paddd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
paddd.exe
Resource
win10v2004-20240802-en
General
-
Target
paddd.exe
-
Size
322KB
-
MD5
82d538a2afc4d554257e3b0e3b215310
-
SHA1
7241963334a970c6390b49eb911280c693849f83
-
SHA256
f4b6b14fbaef9936cca792a81d2b40f2060b4f033373d7102c440a513a467dca
-
SHA512
a64f2e01c25710e76802f73b2c725a2b94e3c5eb03bcbe9bc562f35e5800cf4dbe83a4b141f4a0a7e8d4a65ed585402627c6b6e7b8f0ae246e659557851a307f
-
SSDEEP
6144:qon8k/KWJO4oSNjlJfDkejJlM+kDYOTcft9xi:4kLlJIejLqtAl+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource paddd.exe
Files
-
paddd.exe.exe windows:6 windows x64 arch:x64
7fb35cd9b4edd3e381b03aa58cc187de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WakeByAddressSingle
WaitOnAddress
WakeByAddressAll
ntdll
NtProtectVirtualMemory
NtCreateThreadEx
NtWaitForSingleObject
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtAllocateVirtualMemory
NtReadVirtualMemory
NtWriteVirtualMemory
RtlNtStatusToDosError
NtWriteFile
kernel32
GetConsoleMode
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
CreateMutexA
LoadLibraryA
WaitForSingleObjectEx
GetModuleHandleA
WriteConsoleW
MultiByteToWideChar
GetConsoleWindow
CreateProcessA
WriteProcessMemory
CloseHandle
GetLastError
WaitForSingleObject
CreateFileW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
TerminateProcess
GetProcAddress
GetCurrentThread
AddVectoredExceptionHandler
SetThreadStackGuarantee
QueryPerformanceCounter
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
GetStdHandle
GetCurrentProcessId
HeapFree
HeapReAlloc
lstrlenW
ReleaseMutex
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
GetModuleHandleW
FormatMessageW
ExitProcess
psapi
EnumProcessModulesEx
GetModuleBaseNameW
user32
SetWindowPos
ShowWindow
vcruntime140
memmove
__CxxFrameHandler3
memset
memcmp
_CxxThrowException
__C_specific_handler
__current_exception
__current_exception_context
memcpy
api-ms-win-crt-heap-l1-1-0
free
calloc
malloc
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_wassert
_register_onexit_function
_seh_filter_exe
_set_app_type
terminate
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_crt_atexit
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ