DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
bef57b94530b4e3e86a87d0fd151ec71.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bef57b94530b4e3e86a87d0fd151ec71.dll
Resource
win10v2004-20240226-en
Target
bef57b94530b4e3e86a87d0fd151ec71
Size
26KB
MD5
bef57b94530b4e3e86a87d0fd151ec71
SHA1
a43196b37de5d69e2d327de5a7e6a0698ebc8615
SHA256
24e1e78f0427bf64a0bbe40ffd43b72530921e62c2d38700c005bfc81a4590fa
SHA512
76a8460b509826398ea51d03b88774d5ae4fc606b283e6cef849cface12d59d51d8559658c3cea2bf6d681cf547b4dba7b36b23aa743bff373a70b8c7f1e164f
SSDEEP
384:xK3BcWQD2vD/ApniigW6KFvk7zNdq3VYxUsa9xlhWyPIT6zqOZ2dARCYb:s3aDD2qirFKFvuzTqcxadW/ueOZ2dW
Checks for missing Authenticode signature.
resource |
---|
bef57b94530b4e3e86a87d0fd151ec71 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE