JumpHookOff
JumpHookOn
StartHook
Static task
static1
Behavioral task
behavioral1
Sample
002b63e698a7fdeb483484217539c7c0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
002b63e698a7fdeb483484217539c7c0.dll
Resource
win10v2004-20231215-en
Target
002b63e698a7fdeb483484217539c7c0
Size
53KB
MD5
002b63e698a7fdeb483484217539c7c0
SHA1
95dafa3d83a75eb1f1855a363c81af5a07e9a37c
SHA256
ee914af13744b5c90e005331ae0a9bd6b408c8711cbea42347452b63c22de9ff
SHA512
8e4419c5ad64827dbefdc6f6509a4ea7d5cbb63805f4bb4473846ee59958958f4b35ee03e477ba202ba9b34d66ec001884b5403a63e653c45f608ebb87ea91fb
SSDEEP
768:4P3nizqMQoBmlwzh7dI8LsJ0dhPd9Sizh5jxDiXYOEd4pRFi8r/tZ3mAldNtK:4P3izqMQK1gJ0aizRiXId4phxTvK
Checks for missing Authenticode signature.
resource |
---|
002b63e698a7fdeb483484217539c7c0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
JumpHookOff
JumpHookOn
StartHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ