DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
013765741b8dd44462d8ec56a4e4f2aa.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
013765741b8dd44462d8ec56a4e4f2aa.dll
Resource
win10v2004-20231222-en
Target
013765741b8dd44462d8ec56a4e4f2aa
Size
37KB
MD5
013765741b8dd44462d8ec56a4e4f2aa
SHA1
c3154dd77e8e362356be5b47b8fbb6bd3b6dd197
SHA256
52ad6d2eca8b5b32fa0451ec33ada05a02fc655a7620f6824ebfe1b03b14c432
SHA512
0659b2037f14a1c21362015588da65d5fb79caa632675e58761ad36fbc73cdc3d0e5372c4276293d67f4bd0981bbce99115c1fd9c360ec3f3c2892c081de7e5b
SSDEEP
768:UFyAqCQBd6I3tEn6zg5i7dlVSNC869iPesg27id64xhlPLD:1AqCQDX3U6zMiVSNzjesgokvP/
Checks for missing Authenticode signature.
resource |
---|
013765741b8dd44462d8ec56a4e4f2aa |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ