DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
8edd2fd33381076ee0d561adac7fcaa9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8edd2fd33381076ee0d561adac7fcaa9.dll
Resource
win10v2004-20231215-en
Target
8edd2fd33381076ee0d561adac7fcaa9
Size
158KB
MD5
8edd2fd33381076ee0d561adac7fcaa9
SHA1
6002e52ea8f686411c26253c05d433b216b35ae5
SHA256
2477159a41c828ca22a41e222640832fc618b23a20e2bb121be57f05713964e2
SHA512
60405bd9d93cd6bd11ba453e3e8359c256bde52e0fc1a806d60fb9eccad98fbd33cc9f9854142ddb0e947d80332c4cbe017a7f86507f2cbc7f577d0d081c0eb8
SSDEEP
3072:fqHt41TbpTXh1awSkonP3sBjcaRf41TU:K415TXrawKP3IRf41g
Checks for missing Authenticode signature.
resource |
---|
8edd2fd33381076ee0d561adac7fcaa9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE