@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DlgProc
GetPasswordDlgProc
WndProc
__DebuggerHookData
__GetExceptDLLinfo
Behavioral task
behavioral1
Sample
2cb6d793c330b0f5e33e40144acbf43e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cb6d793c330b0f5e33e40144acbf43e.exe
Resource
win10v2004-20231215-en
Target
2cb6d793c330b0f5e33e40144acbf43e
Size
285KB
MD5
2cb6d793c330b0f5e33e40144acbf43e
SHA1
5f82c0c356604befa4dda384d30d78ebf52b15bf
SHA256
e6c5138a7e20c60580ec91bbbb5a6b70373669429767c53319303451e99b523e
SHA512
6a87931322274a385c3451b69b5144d4dbeee65d77c7af023fc6293cc9082f0cc93d07a29c69b6e320a899b53a1ede801707938cf36c6edd58263eef865143b6
SSDEEP
6144:AV1QIQQpRDxY9Tq7uZgSgLTj1B0owWyTrCJwKP79pigE5UJIVgQFnwagtt:KuyhyTIZLB+VgkwaQt
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
2cb6d793c330b0f5e33e40144acbf43e |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DlgProc
GetPasswordDlgProc
WndProc
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE