Main
Static task
static1
Behavioral task
behavioral1
Sample
netid3504117486.dll0.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
netid3504117486.dll0.dll
Resource
win10v2004-20230220-en
General
-
Target
netid3504117486.dll0.exe
-
Size
2.6MB
-
MD5
6f47723e5fc6e96ab5e9f96f6bc585fa
-
SHA1
04e3be2ff570eb1a479925560103af5d22961983
-
SHA256
0501d09a219131657c54dba71faf2b9d793e466f2c7fdf6b0b3c50ec5b866b2a
-
SHA512
08a56a06e12a23ffdfc1eeed274bba2c1cee86270e6460114cc20355f05d27d99e92a0ea680a2f257675d6c368dfc72a41b901a837c85a505b1b87acae5d9e96
-
SSDEEP
49152:fHmIFSMstNtL02iEIbr7xZRusy0kIwPUqS1OW56QcHP3EZ:ffSMIs21u7XMp6d2/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource netid3504117486.dll0.exe
Files
-
netid3504117486.dll0.exe.dll windows x64
b972ea4141876a70af0b29439e13e425
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcessId
CreateThread
GetCurrentThread
CreateProcessA
ProcessIdToSessionId
GetComputerNameExA
GetModuleFileNameA
lstrcpyA
lstrcatA
VerifyVersionInfoW
GetProcAddress
LoadLibraryA
MultiByteToWideChar
CreateFileW
GetCurrentProcess
Sleep
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
CloseHandle
WriteFile
ReadFile
FindNextFileA
FindFirstFileA
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetStdHandle
SetFilePointerEx
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FindClose
CreateFileA
VerSetConditionMask
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFileAttributesExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
InterlockedFlushSList
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlUnwind
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
WriteConsoleW
advapi32
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
DuplicateToken
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExW
RegCloseKey
FreeSid
OpenThreadToken
ws2_32
WSACleanup
WSAAccept
WSAStartup
gethostbyname
socket
send
recv
listen
htons
htonl
connect
closesocket
bind
inet_ntoa
dnsapi
DnsQuery_A
DnsFree
winhttp
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpSetOption
WinHttpGetIEProxyConfigForCurrentUser
WinHttpWriteData
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
WinHttpQueryDataAvailable
Exports
Exports
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.}JJ Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ