DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
46e62f9367d5027c29ee93e28fa85bf8.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46e62f9367d5027c29ee93e28fa85bf8.dll
Resource
win10v2004-20231215-en
Target
46e62f9367d5027c29ee93e28fa85bf8
Size
158KB
MD5
46e62f9367d5027c29ee93e28fa85bf8
SHA1
26a6e38a1a3937317d34a5a4147899fdc7395269
SHA256
b56b2e88ed056a6fe257838c691ed43bc6dd08fd8edc5884b0c515926f5ed00c
SHA512
24e5b0f9f986c49a55bdc3af6cea26e646ef53c3ea8376b2e9b63f2e507995a08b2bf946203683e095994c6a83a05d21f0d28914531f8c9a1ea8df8159f0e4db
SSDEEP
3072:tRSJNcL/yvKEszUbt//B8xd9SQ7ykDASIG4:eDcLaYa//B6AQe8
Checks for missing Authenticode signature.
resource |
---|
46e62f9367d5027c29ee93e28fa85bf8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE