UnHook
WSPStartup
installhook
Behavioral task
behavioral1
Sample
9ac321477a4980224786b894a7fffdb2.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ac321477a4980224786b894a7fffdb2.dll
Resource
win10v2004-20231215-en
Target
9ac321477a4980224786b894a7fffdb2
Size
128KB
MD5
9ac321477a4980224786b894a7fffdb2
SHA1
e20f39c5f845920938b5136185ef9f8857ffc210
SHA256
d85cb66689ad481fac59b42036fae761ccbf54fe4ace18408e6ab2f2a801dd06
SHA512
b691480348b7dacec42bf8f36a60389ef6d15b942f932f9b3b535f9776a316f82ff6d5a0aff999ffeff2e39928405626ca4fc692491a1d9ae73ec702eaaa3075
SSDEEP
3072:hJdJJsok4wQDCKvDZHN0ttQLtNuAHLIXqpGEL:hLJ+ok4pDCKNHN0csAHLukvL
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
9ac321477a4980224786b894a7fffdb2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
ExitProcess
UnHook
WSPStartup
installhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ