C:\devel\ark7\bin.win32\bdzsfx.x86.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dcd8d2e7ff06a4afc18d8f6f438fa18fef83bbc09ffe2d3c5dda934b373cd689.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
dcd8d2e7ff06a4afc18d8f6f438fa18fef83bbc09ffe2d3c5dda934b373cd689.exe
Resource
win10v2004-20240226-en
General
-
Target
dcd8d2e7ff06a4afc18d8f6f438fa18fef83bbc09ffe2d3c5dda934b373cd689
-
Size
643KB
-
MD5
47832567508f33cc459dd581a9d1fce2
-
SHA1
8b49854d6d60c43cd42cfb312d21e4574d42cf1e
-
SHA256
dcd8d2e7ff06a4afc18d8f6f438fa18fef83bbc09ffe2d3c5dda934b373cd689
-
SHA512
6a5fa071e1992ffc2e5401bfb90aaf03100c7578c28f0aecf3278f4787346d99ecf1af0cd59cef96f2f74ef87c309e321be950da47b31b24d7cc20611f01b744
-
SSDEEP
12288:DS1F2RFRXw7HbDvEHWh+j5l8SV4Rm8HrkX2vq8l/p475MZ5RDc3VYp:OCDXSfvEHi+AScmAA2jdp47sDI3ap
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcd8d2e7ff06a4afc18d8f6f438fa18fef83bbc09ffe2d3c5dda934b373cd689
Files
-
dcd8d2e7ff06a4afc18d8f6f438fa18fef83bbc09ffe2d3c5dda934b373cd689.exe windows:6 windows x86 arch:x86
981a275bce22f656f306ebaaaa886c29
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
lstrcmpW
MulDiv
SetFilePointerEx
GetFileSizeEx
SetFileAttributesW
DeleteFileW
SetFileTime
SetEndOfFile
WriteFile
GetVersion
lstrlenW
GetFullPathNameW
lstrcatW
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateEventW
SetEvent
ResetEvent
lstrcpyW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateHardLinkW
RemoveDirectoryW
CreateSymbolicLinkW
VirtualAlloc
VirtualFree
GetModuleFileNameW
GetFileAttributesW
GetCurrentThread
FileTimeToSystemTime
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
Sleep
IsNormalizedString
NormalizeString
GlobalMemoryStatusEx
CompareStringW
CreateFileA
GetDriveTypeW
FlushFileBuffers
GetTickCount
FindClose
GlobalFree
LocalFree
WideCharToMultiByte
GetModuleHandleW
lstrcmpiW
RaiseException
InitializeCriticalSectionEx
SetLastError
GetCurrentThreadId
GetUserDefaultLangID
DecodePointer
GetConsoleOutputCP
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
SetStdHandle
GetConsoleMode
LCMapStringW
GetStdHandle
GetCommandLineW
GetCommandLineA
ExitProcess
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
WriteConsoleW
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
IsProcessorFeaturePresent
GetLastError
GetProcAddress
CloseHandle
CreateFileW
lstrcpynW
ReadFile
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetSystemDirectoryW
FreeLibrary
LoadLibraryExW
LoadLibraryW
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
user32
GetDlgItem
CreateWindowExW
GetWindowRect
SendMessageW
SystemParametersInfoW
ScreenToClient
SetFocus
EndDialog
KillTimer
EnableWindow
SetTimer
SetDlgItemTextW
PostMessageW
MessageBoxW
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetClientRect
LoadIconW
GetWindowTextW
DialogBoxParamW
UnregisterClassW
GetActiveWindow
CharNextW
PeekMessageW
DispatchMessageW
TranslateMessage
RegisterWindowMessageW
MoveWindow
EnumChildWindows
SetWindowLongW
GetWindowLongW
FindWindowExW
GetClassNameW
MapWindowPoints
GetDlgCtrlID
GetParent
SetWindowPos
MonitorFromPoint
SetProcessDPIAware
ReleaseDC
GetDC
SetWindowTextW
InvalidateRect
GetWindowTextLengthW
gdi32
GetDeviceCaps
CreateFontIndirectW
GetObjectW
GetStockObject
DeleteObject
CreateFontW
advapi32
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
AreAllAccessesGranted
AccessCheck
OpenThreadToken
RevertToSelf
ImpersonateSelf
GetFileSecurityW
shell32
SHBrowseForFolderW
CommandLineToArgvW
SHGetPathFromIDListW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VarUI4FromStr
shlwapi
PathIsDirectoryW
PathCanonicalizeW
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ