DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JpHookOff
JpHookOn
Behavioral task
behavioral1
Sample
1c689f8c47bb067c503fc93f0a6e3ad0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c689f8c47bb067c503fc93f0a6e3ad0.dll
Resource
win10v2004-20231215-en
Target
1c689f8c47bb067c503fc93f0a6e3ad0
Size
53KB
MD5
1c689f8c47bb067c503fc93f0a6e3ad0
SHA1
5a78469037120f742ebae49466e3f8026fbb0efd
SHA256
2ce9b555ed42d24dc78d9a435b66d212835c03d137444bdb6043859e41b5f2f9
SHA512
2680b9507fa77daa374b2e512fed23d05c9f9be696b1941159730098f9d1290c6416d699082d8791997fe1288990bad5ca8f129455abc3a78db5b72bc4f72244
SSDEEP
1536:bWN5EAE7kkxq2jV5IgKTeenGneHZ4rHq8KgVznubnouy8:A5EAE7kKjVDOHnjZ4rK8KgIDout
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
1c689f8c47bb067c503fc93f0a6e3ad0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JpHookOff
JpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE