@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Behavioral task
behavioral1
Sample
PsmPlayer 5.0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PsmPlayer 5.0.exe
Resource
win10v2004-20240802-en
Target
bac64c91429a949fcc39312a30c7efbe_JaffaCakes118
Size
123KB
MD5
bac64c91429a949fcc39312a30c7efbe
SHA1
158e537c808b231d7f68f8bbe8aa8223823ad2cc
SHA256
4be33f74cf1685636bb1bdf32c39b65bbe033e20d7a8a5ef64de7a990a36eb4b
SHA512
ea0cfafec6eaf1ce1d7494e9b6c15832a0f1c42b78257ab47d04558044c15ac63e6fe4323f94566ae06da43d27aef93b340e182318c5ac9be9db06b495569238
SSDEEP
3072:POiUY6LUoWJzxBLyIC1nMCe8KE+bu3Ie01R6x:PR6g5zjI1McJYP1O
resource | yara_rule |
---|---|
static1/unpack001/PsmPlayer 5.0.exe | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
unpack001/PsmPlayer 5.0.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE