DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
ab42c9ab40e387a9f06ff1031c46a95c.dll
Resource
win7-20240221-en
Target
ab42c9ab40e387a9f06ff1031c46a95c
Size
63KB
MD5
ab42c9ab40e387a9f06ff1031c46a95c
SHA1
9b2ba450c5393fa258d656c2c83285fbf8e9ffdf
SHA256
af4b6fe5e94185e08becb41fcac901b941f3a608f0492c548cec0d443782cbbc
SHA512
6b2a551907ab980cc4ed9c711c22ccc9d67586568fe45fa410cbd1deab7ddb054fbe61c2747d019830ff96efb4f178410f6f4e47490e32e9f637c77e7cdc5eb8
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoLM:nJIMlt6RRdOm214/hVh4KhHnZQ
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
ab42c9ab40e387a9f06ff1031c46a95c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE