c:\Users\Mr.Anderson\Desktop\2005\13.8.20\cgridlistctrlex-master\vs2003\Release\CGridListCtrlEx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b091a38245fdca28367b9fc96f5baef8f7753c3d0ad819378597de5c3c50e90a.exe
Resource
win7-20240903-en
General
-
Target
b091a38245fdca28367b9fc96f5baef8f7753c3d0ad819378597de5c3c50e90a
-
Size
588KB
-
MD5
280e11f682c00615799f188dbe364810
-
SHA1
ce04330fd437633bdf8048116a9e297cf976165d
-
SHA256
b091a38245fdca28367b9fc96f5baef8f7753c3d0ad819378597de5c3c50e90a
-
SHA512
068343ab35630552a2f02160d69733c6bf7dc61fa3b22bde83b4f02fb7c94b8a825a84d70b97974440ea3e6121a3d9bd5ee2ec72a635d9daa5b1d033d2ba7116
-
SSDEEP
12288:uZ1WUafDtia8E2jCm88E7otvY4PjmMPEPH10Hbm:uZ1WUMtiZd88E7oBY0jJG0Hbm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b091a38245fdca28367b9fc96f5baef8f7753c3d0ad819378597de5c3c50e90a
Files
-
b091a38245fdca28367b9fc96f5baef8f7753c3d0ad819378597de5c3c50e90a.exe windows:4 windows x86 arch:x86
934507640a4716ead8915235f23d11a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
GetFileAttributesA
GetFileTime
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
GetACP
FileTimeToLocalFileTime
LCMapStringW
GetTimeZoneInformation
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetProfileIntA
FileTimeToSystemTime
InterlockedDecrement
GetModuleFileNameW
CopyFileA
GlobalSize
FormatMessageA
LocalFree
MulDiv
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStringA
FreeResource
GetCurrentProcessId
GlobalAddAtomA
CloseHandle
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrcpynA
Sleep
FreeLibrary
VerSetConditionMask
VerifyVersionInfoA
DebugBreak
RaiseException
lstrlenA
CompareStringW
CompareStringA
lstrlenW
GetVersion
MultiByteToWideChar
InterlockedExchange
ExitProcess
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
LCMapStringA
SizeofResource
user32
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
PostThreadMessageA
GetScrollRange
GetScrollPos
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
SetWindowContextHelpId
MapDialogRect
SetWindowPos
RegisterClipboardFormatA
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetClientRect
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
GetSysColorBrush
LoadCursorA
CheckMenuItem
PostQuitMessage
WindowFromPoint
ReleaseCapture
SetCapture
SetRect
TrackPopupMenu
IsRectEmpty
EnableWindow
LoadIconA
GetSystemMetrics
CharUpperA
PostMessageA
GetDC
ReleaseDC
UpdateWindow
InvalidateRect
GetWindow
GetParent
GetFocus
PtInRect
InflateRect
OffsetRect
FillRect
GetWindowRect
GetKeyState
DrawTextA
CreatePopupMenu
GetMenuItemCount
ScreenToClient
OpenClipboard
GetSysColor
GetDesktopWindow
GetMessagePos
SetClipboardData
CloseClipboard
EmptyClipboard
CopyRect
EqualRect
DrawFocusRect
GetForegroundWindow
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
CreatePen
CreateSolidBrush
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetTextExtentPoint32A
MoveToEx
LineTo
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
CopyMetaFileA
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
CreateRectRgnIndirect
CreateBitmap
DeleteObject
CreateFontIndirectA
CreateCompatibleDC
CreateCompatibleBitmap
GetCurrentObject
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
CoRevokeClassObject
CoGetClassObject
OleFlushClipboard
OleIsCurrentClipboard
DoDragDrop
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
OleDuplicateData
ReleaseStgMedium
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
oleaut32
SystemTimeToVariantTime
SysFreeString
VarBstrFromDate
VarUdateFromDate
VarDateFromStr
SysStringLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringByteLen
OleCreateFontIndirect
SafeArrayDestroy
SysAllocString
VariantCopy
VariantTimeToSystemTime
Sections
.text Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ