Hookkeyin
Hookkeyun
Behavioral task
behavioral1
Sample
DNF-XHA V3.[2].0版(可单刷)/HA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
DNF-XHA V3.[2].0版(可单刷)/HA.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
DNF-XHA V3.[2].0版(可单刷)/HAHook.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
DNF-XHA V3.[2].0版(可单刷)/HAHook.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
xin037.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
xin037.exe
Resource
win10v2004-20231215-en
Target
059b115b97db2af79bb6b832e94f9807
Size
85KB
MD5
059b115b97db2af79bb6b832e94f9807
SHA1
8b3f6d50ffcd6589f3d0ea24d48d376cc35cf312
SHA256
8df2b918b0949b6c1e8296c8bd38d31bfb2f5501d0e2e2bc897bf64cbe04a161
SHA512
f6611b963397b71ed4db058acfd573ea40d242b5086af014763d9768b08a338f2d8f57ecd1fdb285ba6dd2fc3234a6d931a38e1aa9805ad67bcfdadc51346d21
SSDEEP
1536:2tCUpBNwZsyfqqinJ/SxXYP7AtXQx8NQ3TZEB2mgsJDXIeTsqk5Df:2tCU+IqNxXWfx8NEGBVJDXPpaDf
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/DNF-XHA V3.[2].0版(可单刷)/HAHook.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/DNF-XHA V3.[2].0版(可单刷)/HA.EXE | upx |
static1/unpack001/DNF-XHA V3.[2].0版(可单刷)/HAHook.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/DNF-XHA V3.[2].0版(可单刷)/HA.EXE |
unpack001/DNF-XHA V3.[2].0版(可单刷)/HAHook.dll |
unpack001/xin037.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Hookkeyin
Hookkeyun
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
wsprintfA
ReadFile
lstrlenA
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
GetModuleFileNameA
GetProcAddress
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcpyA
SetFilePointer
VirtualAlloc
VirtualFree
WriteFile
lstrcatA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE