?CreateWindows@@YAHKKDD@Z
?DestroyWindows@@YAHKKDD@Z
KillOld
SetHook
runform
testform
Behavioral task
behavioral1
Sample
0121fd6e7871382c1a64a39b3e10979c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0121fd6e7871382c1a64a39b3e10979c.dll
Resource
win10v2004-20231215-en
Target
0121fd6e7871382c1a64a39b3e10979c
Size
62KB
MD5
0121fd6e7871382c1a64a39b3e10979c
SHA1
2a60c9c1df10c9291fe4823fa4d5d8ccb722eb0a
SHA256
263ec7cfc358ab5b0b6047397071db56c5aa13590de4db338b1e9053e5cc0c2d
SHA512
1ee9df15900d83cd80779193e7efffc53ef93cdfedb5c325d9d3c0e56dce86c76dbab2431437372788836b8fecf233191eeb709d5df33b3ef61963226aeab6b6
SSDEEP
1536:V+DRYmACTfHxVQ03w+FtLyo4YD34L+mZ+pRLf/4yt2ry:0YmLhthuOIL+DjL31twy
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
0121fd6e7871382c1a64a39b3e10979c |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?CreateWindows@@YAHKKDD@Z
?DestroyWindows@@YAHKKDD@Z
KillOld
SetHook
runform
testform
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ