C:\temp\pplkiller\x64\Release\PPLKiller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
PPLKiller.exe
Resource
win10v2004-20240802-en
General
-
Target
PPLKiller.exe
-
Size
39KB
-
MD5
35045ed665f1ff7a3ce8e61c4b26a9e4
-
SHA1
f508b896280c10359c2f9ca5268423e163bdfe52
-
SHA256
103a38801d03a2d2ec3d17155e8c1619d4ad28c7af2e04e8ab2bba854dd1b66e
-
SHA512
d636dc73c5fb6fba97346a9694ed3f9c763f7f9e65ad268ef9b5897cb5c072aaef7141fd82e5ffd5f98de4d86e913aa06b308d723bb890daec955628b0c5932c
-
SSDEEP
768:HTRJjOvTDngluSpuXLWFfvphKSLjLiShpmzui:o9LubKSLIui
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PPLKiller.exe
Files
-
PPLKiller.exe.exe windows:6 windows x64 arch:x64
62cdb6e4208c54bd59d449a9a9dde0d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
LoadLibraryW
LoadResource
FindResourceW
LocalFree
Process32FirstW
CreateProcessW
FreeLibrary
RtlLookupFunctionEntry
DeleteFileW
LockResource
Process32NextW
CreateToolhelp32Snapshot
CreateFileW
LocalAlloc
HeapFree
WaitForSingleObject
FindClose
DeviceIoControl
WriteFile
FindFirstFileW
SizeofResource
K32EnumDeviceDrivers
GetProcessHeap
GetProcAddress
HeapAlloc
CloseHandle
GetLastError
GetModuleHandleA
lstrlenW
GetCurrentProcess
GetCurrentProcessId
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
RtlCaptureContext
advapi32
RegCloseKey
CreateServiceW
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
DeleteService
SetServiceObjectSecurity
ControlService
FreeSid
StartServiceW
RegGetValueW
OpenServiceW
BuildSecurityDescriptorW
QueryServiceObjectSecurity
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyExW
IsValidSid
RegSetValueExW
OpenProcessToken
ConvertSidToStringSidW
GetTokenInformation
shell32
SHGetFolderPathW
vcruntime140
__C_specific_handler
__current_exception
__current_exception_context
memset
memcpy
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__acrt_iob_func
fputc
__p__commode
__stdio_common_vsnwprintf_s
__stdio_common_vfprintf
__stdio_common_vfwprintf
api-ms-win-crt-runtime-l1-1-0
_c_exit
_cexit
exit
__p___wargv
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
__p___argc
_exit
_initterm_e
_seh_filter_exe
_initterm
_register_thread_local_exe_atexit_callback
_get_initial_wide_environment
_configure_wide_argv
_set_app_type
_initialize_wide_environment
api-ms-win-crt-convert-l1-1-0
_wtoi
api-ms-win-crt-string-l1-1-0
wcscat_s
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ