Static task
static1
Behavioral task
behavioral1
Sample
0168afcede8edb6f8545ee0240616a327239e99403a00a91849cb0be0c801983.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0168afcede8edb6f8545ee0240616a327239e99403a00a91849cb0be0c801983.exe
Resource
win10v2004-20240508-en
General
-
Target
0168afcede8edb6f8545ee0240616a327239e99403a00a91849cb0be0c801983
-
Size
1.9MB
-
MD5
9e02ad4bd5e4a6715470092c69e7b661
-
SHA1
9c12cbf43894f9e8da5ff4a820ea280b12df6d95
-
SHA256
0168afcede8edb6f8545ee0240616a327239e99403a00a91849cb0be0c801983
-
SHA512
d296c42b5f07867ecd27bd7891397d98c092c29cbcba1e6c36727b7d8b1fb54f718855d14fa06655b6bb182725f33c4d9f2ecd7f418aa8f2620782d5134541af
-
SSDEEP
49152:8t2c7TFi/pa7ISfRS6X2XPzbNa7WBBz0+:E2cXo/uISfXKl8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0168afcede8edb6f8545ee0240616a327239e99403a00a91849cb0be0c801983
Files
-
0168afcede8edb6f8545ee0240616a327239e99403a00a91849cb0be0c801983.exe windows:1 windows x86 arch:x86
ddbd18c48c94b6501d8922c0ad108f9d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
vabidate
??0cProgram@@QAE@PAD@Z
?ProgGebruik@cProgram@@QAEKXZ
?CheckNum@cProgram@@QAEFXZ
?BedrijfNaam@cProgram@@QAEPADXZ
?MagProg@cProgram@@QAEHH@Z
?LidNummer@cProgram@@QAEGXZ
??1cProgram@@QAE@XZ
kernel32
VirtualAlloc
VirtualFree
RtlUnwind
GetPrivateProfileStringA
ExitProcess
UnhandledExceptionFilter
GetTickCount
CreateSemaphoreA
ReleaseSemaphore
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcessId
SystemTimeToFileTime
SetEndOfFile
SetHandleCount
SetConsoleCtrlHandler
GetConsoleMode
ReadConsoleA
SetConsoleMode
GetFileType
FileTimeToSystemTime
SetEnvironmentVariableA
FreeEnvironmentStringsA
GetEnvironmentStrings
RaiseException
SetUnhandledExceptionFilter
GetCommandLineA
GetLocalTime
MoveFileA
DeleteFileA
GetStdHandle
EnterCriticalSection
CreateThread
ResumeThread
LeaveCriticalSection
ExitThread
GetFileAttributesA
GetFileTime
FileTimeToLocalFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetVolumeInformationA
_lclose
GetFullPathNameA
SetVolumeLabelA
FindResourceA
LoadResource
LockResource
FreeResource
GlobalHandle
GlobalFree
GetProfileStringA
GetProfileIntA
GetLocaleInfoW
GetCurrentThreadId
GetSystemTime
SetFilePointer
WriteFile
GetVersion
GetModuleHandleA
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
CreateFileA
GetFileSize
ReadFile
SetCurrentDirectoryA
GetCurrentDirectoryA
FindNextFileA
GetDriveTypeA
FileTimeToDosDateTime
GetTimeZoneInformation
CreateDirectoryA
RemoveDirectoryA
FindFirstFileA
FindClose
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
GetLastError
GetExitCodeProcess
CloseHandle
OpenFile
GetModuleFileNameA
CreateMutexA
WaitForSingleObject
ReleaseMutex
HeapAlloc
GetProcessHeap
HeapFree
user32
IsClipboardFormatAvailable
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetCaretPos
CreateMenu
SetMenu
DrawMenuBar
GetSystemMenu
DestroyCursor
CreateCursor
TrackPopupMenu
PostQuitMessage
TranslateMDISysAccel
SetActiveWindow
TranslateMessage
DispatchMessageA
GetSubMenu
AppendMenuA
SystemParametersInfoA
DestroyIcon
FrameRect
FillRect
DrawTextA
CreateIcon
GetWindow
SetTimer
KillTimer
GetUpdateRect
SetCursorPos
GetDesktopWindow
WindowFromPoint
GetCapture
GetWindowThreadProcessId
IsWindowEnabled
DefMDIChildProcA
GetClassInfoA
DrawFocusRect
HideCaret
ShowCaret
CallNextHookEx
LoadIconA
SetWindowsHookExA
UnhookWindowsHookEx
PeekMessageA
GetMessageA
CreatePopupMenu
ModifyMenuA
GetFocus
SetWindowLongA
DefWindowProcA
PostMessageA
EnableMenuItem
BeginPaint
DrawIcon
EndPaint
SetFocus
GetWindowLongA
BringWindowToTop
CallWindowProcA
RegisterClassA
CreateWindowExA
DefFrameProcA
SetScrollRange
SetScrollPos
ScrollWindow
UpdateWindow
DestroyMenu
DeleteMenu
CheckMenuItem
DestroyWindow
ShowWindow
GetSysColor
GrayStringA
LoadBitmapA
GetDC
GetWindowDC
ReleaseDC
SendMessageA
MessageBeep
EnableWindow
wsprintfA
MessageBoxA
WinHelpA
InvalidateRect
GetClientRect
GetCursorPos
ScreenToClient
GetKeyboardState
SetCapture
ReleaseCapture
LoadCursorA
SetCursor
SetWindowPos
GetSystemMetrics
FindWindowA
IsWindow
GetWindowRect
ClientToScreen
MoveWindow
gdi32
CreatePalette
SelectPalette
RealizePalette
CreateFontA
GetPixel
Ellipse
Pie
Arc
MoveToEx
LineTo
SetPixel
CreatePen
Polygon
Polyline
SetPolyFillMode
SetROP2
CreateRectRgn
CreatePatternBrush
SelectClipRgn
GetClipBox
CreateCompatibleBitmap
CreateBitmap
GetBitmapBits
CreateSolidBrush
UnrealizeObject
SetBrushOrgEx
GetStockObject
GetBkColor
GetBkMode
SetBkMode
SetTextColor
SetBkColor
GetObjectA
CreateDIBitmap
CreateCompatibleDC
StretchBlt
BitBlt
TextOutA
GetTextExtentPointA
StartDocA
EndDoc
DeleteDC
StartPage
EndPage
CreateDCA
SetGraphicsMode
SetViewportOrgEx
DPtoLP
GetTextMetricsA
CreateFontIndirectA
SetMapMode
SetWindowExtEx
GetDeviceCaps
SetViewportExtEx
SetWindowOrgEx
DeleteObject
SetTextJustification
GetTextExtentPoint32A
SelectObject
SaveDC
SetStretchBltMode
StretchDIBits
RestoreDC
comdlg32
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
PrintDlgA
ChooseFontA
ChooseColorA
comctl32
ord17
winspool.drv
EnumPrintersA
shell32
SHGetMalloc
SHBrowseForFolder
SHGetPathFromIDList
SHFileOperationA
wsock32
WSACancelBlockingCall
WSAStartup
WSACleanup
socket
connect
closesocket
gethostbyname
htons
send
recv
advapi32
GetUserNameA
Sections
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_TEXT Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT$XIA Size: 325KB - Virtual size: 688KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ