DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
28b496b1623bf04fe3914d0f71369ca9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28b496b1623bf04fe3914d0f71369ca9.dll
Resource
win10v2004-20231222-en
Target
28b496b1623bf04fe3914d0f71369ca9
Size
36KB
MD5
28b496b1623bf04fe3914d0f71369ca9
SHA1
59beb4447cf81c19235929f8f472dae91cf6c579
SHA256
6dd5abaa72f0647bf73ae92154dbcf4de9f5ffff3026317e30daf7f8ac15ee21
SHA512
340ee4a96043aaba67c81a22ee0786c3990ccb911f6318a0bfab29252a7691ef2ef529d43a3667d0d36c8c840394ad6f4998f63f96a38b9e15d0e8bff9eb671e
SSDEEP
768:AaSACC8F+4enywFtfIJ9z4AL0exypmByTpQF7d:AaSAWwL1o9sAL0ex7Sgd
Checks for missing Authenticode signature.
resource |
---|
28b496b1623bf04fe3914d0f71369ca9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ