Hook
Unhook
_KeyboardProc@12
registerInterest
Overview
overview
7Static
static
72ad1a06f02...1b.cab
windows7-x64
12ad1a06f02...1b.cab
windows10-2004-x64
1Uninstall.exe
windows7-x64
1Uninstall.exe
windows10-2004-x64
1data/SpyRe...ec.exe
windows7-x64
7data/SpyRe...ec.exe
windows10-2004-x64
7data/SpyRe...ol.exe
windows7-x64
7data/SpyRe...ol.exe
windows10-2004-x64
7data/SpyRe...ol.exe
windows7-x64
7data/SpyRe...ol.exe
windows10-2004-x64
7data/SpyRe...bh.dll
windows7-x64
1data/SpyRe...bh.dll
windows10-2004-x64
1data/SpyRe...bt.dll
windows7-x64
1data/SpyRe...bt.dll
windows10-2004-x64
1data/SpyRe...il.htm
windows7-x64
1data/SpyRe...il.htm
windows10-2004-x64
1data/SpyRe...rt.htm
windows7-x64
1data/SpyRe...rt.htm
windows10-2004-x64
1data/SpyRe...og.htm
windows7-x64
1data/SpyRe...og.htm
windows10-2004-x64
1data/SpyRe...og.htm
windows7-x64
1data/SpyRe...og.htm
windows10-2004-x64
1data/SpyRe...pp.htm
windows7-x64
1data/SpyRe...pp.htm
windows10-2004-x64
1data/SpyRe...nv.htm
windows7-x64
1data/SpyRe...nv.htm
windows10-2004-x64
1data/SpyRe...og.htm
windows7-x64
1data/SpyRe...og.htm
windows10-2004-x64
1data/SpyRe...og.htm
windows7-x64
1data/SpyRe...og.htm
windows10-2004-x64
1data/SpyRe...og.htm
windows7-x64
1data/SpyRe...og.htm
windows10-2004-x64
1Behavioral task
behavioral1
Sample
2ad1a06f02f0b167b39dfc83e261301b.cab
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ad1a06f02f0b167b39dfc83e261301b.cab
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Uninstall.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
data/SpyRecon/0/srvrec.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
data/SpyRecon/0/srvrec.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
data/SpyRecon/1/SFXTool.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
data/SpyRecon/1/SFXTool.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
data/SpyRecon/2/SFXTool.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
data/SpyRecon/2/SFXTool.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
data/SpyRecon/3/kbh.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
data/SpyRecon/3/kbh.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
data/SpyRecon/4/cbt.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
data/SpyRecon/4/cbt.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
data/SpyRecon/5/ConfirmEmail.htm
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
data/SpyRecon/5/ConfirmEmail.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
data/SpyRecon/5/view/GeneralReport.htm
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
data/SpyRecon/5/view/GeneralReport.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
data/SpyRecon/5/view/applog.htm
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
data/SpyRecon/5/view/applog.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
data/SpyRecon/5/view/imlog.htm
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
data/SpyRecon/5/view/imlog.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
data/SpyRecon/5/view/imlog_app.htm
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
data/SpyRecon/5/view/imlog_app.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
data/SpyRecon/5/view/imlog_conv.htm
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
data/SpyRecon/5/view/imlog_conv.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
data/SpyRecon/5/view/keylog.htm
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
data/SpyRecon/5/view/keylog.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
data/SpyRecon/5/view/scrlog.htm
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
data/SpyRecon/5/view/scrlog.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
data/SpyRecon/5/view/weblog.htm
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
data/SpyRecon/5/view/weblog.htm
Resource
win10v2004-20231215-en
Target
2ad1a06f02f0b167b39dfc83e261301b
Size
1.8MB
MD5
2ad1a06f02f0b167b39dfc83e261301b
SHA1
0601a236f6840e5f2703617154f4865c3e9a3742
SHA256
29c9f680cd14de939175abaa49fa055e0c1bc9b03f9208fade5d3c43be93a237
SHA512
9d8d9710826f54db1eaa98e17d873a5493b0ace109f762bceafe8495218d321e0f9786fedc35495a446b4b311dd183c322bcc4c3c261f4c571938c3b4ceef7e5
SSDEEP
49152:TOSVfk2xuQxGxrczS+LD+sH5oiyrQvTexEJWavcEOgN:TOSS2xs3+LpZoLrQvTexEhtN
resource | yara_rule |
---|---|
static1/unpack001/data/SpyRecon/0/srvrec.exe | upx |
static1/unpack001/data/SpyRecon/1/SFXTool.exe | upx |
static1/unpack001/data/SpyRecon/2/SFXTool.exe | upx |
static1/unpack001/data/SpyRecon/6/setup.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Uninstall.exe |
unpack001/data/SpyRecon/0/srvrec.exe |
unpack001/data/SpyRecon/1/SFXTool.exe |
unpack001/data/SpyRecon/2/SFXTool.exe |
unpack001/data/SpyRecon/3/kbh.dll |
unpack001/data/SpyRecon/4/cbt.dll |
unpack001/data/SpyRecon/6/setup.exe |
unpack001/data/SpyRecon/7/SFXModule.exe |
unpack001/plugins/0/StdUI.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
GetTickCount
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
RtlUnwind
GetActiveWindow
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
SendMessageA
Hook
Unhook
_KeyboardProc@12
registerInterest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
VirtualQuery
GetSystemInfo
VirtualProtect
GetCurrentThreadId
TlsSetValue
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsFree
SetLastError
TlsGetValue
GetLastError
TlsAlloc
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
LoadLibraryA
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
RtlUnwind
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetWindowModuleFileNameA
SendMessageA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
hook
unhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHGetSpecialFolderPathA
ShellExecuteA
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2512
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord815
ord922
ord1168
ord924
ord537
ord561
ord825
ord823
ord535
ord540
ord353
ord2554
ord4486
ord6375
ord4274
ord1576
ord2985
ord800
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
exit
_XcptFilter
_exit
_onexit
__dllonexit
__CxxFrameHandler
_mbscmp
_setmbcp
CreateDirectoryA
OpenMutexA
Sleep
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
CloseHandle
FindWindowA
SendMessageA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetPluginInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ