DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
0a6560b87fc68af04e93abcf31c4ab73.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a6560b87fc68af04e93abcf31c4ab73.dll
Resource
win10v2004-20231215-en
Target
0a6560b87fc68af04e93abcf31c4ab73
Size
39KB
MD5
0a6560b87fc68af04e93abcf31c4ab73
SHA1
875f782c44ff973e83afc8b048e7f89f99140201
SHA256
fccf85b77f88a92598723b17913afbfe8d5e22b84fddaa4f20eb14d9ea74868d
SHA512
009f745f0b6b25948fd9036ad772393bbae5ba525b7a909abbeda58c589fe78c0fdfc24f6571e8bc42ffce347786beb9ba3a138f25362cf77f5ecab4dab2f39a
SSDEEP
768:QySqlQi0RlMyACriHCjMA9jWoLgwXHlQP0mETUyubSqt1iTarE:nSqlQf/FriHCj/9xLgB0mxPE
Checks for missing Authenticode signature.
resource |
---|
0a6560b87fc68af04e93abcf31c4ab73 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ