executeScript
inject
isAttached
Behavioral task
behavioral1
Sample
Solara.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Solara.dll
Resource
win10v2004-20240508-en
Target
Solara.dll
Size
6.6MB
MD5
110e9512db3d6a513d94db3729919c0d
SHA1
255dcd16391adea11a8fb06dbe6ea4b5dd8afb09
SHA256
d4879d299553da0777a1ed4de8e5d77f89c493975133723529cd45891a278fa3
SHA512
687f415b2a934de6fb82a740b737b77a4683ab6da914dddf67eb28006df8f8cb695b4011a13d16a1df247f83cdf04f8f979345ae098d3ccdc44d1e55fecae5bf
SSDEEP
98304:MRzLN6+Wb8g+p9zZzyG74bajZ8XN33VMiBDeUaN7OaM2U/MwfGl8torJr7IX/1rJ:MXASdzyG74bajZGy+uNfa5el8tEPI1rJ
resource | yara_rule |
---|---|
sample | themida |
Checks for missing Authenticode signature.
resource |
---|
Solara.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
executeScript
inject
isAttached
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ