Windows
Analysis Report
ctGrid.dll
Overview
General Information
Detection
Score: | 24 |
Range: | 0 - 100 |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
loaddll32.exe (PID: 7820 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\ctG rid.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618) conhost.exe (PID: 7828 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7872 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\ctG rid.dll",# 1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) rundll32.exe (PID: 7896 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\ctGr id.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679) regsvr32.exe (PID: 7880 cmdline:
regsvr32.e xe /s C:\U sers\user\ Desktop\ct Grid.dll MD5: 878E47C8656E53AE8A8A21E927C6F7E0) rundll32.exe (PID: 7904 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ctGri d.dll,DllC anUnloadNo w MD5: 889B99C52A60DD49227C5E485A016679) rundll32.exe (PID: 7964 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ctGri d.dll,DllG etClassObj ect MD5: 889B99C52A60DD49227C5E485A016679) WerFault.exe (PID: 8036 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 964 -s 628 MD5: C31336C1EFC2CCB44B4326EA793040F2) rundll32.exe (PID: 8176 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ctGri d.dll,DllR egisterSer ver MD5: 889B99C52A60DD49227C5E485A016679)
- cleanup
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
Source: | Static PE information: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Process created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 1 Regsvr32 | OS Credential Dumping | 21 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Rundll32 | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Virtualization/Sandbox Evasion | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 12 Process Injection | NTDS | 1 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1675266 |
Start date and time: | 2025-04-27 03:11:20 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 3s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 22 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | ctGrid.dllrenamed because original name is a hash value |
Original Sample Name: | ctGrid.ocx |
Detection: | SUS |
Classification: | sus24.winDLL@15/5@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, W erFault.exe, WMIADAP.exe, SIHC lient.exe, SgrmBroker.exe, con host.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 20.189.173.20, 20. 190.190.196, 184.29.183.29, 4. 175.87.197 - Excluded domains from analysis
(whitelisted): a-ring-fallbac k.msedge.net, fs.microsoft.com , login.live.com, slscr.update .microsoft.com, blobcollector. events.data.trafficmanager.net , onedsblobprdwus15.westus.clo udapp.azure.com, ctldl.windows update.com, umwatson.events.da ta.microsoft.com, c.pki.goog, fe3cr.delivery.mp.microsoft.co m - Not all processes where analyz
ed, report is missing behavior information - Report size exceeded maximum c
apacity and may have missing b ehavior information.
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8567293781509391 |
Encrypted: | false |
SSDEEP: | 96:Vv9FKVp6i60hVyBsj94sF+wfFQXIDcQvc6QcEVcw3cE/O/a/z+HbHg/BQAS/YyNG:3c+ipOBP0BU/wjeTqzuiFJZ24IO8dci |
MD5: | B12AE9093847FBDA5D39E0291542C576 |
SHA1: | 1908F710AD54F20023C651860D62FB68F4CC0758 |
SHA-256: | 3BD6E0275C99AD9D09980DECB5808A777A314BD9D2B5EA43C99FBB58011D1EBD |
SHA-512: | 13463953E6020F5244D3BF234FA8679AF6FBB9AD2CDAA35D2D2678C92EA13C2674672A1B39F9CE1D87F2462F66EB411EEF1CD161C700DD1D485140386ECED067 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 43570 |
Entropy (8bit): | 1.9175010459802304 |
Encrypted: | false |
SSDEEP: | 192:1vb7EPTnJTarsdcO5H4VIWDfAdbzjDfr9n2XOzBFc:pbgPUst5H2IWD6zDfXfc |
MD5: | 647B12BAB879AE24155FAC30E3E54087 |
SHA1: | 68D3D267BF1944114BC9B7A659D86A9E19158FA9 |
SHA-256: | 5E77EDF27939CA9151D783B7FD774543090229614ABCF9AB21C4D8628A8D98B4 |
SHA-512: | 7AD4B9E7B95A119B0F84708FB2816AA92304D087BFC03EBC49A5E44E685E2CDF84AD3121511526FC3DDBD22A4FA1DCEC12F887A48B463CB1926862B71EE53893 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8258 |
Entropy (8bit): | 3.692976004526635 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ5Z6IMhht6Y/R6x8gmfT5zprO89b7xXsfEJhm:R6lXJH6IMhht6YJ66gmfT5JdcfB |
MD5: | E2B9AA28601DF5EF7DC2F820266429E2 |
SHA1: | 5A912121CE9E445D83C3116806826F6D0223EF9D |
SHA-256: | FD279EED7E1DF4DA4E5F2AFED4B6CB98EA7D39CCE40619E9AE35ADABDDFBB17B |
SHA-512: | 45F0248D315FEEFA68B3494509205AAF83ED38E03D205F9E967977B5C62FB198F9A00A765C4FA7B74DB15458C019F4F1B7D1526227F65CCF5A0271D8BF2A0A98 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4646 |
Entropy (8bit): | 4.470529928322202 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsbJg77aI9F/mWpW8VY1Ym8M4JCdPs5FJvr+q8/EScGScSAd:uIjf1I7r/n7VpJLNzPrJ3Ad |
MD5: | A010E8AC45B13059B5F1B62B004A39D6 |
SHA1: | 6953AD20CD2D394EF414C071609D192F3E758E67 |
SHA-256: | 5293205E1A49EFE069A53F4BF5EFAE2AD39630C87F93B29E8BDA40F5ADAFC251 |
SHA-512: | B20EB3449D85C78F269EF16C070C9AA5ED877DB39F492305934A83E0DF266BA8D7A19E3DB971615F2A511CBC20EB93E19D07C91938A9DFF6607E37625DBD92C5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.469414147123369 |
Encrypted: | false |
SSDEEP: | 6144:bIXfpi67eLPU9skLmb0b4QWSPKaJG8nAgejZMMhA2gX4WABlVuNNdwBCswSbf:8XD94QWlLZMM6YFUX+f |
MD5: | 957955E08B0519D999F2B065EC64DEFE |
SHA1: | 3FB75E128560DE6F8B9C51DE3934B36DA93E1717 |
SHA-256: | 59B341CF3103A0BD4B986E23796C9DD42E2623508DE035E2A7F8FE23D98F7C96 |
SHA-512: | 4262350F0F2732865D32CC6521648804A5C3E88F5949AB91C2B731AF87ABD6AAA97109D5D752E6C4D0AA6C03E692A615E632B2CED74F89D98A6D8BAD145574CD |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.186874316616049 |
TrID: |
|
File name: | ctGrid.dll |
File size: | 593'552 bytes |
MD5: | 038601a507d1b740da8a8a2a577ff72a |
SHA1: | c11932be2f3af0730cf934ab65e0bfe22e373a9c |
SHA256: | 0fbd08b76c1f436f733e76bd6a974062d71e5e9bc6ed103b7aa24996a0980eae |
SHA512: | fffe253b8134761e278758db08b94a27eeb55fbac3ba6c22e3eca25e8e00ef998cac001ae331a93381301b02f8c3f3e35a472f7cc711fd299aec49f3b1e84ab2 |
SSDEEP: | 6144:eRGaYcAsY58tME8aaKSISh0mx3vdhDPLVVuPAOp9cvH1SVxZ2n4XgDOwBD1TogHq:e7MdhbpMPAYw03G1fHMuTGMNIAAuny |
TLSH: | 25C45C51BD9601E6C70D263414EA333E7B7DAAD94F388F87A354EE3E2872191B836315 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e',..I...I...I..&B...I...Z...I.7$C...I...I...I...Z...I...B...I.K.G...I...C...I...M...I..%B...I..%M...I...H...I..'B...I...O...I |
Icon Hash: | 92a7aba5ab93d38a |
Entrypoint: | 0x1005b641 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x10000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL |
DLL Characteristics: | |
Time Stamp: | 0x3D471079 [Tue Jul 30 22:17:29 2002 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 002ac8523ac8c96b00990958b42f6781 |
Signature Valid: | false |
Signature Issuer: | CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at https://www.verisign.com/rpa (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US |
Signature Validation Error: | A certificate was explicitly revoked by its issuer |
Error Number: | -2146762484 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 24A200C10111A8890FCDEDDF15320496 |
Thumbprint SHA-1: | 1FDA42DC128D4B8AFE67959C226D4DEAE1532D27 |
Thumbprint SHA-256: | 1E532B65C1A33E101058C0747BE25F9B78E6BEFE400E2470C70CE5EC6B24DDF5 |
Serial: | 257079DAE8277574406525D6D95175B7 |
Instruction |
---|
push ebp |
mov ebp, esp |
push ebx |
mov ebx, dword ptr [ebp+08h] |
push esi |
mov esi, dword ptr [ebp+0Ch] |
push edi |
mov edi, dword ptr [ebp+10h] |
test esi, esi |
jne 00007FAF04AFCEFBh |
cmp dword ptr [100761ECh], 00000000h |
jmp 00007FAF04AFCF18h |
cmp esi, 01h |
je 00007FAF04AFCEF7h |
cmp esi, 02h |
jne 00007FAF04AFCF14h |
mov eax, dword ptr [10074A4Ch] |
test eax, eax |
je 00007FAF04AFCEFBh |
push edi |
push esi |
push ebx |
call eax |
test eax, eax |
je 00007FAF04AFCEFEh |
push edi |
push esi |
push ebx |
call 00007FAF04AFCE0Ah |
test eax, eax |
jne 00007FAF04AFCEF6h |
xor eax, eax |
jmp 00007FAF04AFCF40h |
push edi |
push esi |
push ebx |
call 00007FAF04AFCA5Bh |
cmp esi, 01h |
mov dword ptr [ebp+0Ch], eax |
jne 00007FAF04AFCEFEh |
test eax, eax |
jne 00007FAF04AFCF29h |
push edi |
push eax |
push ebx |
call 00007FAF04AFCDE6h |
test esi, esi |
je 00007FAF04AFCEF7h |
cmp esi, 03h |
jne 00007FAF04AFCF18h |
push edi |
push esi |
push ebx |
call 00007FAF04AFCDD5h |
test eax, eax |
jne 00007FAF04AFCEF5h |
and dword ptr [ebp+0Ch], eax |
cmp dword ptr [ebp+0Ch], 00000000h |
je 00007FAF04AFCF03h |
mov eax, dword ptr [10074A4Ch] |
test eax, eax |
je 00007FAF04AFCEFAh |
push edi |
push esi |
push ebx |
call eax |
mov dword ptr [ebp+0Ch], eax |
mov eax, dword ptr [ebp+0Ch] |
pop edi |
pop esi |
pop ebx |
pop ebp |
retn 000Ch |
int3 |
int3 |
push FFFFFFFFh |
push eax |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov eax, dword ptr [esp+0Ch] |
mov dword ptr fs:[00000000h], esp |
mov dword ptr [esp+0Ch], ebp |
lea ebp, dword ptr [esp+0Ch] |
push eax |
ret |
int3 |
jmp dword ptr [1006281Ch] |
jmp dword ptr [00000040h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x71aa0 | 0xa3 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x709a8 | 0xc8 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x77000 | 0x13870 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x90000 | 0xe90 | .reloc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x8b000 | 0x5df0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x62000 | 0x960 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x60de6 | 0x61000 | 8d7b128c22e17e02822a0d36a672b31c | False | 0.4664369563466495 | data | 6.397069157733135 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x62000 | 0xfb43 | 0x10000 | e08df169aae91191b595b24e6dd09d7d | False | 0.29486083984375 | data | 4.375421416506259 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x72000 | 0x420c | 0x3000 | 5a4aba5fe0b4826cacedc6f8e3c15b3b | False | 0.3429361979166667 | data | 4.733158304735189 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x77000 | 0x13870 | 0x14000 | 2a74df9392289d89b5321d30010279ef | False | 0.31199951171875 | data | 4.3552705263421 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x8b000 | 0x6ef4 | 0x7000 | a13e743e4468c5c1eac89d62b3e57c9a | False | 0.505615234375 | data | 6.006219877513674 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
TYPELIB | 0x7ef50 | 0xb680 | data | English | United States | 0.3535958904109589 |
RT_CURSOR | 0x7ecb0 | 0x134 | data | English | United States | 0.34415584415584416 |
RT_CURSOR | 0x7ee00 | 0x134 | data | English | United States | 0.37337662337662336 |
RT_BITMAP | 0x788a0 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120 | English | United States | 0.39285714285714285 |
RT_BITMAP | 0x78980 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.49038461538461536 |
RT_BITMAP | 0x78a50 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.5817307692307693 |
RT_BITMAP | 0x78b20 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.4519230769230769 |
RT_BITMAP | 0x78bf0 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.5048076923076923 |
RT_BITMAP | 0x78cc0 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.42788461538461536 |
RT_BITMAP | 0x78d90 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.4855769230769231 |
RT_ICON | 0x77e68 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | English | United States | 0.17876344086021506 |
RT_ICON | 0x78150 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128 | English | United States | 0.38513513513513514 |
RT_ICON | 0x782a0 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | English | United States | 0.42876344086021506 |
RT_ICON | 0x785a0 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | English | United States | 0.3897849462365591 |
RT_DIALOG | 0x78e60 | 0x33e | data | English | United States | 0.4771084337349398 |
RT_DIALOG | 0x791a0 | 0x500 | data | English | United States | 0.38203125 |
RT_DIALOG | 0x796a0 | 0x2fa | data | English | United States | 0.46981627296587924 |
RT_DIALOG | 0x799a0 | 0x68a | data | English | United States | 0.3094384707287933 |
RT_DIALOG | 0x7a030 | 0x33a | data | English | United States | 0.39588377723970947 |
RT_DIALOG | 0x7a370 | 0x844 | data | English | United States | 0.3497164461247637 |
RT_DIALOG | 0x7abb8 | 0x55e | data | English | United States | 0.33260553129548764 |
RT_DIALOG | 0x7b118 | 0x616 | data | English | United States | 0.36777920410783055 |
RT_DIALOG | 0x7b730 | 0x47c | data | English | United States | 0.39285714285714285 |
RT_DIALOG | 0x7bbb0 | 0x97a | data | English | United States | 0.3281121187139324 |
RT_DIALOG | 0x7c530 | 0x66c | data | English | United States | 0.3150851581508516 |
RT_DIALOG | 0x7cba0 | 0x428 | data | English | United States | 0.35714285714285715 |
RT_DIALOG | 0x7cfc8 | 0x12e | data | English | United States | 0.6158940397350994 |
RT_DIALOG | 0x7d720 | 0x658 | data | English | United States | 0.416871921182266 |
RT_DIALOG | 0x7d0f8 | 0x8a | data | English | United States | 0.8043478260869565 |
RT_DIALOG | 0x7d188 | 0x86 | data | English | United States | 0.7985074626865671 |
RT_DIALOG | 0x7d210 | 0x50c | data | English | United States | 0.4434984520123839 |
RT_DIALOG | 0x7dd78 | 0x1b6 | data | English | United States | 0.5707762557077626 |
RT_STRING | 0x8a5d0 | 0x6c | Targa image data 105 x 100 x 32 +71 +114 | English | United States | 0.6111111111111112 |
RT_STRING | 0x8a640 | 0xac | Matlab v4 mat-file (little endian) e, numeric, rows 0, columns 0 | English | United States | 0.4186046511627907 |
RT_STRING | 0x8a6f0 | 0x154 | data | English | United States | 0.38529411764705884 |
RT_STRING | 0x8a848 | 0x28 | data | English | United States | 0.45 |
RT_GROUP_CURSOR | 0x7ede8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x7ef38 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_ICON | 0x78278 | 0x22 | data | English | United States | 1.0 |
RT_GROUP_ICON | 0x78588 | 0x14 | data | English | United States | 1.25 |
RT_GROUP_ICON | 0x78888 | 0x14 | data | English | United States | 1.2 |
RT_VERSION | 0x77a70 | 0x3f4 | data | English | United States | 0.4298418972332016 |
None | 0x7e148 | 0x317 | data | English | United States | 0.48419721871049304 |
None | 0x7df30 | 0x217 | Targa image data - Mono 25932 x 29798 x 32 +8240 +8237 - 10-bit alpha - interleave "ustify" | English | United States | 0.3981308411214953 |
None | 0x7e988 | 0xb1 | data | English | United States | 0.5988700564971752 |
None | 0x7e460 | 0x2a6 | data | English | United States | 0.40412979351032446 |
None | 0x7e708 | 0x1e9 | data | English | United States | 0.4110429447852761 |
None | 0x7e8f8 | 0x8e | Targa image data - Mono (4356-0) 25932 x 29798 x 32 +8240 +8237 - 10-bit alpha - interleave "ustify" | English | United States | 0.5070422535211268 |
None | 0x7ea40 | 0x21b | data | English | United States | 0.49907235621521334 |
None | 0x7ec60 | 0x4b | data | English | United States | 0.8266666666666667 |
DLL | Import |
---|---|
MFC42.DLL | |
MSVCRT.dll | _wsplitpath, _mbsnbcpy, _mbsicmp, localtime, _ftol, sprintf, _mbscmp, _CxxThrowException, atol, __dllonexit, __CxxFrameHandler, time, atof, wcsncpy, wcslen, toupper, isalpha, _onexit, ??1type_info@@UAE@XZ, _except_handler3, ?terminate@@YAXXZ, free, _initterm, malloc, _adjust_fdiv |
KERNEL32.dll | GlobalAlloc, GlobalLock, IsDBCSLeadByte, GlobalFree, InterlockedIncrement, GlobalUnlock, lstrlenA, LocalAlloc, FormatMessageA, GetLastError, MultiByteToWideChar, WideCharToMultiByte, LocalFree, InterlockedDecrement |
USER32.dll | MessageBoxA, IsWindowVisible, PeekMessageA, MessageBeep, LoadBitmapA, DrawFocusRect, SetRectEmpty, SetScrollPos, SetScrollRange, GetScrollRange, GetFocus, TranslateMessage, DispatchMessageA, GetWindowRect, PtInRect, LoadCursorA, SetCursor, EnableWindow, GetScrollPos, GetSysColor, wsprintfA, GetKeyState, FillRect, SendMessageA, GetDC, ReleaseDC, ReleaseCapture, GetSystemMetrics, SetCapture, SetTimer, ScreenToClient, InvalidateRect, KillTimer, GetClientRect, GetCursorPos, FindWindowA, WindowFromPoint, CopyRect, UpdateWindow, GetCapture, InflateRect, GetParent, PostMessageA |
GDI32.dll | DeleteObject, SelectObject, CreateFontIndirectA, Polygon, Rectangle, GetObjectA, CreatePen, CreateSolidBrush, CreatePatternBrush, SetPixel, CreateCompatibleBitmap, CreateCompatibleDC, Ellipse, Polyline, Arc, BitBlt, StretchBlt, CreateBitmap, DeleteDC, EndDoc, EndPage, StartPage, StartDocA, SetAbortProc, GetDeviceCaps |
SHELL32.dll | ShellExecuteA |
ole32.dll | OleRun, CoCreateInstance, CreateStreamOnHGlobal |
OLEPRO32.DLL | |
OLEAUT32.dll | SysAllocString, SysStringByteLen, SysAllocStringByteLen, SysFreeString, VariantInit, VariantCopy, VariantClear, VariantChangeType, SysStringLen, LoadRegTypeLib, GetErrorInfo |
Name | Ordinal | Address |
---|---|---|
DllCanUnloadNow | 1 | 0x1005ba2e |
DllGetClassObject | 2 | 0x1005ba00 |
DllRegisterServer | 3 | 0x10022930 |
DllUnregisterServer | 4 | 0x10022ac0 |
Description | Data |
---|---|
Comments | |
CompanyName | DBI Technologies Inc. |
FileDescription | ctGrid ActiveX Control Module |
FileVersion | 2, 0, 1, 0 |
InternalName | ctGrid |
LegalCopyright | Copyright (C) 2002 DBI Technologies Inc. |
LegalTrademarks | |
OLESelfRegister | $$ |
OriginalFilename | ctGrid.OCX |
PrivateBuild | |
ProductName | ctGrid ActiveX Control Module |
ProductVersion | 2, 0, 1, 0 |
SpecialBuild | |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 21:12:15 |
Start date: | 26/04/2025 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf20000 |
File size: | 126'464 bytes |
MD5 hash: | 51E6071F9CBA48E79F10C84515AAE618 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 21:12:15 |
Start date: | 26/04/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 21:12:15 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 21:12:15 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\regsvr32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb30000 |
File size: | 20'992 bytes |
MD5 hash: | 878E47C8656E53AE8A8A21E927C6F7E0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 21:12:15 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x810000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 21:12:15 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x810000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 21:12:18 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x810000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 21:12:18 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9d0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 21:12:21 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x810000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |