Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Behavioral task
behavioral1
Sample
09b808093fa2e143594624415968915a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09b808093fa2e143594624415968915a.dll
Resource
win10v2004-20231222-en
Target
09b808093fa2e143594624415968915a
Size
21KB
MD5
09b808093fa2e143594624415968915a
SHA1
4093d25d3f39e486d68c900ece5bed6c54e20b66
SHA256
210cb38161fa0c614dfbc060d5f106835d0d94b184e445662d146326283b99bd
SHA512
a43879c4bb48b4893d917098d31e0a6bfd3302915f68d71b04e32e6530d6ee82244ef304c71d1467c7091976b7caef9f63a7c2c6cdd1ca9be46576abe56ae682
SSDEEP
384:J6HUQVR7em/S4AB7cBp2Apf9x+YuelylT:kHgm5kcH5f9xXJKT
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
09b808093fa2e143594624415968915a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE