TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Behavioral task
behavioral1
Sample
db71441a988319d7df891df272b67b3939a3c9ee298fe91b62ee54a571aa4ff4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
db71441a988319d7df891df272b67b3939a3c9ee298fe91b62ee54a571aa4ff4.exe
Resource
win10v2004-20230703-en
Target
db71441a988319d7df891df272b67b3939a3c9ee298fe91b62ee54a571aa4ff4
Size
8.0MB
MD5
1cbb6c87024fc3769978f15c434af555
SHA1
64ba2ceab9649fa568bcfa187fb7ad569b521b94
SHA256
db71441a988319d7df891df272b67b3939a3c9ee298fe91b62ee54a571aa4ff4
SHA512
fc864e2247eed5070f01b95bd2097106d1f6febba2c77ef941cc4d7c95ac82b5dce7824d175edc48ede5f2ef278ae6c396a47c72bdc8f554bd6590747892ca39
SSDEEP
196608:oP5nEnX4Nse/yQX5OVI1jb3AwdaDjoC66JavvzWLrt:oBMXCzygOyjb37daDjoC6tvLy5
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
db71441a988319d7df891df272b67b3939a3c9ee298fe91b62ee54a571aa4ff4 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ