (copy).zip
-
Size
773KB
-
MD5
d8bfed7bb7dce5891618d1847ae5a7b8
-
SHA1
d4ff8d19b4946ee1a993e79c05587c5cb9998ab4
-
SHA256
7ae0ecd26c1cf72f1c057f78b7d298e0e66f5fd6f2f2e85c41571bf72b64e21d
-
SHA512
cb3c79985f19979291f480adc1fd1e3954faf7c70dbd3f90178190fe90208a3d6f54b3d4afe91f2df1f59b5bc7fc95a2c358da04c2ec0f49d98174a70c100914
-
SSDEEP
24576:CUUPydMYwRI4UYcYRIKlAChZxeOnnDIjvonu:ChQMYwy4UYcHvQZzD2L
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack002/753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe unpack001/pd_latest (copy)/pd32.exe unpack001/pd_latest (copy)/pd64.exe
Files
-
pd_latest (copy).zip.zip
-
pd_latest (copy)/753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.zip.zip
Password: infected
-
753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 465KB - Virtual size: 464KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
pd_latest (copy)/pd32.exe.exe windows:5 windows x86 arch:x86
cede5037c50db2b5769116adb96e95f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathMatchSpecW
PathFileExistsA
kernel32
CloseHandle
GetCurrentProcessId
Process32FirstW
Process32NextW
Sleep
OpenProcess
Module32FirstW
GetLastError
VirtualQueryEx
ReadProcessMemory
Module32NextW
GetFullPathNameW
FindClose
FindFirstFileExW
IsWow64Process
GetCurrentProcess
WaitForSingleObject
lstrcmpW
SetConsoleCtrlHandler
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
ExpandEnvironmentStringsA
GetFileAttributesA
DeleteCriticalSection
GetModuleFileNameA
FormatMessageW
LocalAlloc
lstrlenW
LocalSize
LocalFree
WriteProcessMemory
VirtualFreeEx
VirtualAllocEx
VirtualProtectEx
OpenThread
ResumeThread
HeapSize
SetEndOfFile
FindNextFileW
IsProcessorFeaturePresent
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
TryEnterCriticalSection
WideCharToMultiByte
QueryPerformanceCounter
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
MultiByteToWideChar
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RaiseException
RtlUnwind
ExitProcess
GetModuleHandleExW
ReadFile
ExitThread
HeapAlloc
HeapFree
HeapReAlloc
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetProcessHeap
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
FlushFileBuffers
CreateFileW
WriteConsoleW
advapi32
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
Sections
.text Size: 347KB - Virtual size: 346KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
pd_latest (copy)/pd64.exe.exe windows:5 windows x64 arch:x64
8c60452e4006b89e3e28951c71802cc7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\a\Process-Dump\Process-Dump\x64\Release\pd.pdb
Imports
shlwapi
PathMatchSpecW
PathFileExistsA
kernel32
CloseHandle
GetCurrentProcessId
Process32FirstW
Process32NextW
Sleep
OpenProcess
Module32FirstW
GetLastError
VirtualQueryEx
ReadProcessMemory
lstrcmpW
GetFullPathNameW
FindClose
FindFirstFileExW
WaitForSingleObject
GetCurrentProcess
SetConsoleCtrlHandler
FindNextFileW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
CreateToolhelp32Snapshot
ExpandEnvironmentStringsA
GetFileAttributesA
DeleteCriticalSection
lstrlenW
GetModuleFileNameA
FormatMessageW
LocalAlloc
LocalSize
LocalFree
WriteProcessMemory
VirtualFreeEx
VirtualAllocEx
VirtualProtectEx
OpenThread
ResumeThread
WriteConsoleW
CreateFileW
FlushFileBuffers
SetStdHandle
HeapSize
SetEndOfFile
LeaveCriticalSection
SetUnhandledExceptionFilter
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
TryEnterCriticalSection
WideCharToMultiByte
QueryPerformanceCounter
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
MultiByteToWideChar
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
SetEvent
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
ExitProcess
GetModuleHandleExW
ReadFile
ExitThread
HeapAlloc
HeapFree
HeapReAlloc
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetProcessHeap
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
psapi
GetModuleInformation
EnumProcessModulesEx
GetModuleBaseNameA
GetModuleFileNameExA
advapi32
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
Sections
.text Size: 405KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ