D:\Windows\Desktop\Netrahook\x64\Release\Netrahook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Netrahook.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Netrahook.dll
Resource
win10v2004-20240802-en
General
-
Target
Netrahook.dll
-
Size
296KB
-
MD5
a3f5b33544861dfb0291d532d57f368a
-
SHA1
1bf52981a3603e7434a11812df723dbd13c51466
-
SHA256
b64f780b098dfbdf8fe84f3b674e56d082304c1a5072fc92309dadd528109b1e
-
SHA512
004e534be7c2c5442c14814cacdf86ac4e74dcc8ce03ca79c8d3fb97262beebf7d5ff4acbf576ad280cabace667bce388460fe6c72baa02052a258def0a3ebae
-
SSDEEP
6144:nz9L7kFkmShhwz7KcmeUT/tfP1i5Jr2AqVYzDvL7mylIgS+ShtYh7Dg/dVyBwcSK:VOXqVySbmBwF0nS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Netrahook.dll
Files
-
Netrahook.dll.dll windows:6 windows x64 arch:x64
9cb7e50598c25f02cfbc7e6a3f8d1db4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleHandleA
GetProcAddress
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapCreate
VirtualProtect
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Sleep
HeapReAlloc
CloseHandle
HeapAlloc
GetThreadContext
QueryPerformanceFrequency
FlushInstructionCache
SetThreadContext
OpenThread
DisableThreadLibraryCalls
CreateThread
AllocConsole
GlobalAlloc
InitializeSListHead
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GlobalUnlock
QueryPerformanceCounter
GlobalLock
GlobalFree
GetCurrentProcessId
user32
ClientToScreen
GetForegroundWindow
SetCursorPos
GetAsyncKeyState
CallWindowProcA
SetWindowLongPtrA
DestroyWindow
DefWindowProcA
CreateWindowExA
UnregisterClassA
RegisterClassExA
GetKeyState
LoadCursorA
ScreenToClient
IsChild
SetCapture
GetCursorPos
OpenClipboard
ReleaseCapture
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetCapture
GetClientRect
SetCursor
shell32
ShellExecuteA
imm32
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
d3dcompiler_47
D3DCompile
xinput1_4
ord4
ord2
msvcp140
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?good@ios_base@std@@QEBA_NXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?_Xinvalid_argument@std@@YAXPEBD@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memset
__C_specific_handler
memmove
memcpy
memchr
__current_exception_context
__current_exception
__std_exception_copy
__std_exception_destroy
strstr
__std_terminate
_CxxThrowException
__std_type_info_destroy_list
api-ms-win-crt-stdio-l1-1-0
_wfopen
fwrite
__stdio_common_vsprintf
fread
freopen_s
fseek
fclose
fflush
__acrt_iob_func
ftell
__stdio_common_vsscanf
api-ms-win-crt-string-l1-1-0
strncpy
strcmp
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-heap-l1-1-0
malloc
free
_callnewh
calloc
api-ms-win-crt-runtime-l1-1-0
_cexit
_initterm
_crt_atexit
_execute_onexit_table
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
terminate
_configure_narrow_argv
_invalid_parameter_noinfo_noreturn
_errno
_initterm_e
_wassert
_seh_filter_dll
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-math-l1-1-0
floorf
cosf
fmodf
sinf
sqrtf
ceilf
Sections
.text Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ