Pass2NextHook
SetHook
SetUnhook
_KeyboardProc@12
Overview
overview
7Static
static
3c07c714105...d8.rar
windows7-x64
3c07c714105...d8.rar
windows10-2004-x64
7Bihua Input/bihua.exe
windows7-x64
6Bihua Input/bihua.exe
windows10-2004-x64
6Bihua Inpu...a.html
windows7-x64
1Bihua Inpu...a.html
windows10-2004-x64
1Bihua Inpu...u.html
windows7-x64
1Bihua Inpu...u.html
windows10-2004-x64
1Bihua Inpu...ne.dll
windows7-x64
1Bihua Inpu...ne.dll
windows10-2004-x64
1Bihua Inpu...o.html
windows7-x64
1Bihua Inpu...o.html
windows10-2004-x64
1Bihua Inpu...��.url
windows7-x64
1Bihua Inpu...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
c07c714105b484d3de617db0991a65d8.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c07c714105b484d3de617db0991a65d8.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Bihua Input/bihua.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Bihua Input/bihua.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Bihua Input/bihua.html
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Bihua Input/bihua.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Bihua Input/bushou.html
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Bihua Input/bushou.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Bihua Input/engine.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Bihua Input/engine.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Bihua Input/shubiao.html
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Bihua Input/shubiao.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Bihua Input/新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Bihua Input/新云软件.url
Resource
win10v2004-20240226-en
Target
c07c714105b484d3de617db0991a65d8
Size
2.7MB
MD5
c07c714105b484d3de617db0991a65d8
SHA1
d520e0dceb0cb95d7f2113240558b1ef21afcbe7
SHA256
8d0f82d72f119c752b9f577eabe69a50d4ab70343035395601d7574ccd1772e2
SHA512
899086b49c968943af164d46a5f6742a7e62dee2fc48561396beb32bab54e4d0ca19c77f46e91902907fe95f665ed799d9b8fb442eb0b7f795f6a55a295289f4
SSDEEP
49152:ltcXmuzJ9YtMu9bLRcUVIbnnbiTaKfjTX6v+ucntza7dI1jH1nEp/O86gFMz/:lYmuzJeMIRPVI7+Ta8vqmuSahTOQ2
Checks for missing Authenticode signature.
resource |
---|
unpack001/Bihua Input/bihua.exe |
unpack001/Bihua Input/engine.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord6048
ord4073
ord1767
ord4401
ord5237
ord2377
ord5157
ord6370
ord4347
ord5276
ord3793
ord4831
ord4435
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord5257
ord2438
ord2116
ord5273
ord4621
ord4419
ord3592
ord324
ord6051
ord1768
ord5286
ord3397
ord3605
ord567
ord1143
ord2127
ord2294
ord4229
ord6211
ord4219
ord536
ord4294
ord4282
ord6195
ord4704
ord3087
ord755
ord470
ord2371
ord4847
ord4370
ord2680
ord2859
ord2078
ord4390
ord3569
ord640
ord809
ord4992
ord323
ord556
ord4270
ord4279
ord2406
ord2397
ord5047
ord5977
ord3871
ord5871
ord2854
ord613
ord6871
ord289
ord2114
ord4155
ord6354
ord1088
ord6193
ord3566
ord3621
ord3658
ord283
ord3568
ord4128
ord4292
ord5784
ord472
ord2559
ord3688
ord1634
ord1633
ord5781
ord2567
ord2855
ord772
ord500
ord3792
ord5856
ord1761
ord4273
ord1921
ord795
ord5674
ord6168
ord3870
ord3867
ord6017
ord5732
ord3084
ord3614
ord3716
ord942
ord940
ord1941
ord4029
ord5261
ord1165
ord538
ord861
ord922
ord5929
ord818
ord656
ord641
ord1131
ord2613
ord5939
ord2506
ord815
ord561
ord3733
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord1569
ord5303
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord535
ord823
ord825
ord540
ord2810
ord537
ord5210
ord800
ord3805
ord939
ord609
ord4667
isdigit
atoi
wcscpy
strncat
strcat
__CxxFrameHandler
_ftol
strcpy
memcpy
_CxxThrowException
atol
_XcptFilter
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
??1type_info@@UAE@XZ
_controlfp
memset
strrchr
exit
sprintf
free
malloc
strlen
wcslen
fwrite
fclose
fread
rewind
ftell
fseek
fopen
strstr
wcsncpy
strncpy
fgets
srand
strcmp
strncmp
strchr
_exit
LoadLibraryA
FreeLibrary
DeviceIoControl
CreateFileA
HeapFree
HeapAlloc
GetProcessHeap
GetProcAddress
ReadFile
WriteFile
SetEvent
WaitForSingleObject
GetModuleHandleW
GetStartupInfoW
Sleep
WritePrivateProfileStringA
CloseHandle
WinExec
GlobalLock
GlobalUnlock
GetTickCount
DeleteFileA
GetPrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileIntW
WritePrivateProfileStringW
GetPrivateProfileIntA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
OutputDebugStringA
GetCommandLineA
GetVersionExW
GetFileSize
CreateMutexA
lstrlenW
lstrlenA
LocalFree
GetLastError
GetDlgItemTextA
CopyRect
GetIconInfo
CreateIconIndirect
GetDC
ReleaseDC
GetSysColor
DrawTextW
FillRect
TrackPopupMenuEx
SetCursor
DestroyIcon
DestroyCursor
DestroyMenu
GetDesktopWindow
KillTimer
OpenClipboard
GetClipboardData
CloseClipboard
GetForegroundWindow
GetWindowThreadProcessId
SetDlgItemTextA
ShowCursor
TrackMouseEvent
DrawIconEx
LoadCursorW
GetWindowTextA
EqualRect
UnionRect
PostMessageW
keybd_event
InsertMenuW
GetWindowLongW
WindowFromPoint
InflateRect
GetParent
GetNextDlgTabItem
GetActiveWindow
GetClientRect
IsIconic
DrawIcon
GetSystemMetrics
SetPropA
SetTimer
GetWindowRect
SystemParametersInfoW
PostQuitMessage
SetForegroundWindow
IsWindowVisible
LoadMenuW
GetSubMenu
GetCursorPos
TrackPopupMenu
LoadIconW
EnableWindow
LoadImageW
RegisterWindowMessageW
InvalidateRect
ClientToScreen
DrawFocusRect
SendMessageW
DrawStateW
FrameRect
OffsetRect
GetGUIThreadInfo
EnumWindows
GetPropA
GetKeyState
TextOutW
CreateFontW
CreateSolidBrush
CreatePen
GetObjectW
GetPixel
SetPixel
CreateCompatibleBitmap
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
DeleteObject
CreateFontA
GetTextExtentPoint32W
Shell_NotifyIconA
ShellExecuteA
Shell_NotifyIconW
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteExW
_TrackMouseEvent
VariantCopy
SysAllocString
SysFreeString
VariantInit
GetErrorInfo
SetErrorInfo
CreateErrorInfo
VariantChangeType
VariantClear
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??8std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
PathAppendW
PathFileExistsW
PathFileExistsA
PlaySoundW
InternetSetCookieA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpEndRequestW
InternetWriteFile
HttpSendRequestA
HttpQueryInfoW
InternetReadFile
FtpOpenFileA
InternetSetStatusCallbackW
HttpSendRequestExA
InternetOpenA
InternetConnectA
InternetAttemptConnect
HttpSendRequestExW
InternetCloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
GetStdHandle
CloseHandle
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapAlloc
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetFilePointer
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
SendMessageA
Pass2NextHook
SetHook
SetUnhook
_KeyboardProc@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ