DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
8062c328b65783c0183fcc1b04d1fcf7494b7db1f714c0ae271f9cdf45ac7303.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8062c328b65783c0183fcc1b04d1fcf7494b7db1f714c0ae271f9cdf45ac7303.dll
Resource
win10v2004-20221111-en
Target
8062c328b65783c0183fcc1b04d1fcf7494b7db1f714c0ae271f9cdf45ac7303
Size
360KB
MD5
009a377f960e8986f17eb313c7e30d3b
SHA1
8a91baad1f7159f15dd70a3f41c30c2e2d70ae50
SHA256
8062c328b65783c0183fcc1b04d1fcf7494b7db1f714c0ae271f9cdf45ac7303
SHA512
21d41a141da2501feebd2fe90692f8362a8b27a0d4b1664447e5f6858ca61d46a52cbb61bb97b8e89b93e9d074ed8253e595b4bd6a723d2aa2862ba7d65f33ff
SSDEEP
6144:WgLHUgZfOnsD/Z7NZejt4Pp4pJlrInQuIgVH4dLwvZ2D7O0X+a:WJ1i/Z7n+lzuIgeQ2DC0X+a
Processes:
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE