ChargeChaxun
CheckPatientResponceType
EurekaLog_PasswordRequestEvent
ExceptionManager
GhHuajia
GhReHuaJia
GhSaveHuajia
GhSaveReHuajia
SetApplicationHandle
YbInitialData
YbReadCard
Behavioral task
behavioral1
Sample
142ac4d096c772d07284d31a1661c0211fc10bff3f79aa36955e61a1b2d0d51c.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
142ac4d096c772d07284d31a1661c0211fc10bff3f79aa36955e61a1b2d0d51c.dll
Resource
win10v2004-20230220-en
Target
142ac4d096c772d07284d31a1661c0211fc10bff3f79aa36955e61a1b2d0d51c
Size
2.5MB
MD5
b7a4f8f906be5614f88762077f47b125
SHA1
e4c07a029e2fd5b899576b9ab1aa2035fc37bdaa
SHA256
142ac4d096c772d07284d31a1661c0211fc10bff3f79aa36955e61a1b2d0d51c
SHA512
09d204701f42883419aa48ddb916a0f2637da3d7192ed6529e22651ca996f24663ee8167e8b659d83bfa9cfc9e821e3ab41c25426a07850ec354c58b062f01da
SSDEEP
49152:fxUUFD9hexlqxR7cqjilsIDXwwFYdCpob+Cyd88ILOlPDLCVkYI0Jy1:fxzD9hexlqxhIlVYwQwquaG0y1
Processes:
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
Processes:
resource |
---|
142ac4d096c772d07284d31a1661c0211fc10bff3f79aa36955e61a1b2d0d51c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
ChargeChaxun
CheckPatientResponceType
EurekaLog_PasswordRequestEvent
ExceptionManager
GhHuajia
GhReHuaJia
GhSaveHuajia
GhSaveReHuajia
SetApplicationHandle
YbInitialData
YbReadCard
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE