DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
4eacfec99e227715cdf7e036b65e3dae.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4eacfec99e227715cdf7e036b65e3dae.dll
Resource
win10v2004-20231222-en
Target
4eacfec99e227715cdf7e036b65e3dae
Size
178KB
MD5
4eacfec99e227715cdf7e036b65e3dae
SHA1
746833300db193a89e2dc6deb28e5474b2c74b49
SHA256
ec41fe0f61aa7a9342ee79dcd542b082d42ce163ae879737d88a8dc6ef18b087
SHA512
b760f4e992d79cecfc0405b6cf2a8b294e530d7d82a8d1283f675cd2a48e9b64c7ea8a0d7885e4c9e710167fa2ce974942871824dbda2142b97ac48f49cbf714
SSDEEP
3072:rzMX3qFJ2ucPh83uSgP3lBwxTyXEbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFt:ruaFJEbP1BywvP6bQ7yMP+DE8270u/
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
4eacfec99e227715cdf7e036b65e3dae |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE