d3dnetWan
Static task
static1
Behavioral task
behavioral1
Sample
74641019e007df0ee9d32eabf7b59d3f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74641019e007df0ee9d32eabf7b59d3f.dll
Resource
win10v2004-20231222-en
General
-
Target
74641019e007df0ee9d32eabf7b59d3f
-
Size
144KB
-
MD5
74641019e007df0ee9d32eabf7b59d3f
-
SHA1
bf71618a315f548588ae82690e69db4bca240780
-
SHA256
1c1552e0dc907b0af95d26dffe08edee896f40922ba60f137d1d03de3a8672a4
-
SHA512
2efeb2a3da839e7be527cbb518757e26425989c06b5cb3a1aae6c84b58f7fedd15e1512cef696a64922865134618123459ce7a713490b952e39e3bbfa457f1f0
-
SSDEEP
3072:ShaBOM0bWUHurCbs1bEVW5rN34ZiXc/o9ctiKFq7hIMtFs:QaREWUHurCIH5d4kgVtiTOKs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74641019e007df0ee9d32eabf7b59d3f
Files
-
74641019e007df0ee9d32eabf7b59d3f.dll windows:4 windows x86 arch:x86
ae62217a737ea8011f6d7a93883aed75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateDirectoryA
GetComputerNameA
InterlockedIncrement
HeapAlloc
InterlockedCompareExchange
SetLastError
OpenEventA
LeaveCriticalSection
GetTickCount
GlobalFree
CreateProcessA
GlobalAlloc
GetVolumeInformationA
CreateFileMappingA
GetProcAddress
WriteProcessMemory
TerminateProcess
GetModuleHandleA
WaitForSingleObject
CreateFileA
LocalFree
GetCommandLineA
LoadLibraryA
CopyFileA
WriteFile
HeapFree
EnterCriticalSection
ExitProcess
GetLastError
MapViewOfFile
CreateMutexW
GetProcessHeap
ReadProcessMemory
GetModuleFileNameA
InterlockedDecrement
OpenFileMappingA
CreateEventA
Sleep
GetCurrentProcess
UnmapViewOfFile
CloseHandle
ole32
CoInitialize
CoSetProxyBlanket
OleSetContainedObject
CoCreateGuid
CoCreateInstance
OleCreate
CoUninitialize
CoTaskMemAlloc
user32
SetWindowLongA
UnhookWindowsHookEx
GetClassNameA
GetWindow
CreateWindowExA
GetMessageA
DestroyWindow
GetWindowThreadProcessId
ClientToScreen
DefWindowProcA
SetTimer
GetWindowLongA
RegisterWindowMessageA
GetSystemMetrics
DispatchMessageA
TranslateMessage
PostQuitMessage
SetWindowsHookExA
PeekMessageA
GetParent
GetCursorPos
FindWindowA
KillTimer
ScreenToClient
SendMessageA
oleaut32
SysFreeString
SysStringLen
SysAllocString
SysAllocStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
DuplicateTokenEx
RegSetValueExA
GetUserNameA
SetTokenInformation
OpenProcessToken
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ