e:\projectx\myprj\ext2read\ext2read2.0beta\ext2explore\MFC\Release\ext2explore.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ext2explore.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
ext2explore.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
ext2explore.exe
Resource
win11-20240419-en
General
-
Target
ext2explore.exe
-
Size
448KB
-
MD5
be9291729eb2f781827b41ba37661e61
-
SHA1
311a4b8d5d7fa7a0c96784bda5eda1d4345cab34
-
SHA256
610f42ae7eff29ec3f40fdd18be3ed079009ea1e4e62199a9113e639d53c3538
-
SHA512
01dd6042f785b6012c7599c12a713cb8a168c45e984324c3726aaa03561bab7e90f9e2e096b70cfedf13a9f6e4f565ec51ec224141dcf5ff94580466232b3984
-
SSDEEP
6144:x41n/oRSBXobT5eiWy/YHJ92sKaWg46le5c7AncfGmSIcU1sT6i9PIyc3ur+gpt:x8M5e7J9uaWg46lb7omSe1sjo0t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ext2explore.exe
Files
-
ext2explore.exe.exe windows:4 windows x86 arch:x86
de30272f82095df1b545d5924de39cdc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetTimeFormatA
GetDateFormatA
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetTimeZoneInformation
HeapFree
GetACP
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetErrorMode
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetOEMCP
GetCPInfo
GetShortPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
DeleteFileA
MoveFileA
SystemTimeToFileTime
FileTimeToSystemTime
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
InterlockedDecrement
GetModuleFileNameW
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetTickCount
FormatMessageA
LocalFree
MulDiv
GlobalUnlock
FreeResource
GlobalFree
GlobalAddAtomA
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
CloseHandle
DeviceIoControl
ReadFile
SetFilePointer
CreateFileA
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetLastError
GetVersion
CompareStringA
LockResource
lstrcmpiA
GetLastError
InterlockedExchange
GetStringTypeExA
MultiByteToWideChar
CompareStringW
SizeofResource
WideCharToMultiByte
LoadResource
lstrlenA
FindResourceA
Sleep
CreateDirectoryA
user32
GetWindowDC
BeginPaint
EndPaint
GetSysColorBrush
DestroyIcon
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
PostThreadMessageA
UnregisterClassA
GetDCEx
LockWindowUpdate
FindWindowA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetScrollPos
GetScrollPos
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
SetCursorPos
SystemParametersInfoA
IsIconic
GrayStringA
GetWindowRect
RegisterClipboardFormatA
AppendMenuA
GetMenuItemID
GetMenuItemCount
GetDesktopWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
ShowOwnedPopups
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
SetCapture
RedrawWindow
InflateRect
UnpackDDElParam
ReuseDDElParam
LoadMenuA
GetMenuState
CheckMenuItem
PostMessageA
PostQuitMessage
ClientToScreen
GetSubMenu
LoadIconA
GetMenu
EnableMenuItem
SendMessageA
PtInRect
CharUpperA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
WindowFromPoint
KillTimer
UpdateWindow
EnableWindow
SetTimer
SetRect
GetMenuItemInfoA
LoadCursorA
GetWindowPlacement
DestroyCursor
DestroyMenu
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
BringWindowToTop
SetMenu
TranslateAcceleratorA
IsZoomed
SetParent
GetSystemMenu
DeleteMenu
SetRectEmpty
IsRectEmpty
ReleaseDC
GetDC
InvalidateRect
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
IsChild
IntersectRect
WinHelpA
SendDlgItemMessageA
gdi32
StretchDIBits
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontIndirectA
BitBlt
ExtTextOutA
GetBkColor
SaveDC
RestoreDC
SetBkMode
SetMapMode
ExcludeClipRect
IntersectClipRect
SelectClipRgn
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
DeleteDC
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePatternBrush
GetStockObject
CreateSolidBrush
GetTextColor
GetRgnBox
SetRectRgn
CombineRgn
GetMapMode
CreateFontA
GetCharWidthA
DeleteObject
GetTextExtentPoint32A
GetTextMetricsA
SelectObject
PatBlt
CreateRectRgnIndirect
GetObjectA
SetBkColor
SetTextColor
GetClipBox
RectVisible
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueA
RegCreateKeyA
RegSetValueExA
RegCreateKeyExA
GetFileSecurityA
SetFileSecurityA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
DragFinish
DragQueryFileA
ExtractIconA
SHGetFileInfoA
DragAcceptFiles
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
oleaut32
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
Sections
.text Size: 304KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ