DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
985bb28ae16119b452bd43e8457fa05c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
985bb28ae16119b452bd43e8457fa05c.dll
Resource
win10v2004-20231222-en
Target
985bb28ae16119b452bd43e8457fa05c
Size
88KB
MD5
985bb28ae16119b452bd43e8457fa05c
SHA1
843ceddea35bcbd6c135c2bdefc66351d1c04e52
SHA256
fccae0287a5c91d8aa67e2553ed30e7bad08e9465cd07126166c094607f60d48
SHA512
b9341d94bcdd78ef5e465fb0d8d979ca6630b8aff444e5e40125a73aa8c2aafb78455480e1fad794574c38e2745db38bfd8a00e6b89027df7e20efcd2cef162c
SSDEEP
1536:0aZ1NRsVDErUmv9bHROhJCFIAbPjCRkpu7uBEb63kHQvqMV3DYs5SDHRK:dzZ1rR8IhmCu7N+3fpEs5SzRK
Checks for missing Authenticode signature.
resource |
---|
985bb28ae16119b452bd43e8457fa05c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE