_DebugHook
_ExceptionClass
__GetExceptDLLinfo
___CPPdebugHook
Behavioral task
behavioral1
Sample
DXTBmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
DXTBmp.exe
Resource
win10v2004-20230703-en
Target
DXTBmp.exe
Size
197KB
MD5
404a0d3f13dc9443243529b6fe8118c9
SHA1
9c4f44d204374152b7b7a396308529c3dabdacdc
SHA256
7d077b0fb2f00cc8f6936199d7d583402e05d7f668261f5d459ce36c0d5af4fe
SHA512
5cae19806ae9cfb7d28dc0b780121fbae6219497469a06eb1d78b4901ff4e0613daec56ffc8cd1a8ce997b73ceea3462cb28d31ee961a5ea3dfad95b7c66a85b
SSDEEP
3072:aN7VBnrEtaQuzz4V+NlYE383OECnNyIcGzWWUQFQDGuwmLI+6kmBcW+zKe4nfg:aN77wBV+NlYE3834NyyWWZHN+6kgxVv
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
DXTBmp.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
_DebugHook
_ExceptionClass
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE