EnHookWindow
Behavioral task
behavioral1
Sample
b41ad00f268a1bac593dc208bdb1b2f3db39c97eda27b2416dba8f2d7dedb1f6.dll
Resource
win7-20220812-en
General
-
Target
b41ad00f268a1bac593dc208bdb1b2f3db39c97eda27b2416dba8f2d7dedb1f6
-
Size
76KB
-
MD5
4647b594c09f6483bef831fd039a2110
-
SHA1
0f52c66c2d962c3775b28e6573c1bb6471d10bf2
-
SHA256
b41ad00f268a1bac593dc208bdb1b2f3db39c97eda27b2416dba8f2d7dedb1f6
-
SHA512
3368b570da619849c08b9164d1eaaa9cb59335806cf2a6e6bad627680e46cbf4903e124b96f8ad88df4dbd428ff2eecf49b91295d148bfc2002e6dcd1d04eeda
-
SSDEEP
768:HqXMZ5hEQJK2s8vklcDRNOB1HXc37YL5/c2PJAF/IbsEed0UKK4LI7C:uMAunRNw1c3S5k2PyFAbsgH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b41ad00f268a1bac593dc208bdb1b2f3db39c97eda27b2416dba8f2d7dedb1f6.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
Sections
UPX0 Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE