DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
977e2701c169f285e9c3944678b2ee80N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
977e2701c169f285e9c3944678b2ee80N.dll
Resource
win10v2004-20240802-en
Target
977e2701c169f285e9c3944678b2ee80N.exe
Size
28KB
MD5
977e2701c169f285e9c3944678b2ee80
SHA1
90a9d625444638436d5274e5df82c1acf3d15478
SHA256
5bbeb690b77188974631ccc1b1ae0ed96f3d3d54558ba36bacfb76d9e3148003
SHA512
de3452bf12796fed75bdad59e01b44d2a6d59dbcd8e25a0a2a23745de6cf090648dba8bad8a435b986fec989bccb47bf41c92b5aa02c0b45769b82a80db30cf9
SSDEEP
384:4mCem4kM6Be9HYUt0uzaT8bP2yAKdTOPfaMR2FBI:4mk66Be9HRt0uJP2yA1g
Checks for missing Authenticode signature.
resource |
---|
977e2701c169f285e9c3944678b2ee80N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MethCallEngine
ord516
ord518
ord595
ord520
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ProcCallEngine
ord648
ord685
ord101
ord102
ord103
ord689
ord104
ord105
ord616
ord617
ord618
ord619
ord546
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ