SetMyHook
UnMyHook
jksHook
jtzHook
Behavioral task
behavioral1
Sample
064e04e88167f55eb5bebb8175558924.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
064e04e88167f55eb5bebb8175558924.dll
Resource
win10v2004-20231215-en
Target
064e04e88167f55eb5bebb8175558924
Size
19KB
MD5
064e04e88167f55eb5bebb8175558924
SHA1
b228a19429d8f9187cc26d31c4983f3bb79de1eb
SHA256
55310978858f63b612fb6a68c0e98e90dbcfd62a6eb0cb8c5114eb30a29ce198
SHA512
e806e8d59a65cd2db8f3ad05d38a84067d2e582d4bd894d6cb56e7331f7a4c7a8afc30070831919973803732af48826b4d5c85ad83a4a4ca079b3044b962f366
SSDEEP
384:G1u6B4y8hiD7GAXx06HwODYxRSZi6+3QvR7QrAxcqO9yxvWHen:uuc8hy7Dpw1oNKyZQqg9yxGs
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
064e04e88167f55eb5bebb8175558924 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SetMyHook
UnMyHook
jksHook
jtzHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ