c:\Users\Mr.Anderson\Desktop\2005\13.8.20\cgridlistctrlex-master\vs2003\Release\CGridListCtrlEx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2a2bc6cb8100dd0577b4b85b602d7c606107499c17a881c194b885a05fbd2b5d.exe
Resource
win7-20240903-en
General
-
Target
2a2bc6cb8100dd0577b4b85b602d7c606107499c17a881c194b885a05fbd2b5d
-
Size
584KB
-
MD5
109bb495511f4dc9ffe9127be643bb10
-
SHA1
59b11c126c8ca6dbb5a8eb25fd0177f7bac58127
-
SHA256
2a2bc6cb8100dd0577b4b85b602d7c606107499c17a881c194b885a05fbd2b5d
-
SHA512
00ead35a214afaf7c12786fefe8ef7d2092981208b4f2afa5a0d026eb2d8d8ca00ddc6db5a3b975882abe7925c035d277be2a4007ea8bd66f64ae6da0a18fa5b
-
SSDEEP
12288:CZ1WUafDtia8E2jCm88E7otvY4vjmWOEPH8/HQm:CZ1WUMtiZd88E7oBYUj7cYm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2a2bc6cb8100dd0577b4b85b602d7c606107499c17a881c194b885a05fbd2b5d
Files
-
2a2bc6cb8100dd0577b4b85b602d7c606107499c17a881c194b885a05fbd2b5d.exe windows:4 windows x86 arch:x86
934507640a4716ead8915235f23d11a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
GetFileAttributesA
GetFileTime
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
GetACP
FileTimeToLocalFileTime
LCMapStringW
GetTimeZoneInformation
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetProfileIntA
FileTimeToSystemTime
InterlockedDecrement
GetModuleFileNameW
CopyFileA
GlobalSize
FormatMessageA
LocalFree
MulDiv
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStringA
FreeResource
GetCurrentProcessId
GlobalAddAtomA
CloseHandle
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrcpynA
Sleep
FreeLibrary
VerSetConditionMask
VerifyVersionInfoA
DebugBreak
RaiseException
lstrlenA
CompareStringW
CompareStringA
lstrlenW
GetVersion
MultiByteToWideChar
InterlockedExchange
ExitProcess
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
LCMapStringA
SizeofResource
user32
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
PostThreadMessageA
GetScrollRange
GetScrollPos
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
SetWindowContextHelpId
MapDialogRect
SetWindowPos
RegisterClipboardFormatA
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetClientRect
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
GetSysColorBrush
LoadCursorA
CheckMenuItem
PostQuitMessage
WindowFromPoint
ReleaseCapture
SetCapture
SetRect
TrackPopupMenu
IsRectEmpty
EnableWindow
LoadIconA
GetSystemMetrics
CharUpperA
PostMessageA
GetDC
ReleaseDC
UpdateWindow
InvalidateRect
GetWindow
GetParent
GetFocus
PtInRect
InflateRect
OffsetRect
FillRect
GetWindowRect
GetKeyState
DrawTextA
CreatePopupMenu
GetMenuItemCount
ScreenToClient
OpenClipboard
GetSysColor
GetDesktopWindow
GetMessagePos
SetClipboardData
CloseClipboard
EmptyClipboard
CopyRect
EqualRect
DrawFocusRect
GetForegroundWindow
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
CreatePen
CreateSolidBrush
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetTextExtentPoint32A
MoveToEx
LineTo
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
CopyMetaFileA
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
CreateRectRgnIndirect
CreateBitmap
DeleteObject
CreateFontIndirectA
CreateCompatibleDC
CreateCompatibleBitmap
GetCurrentObject
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
CoRevokeClassObject
CoGetClassObject
OleFlushClipboard
OleIsCurrentClipboard
DoDragDrop
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
OleDuplicateData
ReleaseStgMedium
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
oleaut32
SystemTimeToVariantTime
SysFreeString
VarBstrFromDate
VarUdateFromDate
VarDateFromStr
SysStringLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringByteLen
OleCreateFontIndirect
SafeArrayDestroy
SysAllocString
VariantCopy
VariantTimeToSystemTime
Sections
.text Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ