SetMyHook
UnMyHook
jksHook
jtzHook
Behavioral task
behavioral1
Sample
abc2a626089eb3982765480cd8e20b8d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abc2a626089eb3982765480cd8e20b8d.dll
Resource
win10v2004-20240226-en
Target
abc2a626089eb3982765480cd8e20b8d
Size
20KB
MD5
abc2a626089eb3982765480cd8e20b8d
SHA1
e791edec25be5d62b918aaec80661b70b77a7935
SHA256
6d515ee8fa257370d4b1781246c499aa77c70866800c8469d56e072bb4aff735
SHA512
2bb249f6129fb30f293086961805c334d9c43110db90144224bc3eef9ad9bb625cc8220cc46a809026cdd1c5dc7d5102862f21b256e62cadfcaba65ebb4d1b12
SSDEEP
384:LeZZ5CXZWhBXYJ79gxqVTxhC/bYFq22//bL1v8qsk2DF:LeZZ5QZsXG5gkTnCsF2/XKjk2
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
abc2a626089eb3982765480cd8e20b8d |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SetMyHook
UnMyHook
jksHook
jtzHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ