UnHook
WSPStartup
installhook
Behavioral task
behavioral1
Sample
1ce8e5d89a0d33688a5abea221bb9d9c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ce8e5d89a0d33688a5abea221bb9d9c.dll
Resource
win10v2004-20231215-en
Target
1ce8e5d89a0d33688a5abea221bb9d9c
Size
128KB
MD5
1ce8e5d89a0d33688a5abea221bb9d9c
SHA1
b31041819cd2f1c478959f9e3c5b751b7bfec300
SHA256
16617b79546f21c6d2bb16bf97236013cbb5ac5cc3af03bfe4045047bb998edd
SHA512
fea439f6a44b5d49cdf0714911b5c76b54595e6679f63199c790b94c14c82f1b8178f37f612b9515d1bb11a3201144bde12360aa18eb581665b0006568c6c99d
SSDEEP
3072:uGWI80JequhdkwfLw4hSRGV6xfqKfeo1UHma:HW3UevhdkQ5cQV6ZqKfeoZa
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
1ce8e5d89a0d33688a5abea221bb9d9c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
ExitProcess
UnHook
WSPStartup
installhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ