DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ba9ac609b53250b74000dc97ff12d443.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ba9ac609b53250b74000dc97ff12d443.dll
Resource
win10v2004-20240226-en
Target
ba9ac609b53250b74000dc97ff12d443
Size
84KB
MD5
ba9ac609b53250b74000dc97ff12d443
SHA1
bc54c9d066e156dd76b0f1f75cd2e2ac45be090f
SHA256
330294d664248f9cc459917a297ad570f193425b75e1f4687bdcc959772698b0
SHA512
eb9caa0387b4069ce72aceb73de11c96ac3661a8ec6efd977ae002c92ea25e0e8c6dd12addaa3a1e8671c5730d4342567be2b534efc649a1276eb1dca70d5534
SSDEEP
1536:TSA7rT6c0L4SPsvfcYxlz1Aix1e56lnQ/55h2/FahpXB87c7:TPaAfcYfz1nne8nQ/5D20XBGc7
Checks for missing Authenticode signature.
resource |
---|
ba9ac609b53250b74000dc97ff12d443 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE