DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
1aeebffd2dc2fc8deabcbc2cd9a6693b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1aeebffd2dc2fc8deabcbc2cd9a6693b.dll
Resource
win10v2004-20231215-en
Target
1aeebffd2dc2fc8deabcbc2cd9a6693b
Size
176KB
MD5
1aeebffd2dc2fc8deabcbc2cd9a6693b
SHA1
d139c4b9be0e9000125c042ea35b0e6ae8e579a8
SHA256
a8e158408bf07ca249002454dfabcdc246c8322c2b28cafd5fc55f0419cbadad
SHA512
5f3bbdc44eb42f896d58b3c90104007738f70a812ca14de32aa694b49d3bb41b784e40f354fe48d4e71eb8b74befeaaa0023b60f2634e18ef7ef763d4f5e3e7d
SSDEEP
3072:JgevJmBm3M+v8mNSk+inp95ySbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVUJ:KJFsNL+inPfwvP6bQ7yMP+DE827Bz
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
1aeebffd2dc2fc8deabcbc2cd9a6693b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE