@WndListDlg$qpvuiuil
@WndProc$qpvuiuil
__GetExceptDLLinfo
Behavioral task
behavioral1
Sample
Temp2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Temp2.exe
Resource
win10v2004-20230220-en
Target
Temp2.exe
Size
21KB
MD5
1281e6bb86c87728c9366c1e4d39382d
SHA1
a1c414c9784c352ebde7d5bd9590f25049d835f8
SHA256
a78fd96ba90f89dde7c404d5fbc199f7fe3565a82f24cccad2492765a1dcfed5
SHA512
dcca657f59b6e103548b4a007af19c585201f0f5bf3b7c86c56daa3daa23111d87ba6d3f41d97c7a1fe9470a72600a2bafe78613ddeb5a427cf1e3ea26478205
SSDEEP
384:3ARbJ9AFannDGZwr80jjwVSVLMoZ8sKqScgdGWZhvaLgWQYoxf93O:QRQFWntjjRIgaXdGWHCHQ3
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
Temp2.exe |
unpack001/out.upx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@WndListDlg$qpvuiuil
@WndProc$qpvuiuil
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ