Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Behavioral task
behavioral1
Sample
b9a7c0c4d68ad5c944e46d1f83d87c32c80229f3df80a9e5940e7916dca2a5f1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9a7c0c4d68ad5c944e46d1f83d87c32c80229f3df80a9e5940e7916dca2a5f1.dll
Resource
win10v2004-20220812-en
Target
b9a7c0c4d68ad5c944e46d1f83d87c32c80229f3df80a9e5940e7916dca2a5f1
Size
44KB
MD5
be576b881f311dacd2ea38a3afea3530
SHA1
00764a30953932ae8db4ecdc22ae7fb0c422dae1
SHA256
b9a7c0c4d68ad5c944e46d1f83d87c32c80229f3df80a9e5940e7916dca2a5f1
SHA512
4dd123084b7c12c5618372c5493c47796f74ff9d7f88cdf0e579f1b0e241a114f6b34320854759be9ddbd1655c44b78b96be03e4597898189c9b3c626af2e21c
SSDEEP
768:SCwC3A6VJMEI8XBy1WH7Bp59UzLCwC3A6VJMEI8XBy1WH7Bp59Uz:SCwCPJMZ8Ry10VpGLCwCPJMZ8Ry10VpG
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE