executeScript
inject
isAttached
Behavioral task
behavioral1
Sample
Solara.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Solara.dll
Resource
win10v2004-20240426-en
Target
Solara.dll
Size
6.4MB
MD5
7b70852490ba6ebbd3f93f6585ca22c3
SHA1
f078b55d9973befbada9844d6dacb390cf183f33
SHA256
1abe8a754648b2a868b32763e47c6f34d85d4a68649b097d2433171a742246c9
SHA512
434968c75263f54d31a5d4bc3b40eb54528fd5d0435ffd3a1bd169de45d177b6eaa030187f5595121f104c5d91505075372b969c03fa77ea1ec40dbb29aa795d
SSDEEP
196608:IJfTrJ0xdzEaemgMDQ7KARXk79Ms/7Nqj6m:krrJ0pX0W2ssj6m
resource | yara_rule |
---|---|
sample | themida |
Checks for missing Authenticode signature.
resource |
---|
Solara.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
executeScript
inject
isAttached
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ