DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
be04ff2fc365d4eea16bf1c8986ae4c7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be04ff2fc365d4eea16bf1c8986ae4c7.dll
Resource
win10v2004-20240226-en
Target
be04ff2fc365d4eea16bf1c8986ae4c7
Size
89KB
MD5
be04ff2fc365d4eea16bf1c8986ae4c7
SHA1
fb9c7fd47f3cca7f7872a2ee5f9c788a8b91af9c
SHA256
b8ce539754894d8a553afaae65e8bbc516fe56d3ca9a5435edf4964ccd8efd86
SHA512
b9e355695bf9a3e1f4c05e2c38b5dec9e7905fc1d40052a97e8b3f88fb8ecdf65016d36c78c3773ea7eed2480e24e9a97a01b266dc81d19beb07a0528e5f059b
SSDEEP
1536:y8Bvc5s2qPR3zdX1ctYk8dGu3sz4rbaZo5lXoUn/Bn8xg5iWqUzSSYPPFDBOAtS:V9c5lqJ3hX1cOTdGgszUbt//B8xd9wwg
Checks for missing Authenticode signature.
resource |
---|
be04ff2fc365d4eea16bf1c8986ae4c7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE