DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
3db5cfac000f93c4851e309e49ccd27832100b00a2b37c3b440ffaced23955d8.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3db5cfac000f93c4851e309e49ccd27832100b00a2b37c3b440ffaced23955d8.dll
Resource
win10v2004-20240611-en
Target
3db5cfac000f93c4851e309e49ccd27832100b00a2b37c3b440ffaced23955d8
Size
3.9MB
MD5
434581a6916fa6e0f46ebbc297496fb3
SHA1
667c61bea06433c2550023e3d44385acb81b1015
SHA256
3db5cfac000f93c4851e309e49ccd27832100b00a2b37c3b440ffaced23955d8
SHA512
db50d8431788d3bfd751675848b1697117f83ecb1e19ce0456581ec97bd4cfd2484dc9972ac6857be70f40338676cd54af2ea7f21c1ab2d95b40cb542aec3da5
SSDEEP
98304:6c63Ss0OWCp1lySaCcfZBL7mWwzftGY/yBphLnaFNf:6cbszWCp1llgZ5YAphzaDf
resource | yara_rule |
---|---|
sample | INDICATOR_EXE_Packed_Themida |
resource | yara_rule |
---|---|
sample | themida |
Checks for missing Authenticode signature.
resource |
---|
3db5cfac000f93c4851e309e49ccd27832100b00a2b37c3b440ffaced23955d8 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ