_CallWndProc@12
_CallWndProcD@12
_GetMsgProc@12
_KeyboardProc95@12
_MouseProc95@12
Overview
overview
7Static
static
7ha_HotkeyP...yP.exe
windows7-x64
7ha_HotkeyP...yP.exe
windows10-2004-x64
1ha_HotkeyP...lp.chm
windows7-x64
1ha_HotkeyP...lp.chm
windows10-2004-x64
1ha_HotkeyP...ok.dll
windows7-x64
3ha_HotkeyP...ok.dll
windows10-2004-x64
1ha_HotkeyP...yp.vbs
windows7-x64
1ha_HotkeyP...yp.vbs
windows10-2004-x64
1ha_HotkeyP...py.exe
windows7-x64
1ha_HotkeyP...py.exe
windows10-2004-x64
1ha_HotkeyP...��.url
windows7-x64
1ha_HotkeyP...��.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
ha_HotkeyP-v4.5/HotKeyP.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ha_HotkeyP-v4.5/HotKeyP.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ha_HotkeyP-v4.5/help.chm
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ha_HotkeyP-v4.5/help.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ha_HotkeyP-v4.5/hook.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ha_HotkeyP-v4.5/hook.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
ha_HotkeyP-v4.5/source/Hotkeyp.vbs
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
ha_HotkeyP-v4.5/source/Hotkeyp.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ha_HotkeyP-v4.5/spy.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
ha_HotkeyP-v4.5/spy.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
ha_HotkeyP-v4.5/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
ha_HotkeyP-v4.5/新云软件.url
Resource
win10v2004-20231215-en
Target
42ed429709527e7967bb2f30d365b724
Size
167KB
MD5
42ed429709527e7967bb2f30d365b724
SHA1
99b9274ebacf83e6a0d4502b93a20652a5813c6f
SHA256
7befbfb869082b05cc1042a98252e9a43c9afa19ea10b971727000e0ce99cb11
SHA512
1090a28f4411595ae6ec4cc799e140e62f23cee86e9ba0dd83326882cf24f428414638cfbefbef19d3689e4a98b371ee330bad5ab9387e4c106fee76b3ea0674
SSDEEP
3072:iNpA6XCW0CK5W+V6GhnVHtOjJlO8aMcuNi/hF+yfwbZ8YX0+Cf0X:iNp3XCV5Wy5F0O8PchwpXuw
resource | yara_rule |
---|---|
static1/unpack001/ha_HotkeyP-v4.5/HotKeyP.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/ha_HotkeyP-v4.5/HotKeyP.exe |
unpack002/out.upx |
unpack001/ha_HotkeyP-v4.5/hook.dll |
unpack001/ha_HotkeyP-v4.5/spy.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PostMessageA
CallNextHookEx
SendMessageA
IsWindow
FindWindowA
??3@YAXPAX@Z
sprintf
??2@YAPAXI@Z
strchr
strtol
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
_CallWndProc@12
_CallWndProcD@12
_GetMsgProc@12
_KeyboardProc95@12
_MouseProc95@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MultiByteToWideChar
GlobalLock
GlobalAlloc
GlobalUnlock
CreateToolhelp32Snapshot
GlobalFree
FreeLibrary
LoadLibraryA
GetVersionExA
Process32First
CloseHandle
GetProcAddress
GetCurrentProcessId
Process32Next
GetModuleHandleA
GetStartupInfoA
TranslateMessage
GetMessageA
PostMessageA
ShowWindow
CreateDialogParamA
RegisterClassA
DispatchMessageA
IsDialogMessageA
DefDlgProcA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
MessageBoxA
DrawTextA
GetWindowTextA
FillRect
PostQuitMessage
SetWindowPos
DestroyWindow
BeginDeferWindowPos
FindWindowA
GetClientRect
GetDlgItem
DeferWindowPos
EndDeferWindowPos
SetWindowsHookExA
GetWindowRect
ScreenToClient
GetWindowThreadProcessId
SetDlgItemTextA
UnhookWindowsHookEx
SendMessageA
GetClassNameA
InvalidateRect
LoadCursorA
LoadIconA
SetWindowLongA
DeleteObject
SetBkMode
SetTextColor
CreateSolidBrush
_controlfp
__set_app_type
__p__fmode
_except_handler3
_adjust_fdiv
__setusermatherr
__p__commode
__getmainargs
_acmdln
_initterm
_XcptFilter
_exit
exit
strchr
strlen
sprintf
strcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ