HookAllHookEx
HookKBHookEx
UnHookAllHookEx
UnHookKBHookEx
Overview
overview
7Static
static
3HookDll.dll
windows7-x64
1HookDll.dll
windows10-2004-x64
1NTFSys.dll
windows7-x64
1NTFSys.dll
windows10-2004-x64
1NetSet.exe
windows7-x64
1NetSet.exe
windows10-2004-x64
1NewFace2.dll
windows7-x64
3NewFace2.dll
windows10-2004-x64
3SEBarClt.exe
windows7-x64
7SEBarClt.exe
windows10-2004-x64
7SEBarSvr.exe
windows7-x64
7SEBarSvr.exe
windows10-2004-x64
7SEReg.exe
windows7-x64
1SEReg.exe
windows10-2004-x64
1SEUpdate.exe
windows7-x64
7SEUpdate.exe
windows10-2004-x64
7SyncExp.exe
windows7-x64
1SyncExp.exe
windows10-2004-x64
3SyncExpSim.exe
windows7-x64
1SyncExpSim.exe
windows10-2004-x64
3TimeDll.dll
windows7-x64
1TimeDll.dll
windows10-2004-x64
1帮助.chm
windows7-x64
1帮助.chm
windows10-2004-x64
1SEBarClt.exe
windows7-x64
1SEBarClt.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
HookDll.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
HookDll.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
NTFSys.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
NTFSys.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
NetSet.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
NetSet.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
NewFace2.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
NewFace2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
SEBarClt.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
SEBarClt.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
SEBarSvr.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
SEBarSvr.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SEReg.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SEReg.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
SEUpdate.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
SEUpdate.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
SyncExp.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
SyncExp.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
SyncExpSim.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
SyncExpSim.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
TimeDll.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
TimeDll.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
帮助.chm
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
帮助.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
SEBarClt.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
SEBarClt.exe
Resource
win10v2004-20231215-en
Target
8d023eca550f13b8709d3ab859dcb589
Size
2.5MB
MD5
8d023eca550f13b8709d3ab859dcb589
SHA1
524f38b5c07577fdc57b22e48ed05d7687f550f8
SHA256
c9c32965ce2b08a2af92139d04daa921490bb6027a6ed3160272874f90de4d41
SHA512
50c9ad0c1da6ea81c030c6c0727c9e73d092f2119debc1f8617379dce1f924c7043a56f73617fbd22bb459a2a65b257bf7a7832c247f5b181078a35d8fcd6c37
SSDEEP
49152:dUJSxnzM2rteRDUGKjmcIZzM79C8FBVUGkJcJMEniK+ty8WQ6DcNvf:dUExnfeD3FT+VkJ0UKNDc
Checks for missing Authenticode signature.
resource |
---|
unpack001/HookDll.dll |
unpack001/NTFSys.dll |
unpack001/NetSet.exe |
unpack001/NewFace2.dll |
unpack001/SEBarClt.exe |
unpack001/SEBarSvr.exe |
unpack001/SEReg.exe |
unpack001/SEUpdate.exe |
unpack001/SyncExp.exe |
unpack001/SyncExpSim.exe |
unpack001/TimeDll.dll |
unpack002/SEBarClt.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
UnrealizeObject
IsEqualGUID
ImageList_SetIconSize
HookAllHookEx
HookKBHookEx
UnHookAllHookEx
UnHookKBHookEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetFile
GetFileLongName_TestA
GetFileLongName_TestB
GetFileLongName_Info
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
UnrealizeObject
IsEqualGUID
ImageList_SetIconSize
WSACleanup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
??0CFirstStr@@QAE@XZ
??4CGetFirst@@QAEAAV0@ABV0@@Z
?fnNewFace2@@YAHXZ
?nNewFace2@@3HA
GetFirst
GetSecondA
GoOut
IsF
Get_TheNextStrA
GetIn
IntoIt
OutIt
OutAll
OutAll_A
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
UnrealizeObject
IsEqualGUID
ImageList_SetIconSize
Shell_NotifyIconA
WSACleanup
Netbios
SendARP
timeSetEvent
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
VerQueryValueA
UnrealizeObject
CoUninitialize
LBItemFromPt
Shell_NotifyIconA
GetSaveFileNameA
Netbios
WSACleanup
timeSetEvent
GetFileLongName_TestA
UnHookKBHookEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
UnrealizeObject
IsEqualGUID
ImageList_SetIconSize
ShellExecuteA
WSACleanup
GetFileLongName_TestA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
UnrealizeObject
IsEqualGUID
ImageList_SetIconSize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
VerQueryValueA
UnrealizeObject
CoUninitialize
LBItemFromPt
Shell_NotifyIconA
GetOpenFileNameA
timeSetEvent
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
WNetCancelConnection2A
VerQueryValueA
UnrealizeObject
IsEqualGUID
ImageList_SetIconSize
OpenPrinterA
Shell_NotifyIconA
GetOpenFileNameA
timeSetEvent
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
UnrealizeObject
IsEqualGUID
ImageList_SetIconSize
WSACleanup
TimeDllFinish
TimeDllGetTime
TimeDllInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
UnrealizeObject
IsEqualGUID
ImageList_SetIconSize
Shell_NotifyIconA
WSACleanup
Netbios
SendARP
timeSetEvent
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE