DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
5b242e1d7301d4a416e8a7728ab53763.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b242e1d7301d4a416e8a7728ab53763.dll
Resource
win10v2004-20231222-en
Target
5b242e1d7301d4a416e8a7728ab53763
Size
25KB
MD5
5b242e1d7301d4a416e8a7728ab53763
SHA1
05419692bf7e911b7601b088133e0b7d9e002078
SHA256
1f0c82300ada7d12cb4a151f633fede3c4323f93b3e9ae9338ffcf52bcc35504
SHA512
9dcc7baa670e4ce12683ecbff006daf71cce130b22049d902be3f77cf1da7b9675b83ef25a653c7a3d4cdd15030087693ca2917230d45abcaeeedd9c3b44d831
SSDEEP
384:V7dxz0CKAoqd+13XQa9tDAEv4Kb0YkfL7MRCE1n79hWW+KHpqvJAzWrCQjgL:VgCKBqdSHQaxkKbK7MQE1phM7eWrCx
Checks for missing Authenticode signature.
resource |
---|
5b242e1d7301d4a416e8a7728ab53763 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ