DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
140f004a1575c42e423f810d42961962.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
140f004a1575c42e423f810d42961962.dll
Resource
win10v2004-20231215-en
Target
140f004a1575c42e423f810d42961962
Size
158KB
MD5
140f004a1575c42e423f810d42961962
SHA1
93813c127b6d290fb2a924b5c6be574204b46577
SHA256
380c6927639ee2552e35712459fa5a8c99e7e72cede3037c530cc0222ee61275
SHA512
5879b6e522d72959a91a84dcc2723e71aedd80e4848e52b29002b5d5de5a228b9bea34e032f41dfa679a6c75bd1dd0eb869a3d44fef9a5e3ee562a0f5abbc91d
SSDEEP
3072:NEBuoi2Iqs2KZjszUbt//B8xd9279Zjf5es:S4ojs2La//B6Ar
Checks for missing Authenticode signature.
resource |
---|
140f004a1575c42e423f810d42961962 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE