Pass2NextHook
SetHook
SetUnhook
_KeyboardProc@12
Overview
overview
3Static
static
3Bihua Input/bihua.exe
windows7-x64
1Bihua Input/bihua.exe
windows10-2004-x64
3Bihua Inpu...a.html
windows7-x64
1Bihua Inpu...a.html
windows10-2004-x64
1Bihua Inpu...ne.dll
windows7-x64
1Bihua Inpu...ne.dll
windows10-2004-x64
1Bihua Inpu...o.html
windows7-x64
1Bihua Inpu...o.html
windows10-2004-x64
1Bihua Inpu...��.url
windows7-x64
1Bihua Inpu...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Bihua Input/bihua.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Bihua Input/bihua.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Bihua Input/bihua.html
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Bihua Input/bihua.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Bihua Input/engine.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Bihua Input/engine.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Bihua Input/shubiao.html
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Bihua Input/shubiao.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Bihua Input/新云软件.url
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Bihua Input/新云软件.url
Resource
win10v2004-20240709-en
Target
322ce91d74aa18aa384d83671cc56b0b_JaffaCakes118
Size
2.6MB
MD5
322ce91d74aa18aa384d83671cc56b0b
SHA1
15a6a394b0251a3ef7738faa79b70d3f24308c82
SHA256
2d5f4a63bc8a63f6f9b9988ac7be5f2098a3caeb05d98b8c22c8338a9fc4b3c5
SHA512
e95156273cbdb34a7dcb7409e1b1073a84ffeb60bf5032030ee2d551a0660108135636f04c0c157ed0a6686b630e7475508fee1cba19bc18e480d3b3245f8860
SSDEEP
49152:tWdOBNn21mmor9MOMrb885BVC0GtR40oh/c7mv/h0zBb//tzVJQ9aHUe:tWQemmorZMk85BVC0ARToh/c7ICzhVjv
Checks for missing Authenticode signature.
resource |
---|
unpack001/Bihua Input/bihua.exe |
unpack001/Bihua Input/engine.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord656
ord818
ord5929
ord800
ord5210
ord537
ord2810
ord540
ord535
ord823
ord922
ord538
ord1165
ord5261
ord4992
ord6048
ord4073
ord1767
ord4401
ord5237
ord2377
ord5157
ord6370
ord4347
ord5276
ord3793
ord4831
ord4435
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord5257
ord2438
ord2116
ord5273
ord4621
ord4419
ord3592
ord324
ord6051
ord1768
ord5286
ord3397
ord3605
ord567
ord1143
ord2127
ord2294
ord4229
ord6211
ord4219
ord6195
ord536
ord4294
ord4282
ord641
ord3087
ord755
ord470
ord2371
ord4847
ord4370
ord2680
ord2859
ord2078
ord4390
ord3569
ord640
ord809
ord609
ord323
ord556
ord4270
ord4279
ord2406
ord2397
ord5047
ord5977
ord3871
ord5871
ord2854
ord613
ord6871
ord289
ord2114
ord4155
ord6354
ord1088
ord6193
ord3566
ord3621
ord3658
ord283
ord3568
ord4128
ord4292
ord5784
ord472
ord2559
ord3688
ord1634
ord1633
ord5781
ord2567
ord772
ord500
ord3792
ord5856
ord1761
ord4273
ord2855
ord1941
ord4029
ord1131
ord5939
ord2613
ord2506
ord815
ord825
ord561
ord3733
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord1569
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord5303
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord3805
ord939
ord4704
ord4667
strchr
strncmp
strcmp
srand
strcat
__CxxFrameHandler
strcpy
??1type_info@@UAE@XZ
_CxxThrowException
memset
wcscpy
_exit
_XcptFilter
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
exit
strrchr
sprintf
_ftol
free
malloc
strlen
wcslen
wcsncpy
fwrite
fclose
fread
rewind
ftell
fseek
fopen
strncpy
rand
fgets
CloseHandle
WritePrivateProfileStringA
GetProcAddress
LoadLibraryA
WinExec
GetVersionExW
GetModuleHandleW
GetStartupInfoW
GlobalLock
GlobalUnlock
GetTickCount
DeleteFileA
OutputDebugStringA
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
GetPrivateProfileStringA
WritePrivateProfileStringW
GetPrivateProfileIntW
GetLocalTime
GetLastError
GetPrivateProfileIntA
FreeLibrary
GetModuleFileNameA
lstrlenW
lstrlenA
LocalFree
CreateMutexA
GetKeyState
DrawTextW
FillRect
TrackPopupMenuEx
SetCursor
DestroyIcon
DestroyCursor
DestroyMenu
GetDesktopWindow
KillTimer
OpenClipboard
GetClipboardData
CloseClipboard
GetForegroundWindow
GetWindowThreadProcessId
GetGUIThreadInfo
WindowFromPoint
GetParent
GetSysColor
GetActiveWindow
InvalidateRect
ClientToScreen
PostMessageW
GetWindowTextA
DrawFocusRect
DrawStateW
FrameRect
OffsetRect
InflateRect
CopyRect
GetIconInfo
GetClientRect
IsIconic
DrawIcon
GetSystemMetrics
SetPropA
SetTimer
GetWindowRect
SystemParametersInfoW
SetForegroundWindow
IsWindowVisible
LoadMenuW
GetSubMenu
GetCursorPos
TrackPopupMenu
LoadIconW
EnableWindow
LoadImageW
RegisterWindowMessageW
EqualRect
UnionRect
keybd_event
GetWindowLongW
CreateIconIndirect
GetDC
ReleaseDC
PostQuitMessage
MessageBoxW
SendMessageW
GetPropA
EnumWindows
GetNextDlgTabItem
GetPixel
SetPixel
CreateCompatibleBitmap
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
DeleteObject
CreateFontA
GetObjectW
Shell_NotifyIconA
ShellExecuteExW
Shell_NotifyIconW
SHGetSpecialFolderPathW
ShellExecuteA
_TrackMouseEvent
GetErrorInfo
SetErrorInfo
CreateErrorInfo
VariantChangeType
VariantClear
VariantCopy
VariantInit
SysFreeString
SysAllocString
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??8std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
PathAppendW
PathFileExistsW
PathFileExistsA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
PlaySoundW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
GetStdHandle
CloseHandle
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapAlloc
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetFilePointer
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
SendMessageA
Pass2NextHook
SetHook
SetUnhook
_KeyboardProc@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ