StartHook2
StopHook2
Behavioral task
behavioral1
Sample
12d4f5a07f8c5a617f61265ff8417392.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12d4f5a07f8c5a617f61265ff8417392.dll
Resource
win10v2004-20231215-en
Target
12d4f5a07f8c5a617f61265ff8417392
Size
20KB
MD5
12d4f5a07f8c5a617f61265ff8417392
SHA1
bd8a0885eb7eb13c2a6cdb172ef002231e9b0cb4
SHA256
41c6a83bc000b3d56fd24a16dc9af12013837c51042a388f8053f47d65fe5fe2
SHA512
e006757fe1ecceff0794fc0a7435050dfc6a1fc987701a57fdeff97dc7ae263c2d98740b0e9eb2d24b8c0030488438df2a710852cf4fa1955a91b6fd1b9a1e4b
SSDEEP
384:rkAVgeBCgqlg/1ktLnktG+ot0XwlFnJEKTzIpD9lco7O4oB+E:rkcxAlgeV7gwLnW40pAAOBB3
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
12d4f5a07f8c5a617f61265ff8417392 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartHook2
StopHook2
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ