Hookoff
Hookon
Behavioral task
behavioral1
Sample
722398e348bf10621af6a00ffb79bfab.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
722398e348bf10621af6a00ffb79bfab.dll
Resource
win10v2004-20231215-en
Target
722398e348bf10621af6a00ffb79bfab
Size
17KB
MD5
722398e348bf10621af6a00ffb79bfab
SHA1
b6bcc96c1671621ca859e4238bf9d756fee8a396
SHA256
62da13d4e32273bb4ec43c9cef552b71dd724b27588a5b9885b66b4dc3cae86e
SHA512
7478ddb3edd8dde996290f3448d7d2ee1e9ba005dd5ad7d81a652b830647044dcad93e3c40a56f777e242c134f28f4f5e6c81116078880f64a1aab9e4c7a1f80
SSDEEP
192:nIeqIXRCwtQh7H0TtmCvS4sXP5jryqT8XV+oBIsnpwphLA7+jce+pH/e7Ooxtq7g:I2hCEs7vCvFqFyqg+FswiH/eCwtq7ez
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
722398e348bf10621af6a00ffb79bfab |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Hookoff
Hookon
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ