Static task
static1
Behavioral task
behavioral1
Sample
Neqqa D3D v2/Neqqa--V2-Hook.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Neqqa D3D v2/Neqqa--V2-Hook.dll
Resource
win10v2004-20240221-en
General
-
Target
a0ddb0e3b398d1b134cd8b1db43824fe
-
Size
832KB
-
MD5
a0ddb0e3b398d1b134cd8b1db43824fe
-
SHA1
459cbea57a065b33b6e76408011b98ee4515673d
-
SHA256
48ce02bf555990f0b7a6d09c80bbbace958d87d03f4ec55fdd27d7e18b14b372
-
SHA512
b70e810a567c27a71963c942b055f08e286335e3abcbf19b1d0a1d94330fa5035d09d6817360ba3f0b89a2be40515f78aa9641b31df05579330aed71e05a01e0
-
SSDEEP
12288:JRjWMgkbwbCDI4dlq1kOU0w6Hx/hI+4aoS1uP7frjukR+i8gWTj32c:rXBwW9c1nHphIdaohP7fT/Tsjt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Neqqa D3D v2/Neqqa--V2-Hook.dll
Files
-
a0ddb0e3b398d1b134cd8b1db43824fe.rar
-
Neqqa D3D v2/Neqqa--V2-Hook.dll.dll windows:5 windows x86 arch:x86
baa93d47220682c04d92f7797d9224ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 175KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 884KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhroerdu Size: 659KB - Virtual size: 660KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gggcpvtz Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE