c:\Users\User\Desktop\2003\5.8.20\MenuXP_src\Dlg\Release\DLG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
36249f8982a32f8a62c46374ef8c13a1338b6304d059462d203d6b3999e5be17.exe
Resource
win7-20241023-en
General
-
Target
36249f8982a32f8a62c46374ef8c13a1338b6304d059462d203d6b3999e5be17
-
Size
332KB
-
MD5
32ef1f6a740f94180c08d61410d8bfe2
-
SHA1
32d68e273717572c37c338da0b0a9186828ecad7
-
SHA256
36249f8982a32f8a62c46374ef8c13a1338b6304d059462d203d6b3999e5be17
-
SHA512
310286eb0d3a33e903fb35cc6fb0637b4a8125d4074255ba45011980e712cd2be5b1d5f73cb93413175cda68b84a6dba99708bebe6d022800d54cb74841fadb6
-
SSDEEP
6144:y3q5crb5h5lp2ZzBUdONOL4BdXE6264/U0RaePM11tDd7QPvYGEPJKT42+8PQQS:y3acrplp+yONOsC6puE11tDleXEPJw+h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 36249f8982a32f8a62c46374ef8c13a1338b6304d059462d203d6b3999e5be17
Files
-
36249f8982a32f8a62c46374ef8c13a1338b6304d059462d203d6b3999e5be17.exe windows:4 windows x86 arch:x86
4ed66642a4109a9e59d52d263f0d1f42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
TerminateProcess
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetCommandLineA
InterlockedExchange
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
ExitProcess
RtlUnwind
GetTickCount
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
FileTimeToSystemTime
GetOEMCP
GetCPInfo
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
InterlockedDecrement
SetLastError
MulDiv
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
lstrcpynA
GlobalUnlock
GlobalFree
FreeResource
CloseHandle
GlobalAddAtomA
GetCurrentThread
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
GetCurrentThreadId
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
LoadLibraryExA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetEnvironmentStringsW
user32
GetSysColorBrush
CharNextA
SetRect
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
TranslateAcceleratorA
TranslateMDISysAccel
BringWindowToTop
DrawMenuBar
DefMDIChildProcA
DefFrameProcA
EndPaint
BeginPaint
GetWindowDC
FillRect
wsprintfA
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
UpdateWindow
GetMenuItemID
AdjustWindowRectEx
DeferWindowPos
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
IntersectRect
GetWindowPlacement
SetWindowContextHelpId
MapDialogRect
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
TranslateMessage
GetActiveWindow
PeekMessageA
MessageBoxA
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
SetCursor
PostQuitMessage
SetWindowPos
TrackMouseEvent
IsMenu
SetMenuItemInfoA
SetWindowsHookExA
GetMenuItemCount
DrawIcon
AppendMenuA
GetWindowTextA
GetSubMenu
SendMessageA
GetMenu
GetSystemMenu
IsIconic
GetClientRect
EnableWindow
LoadIconA
GetSystemMetrics
GetMenuItemRect
SystemParametersInfoA
DestroyIcon
LoadBitmapA
GetClassNameA
GetWindowLongA
CallNextHookEx
CallWindowProcA
UnhookWindowsHookEx
SetWindowLongA
IsWindowVisible
GetPropA
SetPropA
RemovePropA
GetForegroundWindow
LoadCursorA
LoadMenuA
UnpackDDElParam
ReuseDDElParam
EqualRect
OffsetRect
SetRectEmpty
GetMenuItemInfoA
DrawStateA
GetCursorPos
ScreenToClient
PostMessageA
GetMessageA
DispatchMessageA
ReleaseCapture
GrayStringA
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetMenu
RedrawWindow
CharUpperA
CopyRect
InflateRect
DrawFocusRect
GetParent
GetSysColor
InvalidateRect
ValidateRect
GetWindowRect
GetWindow
GetKeyState
GetFocus
ReleaseDC
GetDC
GetDlgCtrlID
IsRectEmpty
PtInRect
DrawFrameControl
ClientToScreen
GetCapture
SetCapture
TabbedTextOutA
DrawTextA
DrawTextExA
gdi32
ExtSelectClipRgn
CreatePatternBrush
GetMapMode
GetBkColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
ExcludeClipRect
Rectangle
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
CreateRectRgnIndirect
CreateBitmap
GetTextExtentPoint32A
GetTextMetricsA
Ellipse
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetPixel
GetPixel
CreateSolidBrush
CreatePen
GetTextColor
GetCurrentObject
GetObjectA
CreateFontIndirectA
DeleteObject
SetTextColor
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
GetStockObject
SelectObject
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
DragQueryFileA
DragFinish
comctl32
ord17
ImageList_Draw
ImageList_GetIcon
ImageList_Destroy
ImageList_LoadImageA
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
Sections
.text Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ