DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
3a157145a111910d51a8723025c4001c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a157145a111910d51a8723025c4001c.dll
Resource
win10v2004-20231222-en
Target
3a157145a111910d51a8723025c4001c
Size
40KB
MD5
3a157145a111910d51a8723025c4001c
SHA1
f3da8542b72bd55892a9a8f1493f59ad61f7035d
SHA256
0203f659ddc613c0a5513949f8c1450163756f86f86f00492198b3a2c43b45f7
SHA512
e0ce7d3a708f85cb62d6ca1057728de0911facfef63175b9dd233cab052f6b6f05e894ff4b8d2afc1d18fecfeebeba9b5bbe78f8fcce5873ac315324b0c2dae9
SSDEEP
768:7dyqqOQysNGm4vAQGO92/A3291mJ3Xa/RRk0ZeqFMJ2VbGFgzn86:IqqOQzzSZL92/AbJa53z5bVznL
Checks for missing Authenticode signature.
resource |
---|
3a157145a111910d51a8723025c4001c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ