DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
aaf2f6fed88d6bcf3015d5e412de41ce.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aaf2f6fed88d6bcf3015d5e412de41ce.dll
Resource
win10v2004-20240226-en
Target
aaf2f6fed88d6bcf3015d5e412de41ce
Size
140KB
MD5
aaf2f6fed88d6bcf3015d5e412de41ce
SHA1
87a8b0a3e0ff0419538a8796420e089536ad21ed
SHA256
2ac6af598ad8777642f25212dae7bd9bc8c0bea6ab9d6992d077be09ee709de0
SHA512
9c3eef20d69ce3c7dd5e6b3d1ab7ac676caa28cd0399bc26bb98d5965c3a6d3a89cdc419afccbe26ddf700695490154eee35b7ae34aec772552301d34a47f098
SSDEEP
3072:wlu80QPa0NrAeJnZoOIbB8bTDsuV6HdMPp:wlbhPa0NMeEB8Xno
Checks for missing Authenticode signature.
resource |
---|
aaf2f6fed88d6bcf3015d5e412de41ce |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE