DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
0061da51545e9aab0c34f064c4ace97e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0061da51545e9aab0c34f064c4ace97e.dll
Resource
win10v2004-20231222-en
Target
0061da51545e9aab0c34f064c4ace97e
Size
73KB
MD5
0061da51545e9aab0c34f064c4ace97e
SHA1
9075721a2ac169df985f5036f62a103a3774b173
SHA256
f5cc13791776712f9946d41fc326b04ff0c984b136c23a1b52b31b0058728ebe
SHA512
6c598c37da505fef0ae8f4b50117531a7b32c727f4e61729e73859f26a4c2580fb7a1a13a4756f667ea9dea8b417fc55c3d7be3668cbe227ace5bec67010b372
SSDEEP
1536:ZVqACOAQf6SO7Da12iG2qtHas3MsEDLEm:gTxSO7OIivkHzNEDQm
Checks for missing Authenticode signature.
resource |
---|
0061da51545e9aab0c34f064c4ace97e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ