DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JHookOff
JHookOn
Static task
static1
Behavioral task
behavioral1
Sample
7c31e8853f3e2ce20778d796caa4b522.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c31e8853f3e2ce20778d796caa4b522.dll
Resource
win10v2004-20231215-en
Target
7c31e8853f3e2ce20778d796caa4b522
Size
88KB
MD5
7c31e8853f3e2ce20778d796caa4b522
SHA1
64a2ff8f8aab151703b5e127090e08c85f2a5fc0
SHA256
13ad8253f80040e2e24168ef885138406586596fdd9b4a9ae426f1de39e04bef
SHA512
837ffa27c5558e6eed68e41c0314d1e45b8b25e04ba8cb22879045790a85219f2d4eeef3bcd03fbb92747be2b10fc72368135da104216827bc969e162c86ef6f
SSDEEP
1536:/yt2QicLUzcw/OP9t4at0vqvznVbq48dH+:/yuwwGHrPnVba
Checks for missing Authenticode signature.
resource |
---|
7c31e8853f3e2ce20778d796caa4b522 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JHookOff
JHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ