?DelHook@@YGHXZ
?SetHook@@YGHXZ
Behavioral task
behavioral1
Sample
107c4456bcef98339ecc5c323251b776.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
107c4456bcef98339ecc5c323251b776.dll
Resource
win10v2004-20231222-en
Target
107c4456bcef98339ecc5c323251b776
Size
9KB
MD5
107c4456bcef98339ecc5c323251b776
SHA1
93fa0f13dc3f4343e9bac9b70c281d4305f812d0
SHA256
21f74c285f20c1df03fcb93bb04af8d7a6099c329324c1bf64dd34407923b96f
SHA512
6ba9e8e36b4b605045f152d2ad66b29cdd8a693bcf574379c588da470d11dfc06fff4276872261c32a6c8d433434f161d5c920139fde1d15cc7ee96e4639db29
SSDEEP
192:rDUrzFDXkoJ0HPxvUZxU4eXUVTpWJf1Li:rqFBKZvUZe42UVTpWl1
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
107c4456bcef98339ecc5c323251b776 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ