StartHook2
StopHook2
Behavioral task
behavioral1
Sample
4cffd674075ee10a6de0a07edf1b1d73.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cffd674075ee10a6de0a07edf1b1d73.dll
Resource
win10v2004-20231222-en
Target
4cffd674075ee10a6de0a07edf1b1d73
Size
21KB
MD5
4cffd674075ee10a6de0a07edf1b1d73
SHA1
cbe46a797e9ec0c09cdc3bf718434d8a1c2e0aa8
SHA256
8e0e13f59c5c05b61bc4029a106706f6b1b7bb9f27abba26e3466beab76910f3
SHA512
46259d8821bc0c8d8af31dbb32ee812e9204f21838edec7de13ab752c4ee3ae8aaf7c33a612e9917d4ff865886d18b78632f1b73996f224c8086a6f55128f9c3
SSDEEP
384:Zs4s/UBxZLcVebOK/+JCfDLhuqPzm1wd3NBWHq59FSVOFC7Kaqt1VN93Uh+kjqap:ZsFiLbcJCfDlbm4F4Vb7wtszjq
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
4cffd674075ee10a6de0a07edf1b1d73 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartHook2
StopHook2
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ