DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RunAtl
Behavioral task
behavioral1
Sample
4e78c4e4c9c819a8ff00ff1b1f492130.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e78c4e4c9c819a8ff00ff1b1f492130.dll
Resource
win10v2004-20231222-en
Target
4e78c4e4c9c819a8ff00ff1b1f492130
Size
54KB
MD5
4e78c4e4c9c819a8ff00ff1b1f492130
SHA1
99814181cb663ed041b3761a82d28b1d88afa5ed
SHA256
cfe3abcd26c3830f13a5d0ec10548d05421be17d3e6fa8012dbe332945fb25a7
SHA512
2dd1549f2b9851c5067125150463d9f6617241ddd138bedb991be3c883ab31094832a6e0aab5a64065b61c2fcb187935558274fb86ca17a2fb4d01dc67c525dd
SSDEEP
384:OahrDK/Dg1xI1otylVJgSNJqXq+dvOXlWGCkmAgX30V:fNKmxKotylVJLNJqdvclJ4Ad
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
4e78c4e4c9c819a8ff00ff1b1f492130 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RunAtl
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE