DAConn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
DAConn.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
DAConn.dll
Resource
win10v2004-20240508-en
General
-
Target
DAConn.dll
-
Size
53KB
-
MD5
d7e50409cb93acd8bfb4169f12635ac4
-
SHA1
9752faf18c17542fd904ce7bbee382c2af754908
-
SHA256
5dfa615a48feb8e58edd9040b779eadf8aaaf3e793bcec5b0dc78547ac5ae8ac
-
SHA512
e89d8e92021c716ba1e67e761924ff253914ae2feabfdc61cc5af77251fdaca44b09f0d2dd8e1fe561a1c20a0993ae87950586527d7abe89493f5f9f282ebe39
-
SSDEEP
768:8XjNRmcpwzkYwxSH6D5YlnhWi68V5n07+wSkrvyRIRDUoZwLSTF7FA:8Gc1qhkiVjIRDUoZwLiF7FA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DAConn.dll
Files
-
DAConn.dll.dll windows:6 windows x64 arch:x64
22bf12fef6be8df1ddd68f6845aa5f21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_CxxThrowException
memcpy_s
free
malloc
_purecall
??2@YAPEAX_K@Z
memset
__C_specific_handler
_XcptFilter
_amsg_exit
_initterm
__CxxFrameHandler3
??1type_info@@UEAA@XZ
_lock
_unlock
__dllonexit
_onexit
??3@YAXPEAX@Z
__RTDynamicCast
memcpy
ntdll
EtwTraceMessage
RtlInitString
NtAllocateLocallyUniqueId
EtwGetTraceLoggerHandle
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WinSqmIncrementDWORD
WinSqmAddToStreamEx
EtwUnregisterTraceGuids
EtwRegisterTraceGuidsW
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
ResolveDelayLoadedAPI
DelayLoadFailureHook
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
GetLastError
CloseHandle
GetCurrentProcess
LockResource
LoadResource
FindResourceExW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
SizeofResource
InitializeCriticalSection
GetSystemTimeAsFileTime
FormatMessageW
LocalFree
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
advapi32
OpenProcessToken
GetTokenInformation
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
LsaNtStatusToWinError
RegOpenKeyExW
credui
SspiPromptForCredentialsW
CredUIPromptForWindowsCredentialsW
ole32
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
secur32
LsaFreeReturnBuffer
LsaLogonUser
LsaLookupAuthenticationPackage
LsaConnectUntrusted
LsaDeregisterLogonProcess
shell32
ShellExecuteExW
shlwapi
ord260
user32
GetParent
SetPropW
RemovePropW
GetPropW
UnregisterClassA
SendMessageW
dui70
?_ZeroRelease@Value@DirectUI@@AEAAXXZ
?SetCheckedState@TouchCheckBox@DirectUI@@QEAAJW4CheckedStateFlags@2@@Z
?Click@TouchButton@DirectUI@@SA?AVUID@@XZ
?GetCheckedState@TouchCheckBox@DirectUI@@QEAA?AW4CheckedStateFlags@2@XZ
?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z
StrToID
?ContentProp@Element@DirectUI@@SAPEBUPropertyInfo@2@XZ
?CreateString@Value@DirectUI@@SAPEAV12@PEBGPEAUHINSTANCE__@@@Z
?VisibleProp@Element@DirectUI@@SAPEBUPropertyInfo@2@XZ
?CreateBool@Value@DirectUI@@SAPEAV12@_N@Z
?SetValue@Element@DirectUI@@QEAAJP6APEBUPropertyInfo@2@XZHPEAVValue@2@@Z
?LayoutPosProp@Element@DirectUI@@SAPEBUPropertyInfo@2@XZ
?CreateInt@Value@DirectUI@@SAPEAV12@HW4DynamicScaleValue@@@Z
ncaapi
NcaToggleNamePreferenceState
Exports
Exports
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ