executeScript
inject
isAttached
Behavioral task
behavioral1
Sample
Solara.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Solara.dll
Resource
win10v2004-20240419-en
Target
Solara.dll
Size
6.4MB
MD5
e834a7f25b5d9d9c1ac4971c25358dcb
SHA1
5a7e1a5fe0eb4165f183f84cefb1320379852a6e
SHA256
1e41cd1f4b51807d49d4eb4fbb6efb7bc725dd514e6dbadca20c03e157d86ab2
SHA512
0ae5b7f8a17f6d88264cc964c3235d0321ae3fb673fcc9febd1b5a41562068d6a11c97dbdcc25352f7d533377c8baabcad511af87a8113ce536a9c215c84f4c0
SSDEEP
98304:EsE/aXmUidS9y6UQLuuZltmcLRuEgl6hALYu6c+GgdWtb8AivdBn1gqDsn7VSANM:EsE/I3lxfLuuZeqOlxcmFb8j11OG
resource | yara_rule |
---|---|
sample | themida |
Checks for missing Authenticode signature.
resource |
---|
Solara.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
executeScript
inject
isAttached
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ