DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
0c5a00898ae60d3fd117f0b63f4b37a2.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c5a00898ae60d3fd117f0b63f4b37a2.dll
Resource
win10v2004-20231222-en
Target
0c5a00898ae60d3fd117f0b63f4b37a2
Size
140KB
MD5
0c5a00898ae60d3fd117f0b63f4b37a2
SHA1
4e7f17ee56fdad6fc4d003adcbea11d47402a5b0
SHA256
279683fc136ef3592094ad404b45522f2d04a603f758503ba796ec0e176d605c
SHA512
6f72b62980b34fd484ee1eb7c58749b3741fcd6b06044bcf98f7d66586348ff7a88cca4da6b26cc524e11766cefb1488c87bcfc151017d73c9a7f1c350d598ea
SSDEEP
3072:fDEfe9IlR1CHWSvTBRVW/0cfNNPJNleXP:4fe9IzSLBRc/HLleX
Checks for missing Authenticode signature.
resource |
---|
0c5a00898ae60d3fd117f0b63f4b37a2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE