SetMyHook
UnMyHook
jksHook
jtzHook
Behavioral task
behavioral1
Sample
1d14ee46cb8cdfb6e5809c1a8fcdda7d.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1d14ee46cb8cdfb6e5809c1a8fcdda7d.dll
Resource
win10v2004-20231215-en
Target
1d14ee46cb8cdfb6e5809c1a8fcdda7d
Size
20KB
MD5
1d14ee46cb8cdfb6e5809c1a8fcdda7d
SHA1
39baac56968ad5eb2791503d915024277962d407
SHA256
bfd390de1147dcd8ed11ccbe9d81b05f817c0e124e3ef222d9c388dc7593e0d7
SHA512
2d84090c03cb037ffc5a09558686200770d2927d440438398485807ab833906f3ea28f53f5b89da532742f94f6464763dbfc043ce4d417851c2a94547516e9b5
SSDEEP
384:ru6B4y8hiDbDxE/DRcWwCd57YauP1g4IVhWF0HOl7QPvEYg:ruc8hyb1QDV3zuP1zIVhWFAOpmT
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
1d14ee46cb8cdfb6e5809c1a8fcdda7d |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SetMyHook
UnMyHook
jksHook
jtzHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ