SetMyHook
UnMyHook
jksHook
jtzHook
Behavioral task
behavioral1
Sample
63c33cb7bf495255a9129bb10968851e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63c33cb7bf495255a9129bb10968851e.dll
Resource
win10v2004-20231215-en
Target
63c33cb7bf495255a9129bb10968851e
Size
20KB
MD5
63c33cb7bf495255a9129bb10968851e
SHA1
cc0d0b2d16f1439ab9165458a78d98e968c6e1f1
SHA256
b70bcb8309e8f5f6857c62dd7de44da4ea9dbe9ca4c340335f67a2b4412b640c
SHA512
98df92e355a275d16022d273834b6fccbcce4eae7647561f96468d4c44d5fb19dcc8219fe7488f38a30b0e138e6d82676bf5055b3e4b19755dfa10159f0a257b
SSDEEP
384:8e68GqbhK5HhVpv90QivmgBi0bBcOHcEYh2CnMtjiSUR:8ebbe3HKvmUi0lNfGnMxih
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
63c33cb7bf495255a9129bb10968851e |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SetMyHook
UnMyHook
jksHook
jtzHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ