Pass2NextHook
SetHook
SetUnhook
_KeyboardProc@12
Overview
overview
5Static
static
3Bihua Input/bihua.exe
windows7-x64
5Bihua Input/bihua.exe
windows10-2004-x64
5Bihua Inpu...a2.dll
windows7-x64
1Bihua Inpu...a2.dll
windows10-2004-x64
1Bihua Inpu...es.dll
windows7-x64
3Bihua Inpu...es.dll
windows10-2004-x64
3Bihua Inpu...ne.dll
windows7-x64
3Bihua Inpu...ne.dll
windows10-2004-x64
3Bihua Input/once.dll
windows7-x64
3Bihua Input/once.dll
windows10-2004-x64
3Bihua Inpu...e2.dll
windows7-x64
1Bihua Inpu...e2.dll
windows10-2004-x64
1Bihua Inpu...ua.dll
windows7-x64
3Bihua Inpu...ua.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Bihua Input/bihua.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Bihua Input/bihua.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Bihua Input/bihua2.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Bihua Input/bihua2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Bihua Input/bihuares.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Bihua Input/bihuares.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Bihua Input/engine.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Bihua Input/engine.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Bihua Input/once.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Bihua Input/once.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Bihua Input/stroke2.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Bihua Input/stroke2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Bihua Input/zzbihua.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Bihua Input/zzbihua.dll
Resource
win10v2004-20240802-en
Target
b5ea335ee5be3b43cb99b7de337f205e_JaffaCakes118
Size
3.4MB
MD5
b5ea335ee5be3b43cb99b7de337f205e
SHA1
8b0ee48b891f5adfed75e0545439d1c33903aa7d
SHA256
1dbd34cb7a3e1d36544fc58b3f4282efc3e438e98e4a058fe4bebf283b17561e
SHA512
12b6dca4a9022bae942d4c19500c2938a540d3a06bf5831d201a7edb9c9256301b54ca4f4e52ceaf8b8c10cf45f76deca6fd9ee0905c1573de464e4f87d4d3de
SSDEEP
98304:la+NlBKK8Zs1Ja135pIkqAkwnNP2BEy6u:tlBKfZsa135KekwnNP/u
Checks for missing Authenticode signature.
resource |
---|
unpack001/Bihua Input/bihua.exe |
unpack001/Bihua Input/bihuares.dll |
unpack001/Bihua Input/engine.dll |
unpack001/Bihua Input/once.dll |
unpack001/Bihua Input/zzbihua.ime |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord5303
ord5285
ord5710
ord4616
ord4418
ord3733
ord561
ord815
ord656
ord818
ord939
ord3805
ord5929
ord5939
ord2613
ord1131
ord1165
ord3605
ord6051
ord1768
ord5286
ord3397
ord1143
ord567
ord2127
ord2294
ord6211
ord536
ord4294
ord3087
ord2680
ord2371
ord3658
ord2567
ord3566
ord3621
ord4390
ord3569
ord640
ord809
ord609
ord323
ord556
ord2406
ord5781
ord4270
ord4279
ord2397
ord5047
ord5977
ord5871
ord2854
ord613
ord1634
ord1633
ord4692
ord289
ord2114
ord4155
ord6354
ord1088
ord6193
ord3568
ord283
ord3688
ord4128
ord4292
ord5784
ord472
ord2559
ord2855
ord2634
ord4219
ord500
ord772
ord5856
ord3792
ord1761
ord922
ord537
ord940
ord942
ord4273
ord1921
ord3716
ord3614
ord795
ord755
ord5674
ord6168
ord3870
ord3867
ord6017
ord5732
ord470
ord3084
ord4282
ord2078
ord1197
ord4124
ord1941
ord4029
ord5210
ord2810
ord3737
ord6437
ord1230
ord861
ord6597
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord4667
ord4050
ord2637
ord1771
ord823
ord858
ord4704
ord2859
ord3871
ord6195
ord4229
ord641
ord324
ord3592
ord4419
ord4621
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord825
ord4401
ord1767
ord4073
ord6048
ord2506
ord4992
ord4847
ord4370
ord5261
ord535
ord540
ord941
ord6868
ord538
ord800
ord6871
ord1569
strcpy
strcat
__CxxFrameHandler
_wcsdup
malloc
fwrite
fread
rewind
ftell
fseek
strtok
_exit
_XcptFilter
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_controlfp
_strcmpi
memset
atoi
strlen
_wcsicmp
memcpy
fclose
fopen
wcsrchr
strrchr
strstr
strncpy
fgets
wcscpy
strcmp
exit
strchr
strncmp
memmove
wcslen
_ftol
wcsncpy
wcscat
srand
isdigit
strncat
sprintf
wcschr
_CxxThrowException
atol
free
DeviceIoControl
CreateFileA
HeapFree
HeapAlloc
GetProcessHeap
GetFileSize
ReadFile
WriteFile
FreeLibrary
WaitForSingleObject
lstrcpynW
InterlockedIncrement
WideCharToMultiByte
GetVersionExW
GetModuleHandleW
GetStartupInfoW
LoadLibraryA
GetProcAddress
GetTickCount
CopyFileA
GetSystemDirectoryW
CopyFileW
WinExec
GetPrivateProfileIntA
SetFileAttributesA
GetModuleFileNameA
WritePrivateProfileStringA
CreateDirectoryA
DeleteFileA
GetCommandLineA
GetLastError
CreateMutexA
GetSystemDirectoryA
OutputDebugStringA
MultiByteToWideChar
CloseHandle
Sleep
CreateThread
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
InterlockedDecrement
SetEvent
GetModuleFileNameW
lstrlenW
lstrlenA
LocalFree
GetPrivateProfileStringA
GetWindowThreadProcessId
GetGUIThreadInfo
FrameRect
LoadImageW
GetIconInfo
CreateIconIndirect
GetDC
ReleaseDC
GetSysColor
SendMessageA
GetWindowTextA
EqualRect
UnionRect
GetDlgItemTextA
SetDlgItemTextA
LoadCursorW
DrawIconEx
DrawTextW
FillRect
GetKeyState
MessageBoxA
EnableWindow
ScreenToClient
PtInRect
UpdateWindow
InsertMenuW
GetMenuItemCount
GetMenuStringW
GetMenuItemID
TrackMouseEvent
EnumChildWindows
DrawStateW
OffsetRect
GetClientRect
CopyRect
InflateRect
DrawFocusRect
TrackPopupMenuEx
ClientToScreen
WindowFromPoint
GetActiveWindow
InvalidateRect
SetCursor
GetNextDlgTabItem
GetWindowLongW
DestroyIcon
DestroyCursor
DestroyMenu
LoadMenuW
GetSubMenu
GetCursorPos
SetForegroundWindow
TrackPopupMenu
SystemParametersInfoW
GetWindowRect
IsWindowVisible
LoadIconW
GetForegroundWindow
GetClipboardData
OpenClipboard
SetClipboardData
CloseClipboard
GetClassNameA
SendMessageW
keybd_event
GetPropA
EnumWindows
MessageBoxW
GetParent
ShowCursor
RegisterWindowMessageW
SetTimer
SetPropA
DrawIcon
GetSystemMetrics
IsIconic
GetDesktopWindow
GetClassNameW
KillTimer
PostMessageW
ModifyMenuW
CreateFontIndirectW
CreateSolidBrush
GetTextExtentPoint32W
CreatePen
TextOutW
CreateFontW
GetObjectW
GetPixel
SetPixel
CreateBitmap
SelectObject
SetBkColor
SetTextColor
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetStockObject
DeleteObject
CreateFontA
Rectangle
RegOpenKeyA
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetFolderPathA
ShellExecuteA
ShellExecuteW
SHGetSpecialFolderPathA
SHGetFolderPathW
Shell_NotifyIconW
ShellExecuteExW
_TrackMouseEvent
CoUninitialize
CoInitialize
CoCreateInstance
VariantChangeType
SysAllocString
VariantCopy
VariantClear
VariantInit
SysFreeString
GetErrorInfo
SetErrorInfo
CreateErrorInfo
URLDownloadToCacheFileA
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??8std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_Xran@std@@YAXXZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?_Copy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@PBG@Z
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
SHDeleteValueA
StrRStrIA
SHSetValueA
PathFileExistsA
StrTrimA
StrStrIA
StrStrIW
PathFileExistsW
SHGetValueA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpEndRequestW
InternetWriteFile
HttpSendRequestExW
InternetSetCookieA
InternetReadFile
FtpOpenFileA
InternetSetStatusCallbackW
HttpSendRequestExA
InternetOpenUrlA
HttpSendRequestA
InternetOpenA
InternetConnectA
HttpQueryInfoW
InternetCloseHandle
InternetAttemptConnect
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
PlaySoundW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_adjust_fdiv
malloc
_initterm
free
DisableThreadLibraryCalls
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
GetStdHandle
CloseHandle
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapAlloc
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetFilePointer
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
SendMessageA
Pass2NextHook
SetHook
SetUnhook
_KeyboardProc@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
RegSetValueExA
RegCloseKey
RegOpenKeyExA
free
_initterm
malloc
_adjust_fdiv
__dllonexit
_onexit
__CxxFrameHandler
once1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
RtlUnwind
GetVersionExA
CompareStringW
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetStringTypeW
GetSystemDirectoryA
GetPrivateProfileStringA
WinExec
DeleteFileA
GetModuleFileNameW
GetUserDefaultLCID
OutputDebugStringA
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetLastError
CloseHandle
InitializeCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
HeapAlloc
FatalAppExitA
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
InterlockedDecrement
InterlockedIncrement
CreateFileA
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
Sleep
SetEndOfFile
ReadFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
SetEnvironmentVariableA
DefWindowProcW
EndDialog
DialogBoxParamW
IsWindow
UnregisterClassW
LoadCursorW
RegisterClassExW
MessageBoxW
SystemParametersInfoW
GetWindowRect
SetWindowPos
ImmGenerateMessage
ImmUnlockIMC
ImmReSizeIMCC
ImmLockIMCC
ImmUnlockIMCC
ImmInstallIMEW
ImmLockIMC
ImeConfigure
ImeConversionList
ImeDestroy
ImeEnumRegisterWord
ImeEscape
ImeGetRegisterWordStyle
ImeInquire
ImeProcessKey
ImeRegisterWord
ImeSelect
ImeSetActiveContext
ImeSetCompositionString
ImeToAsciiEx
ImeUnregisterWord
NotifyIME
install
installbox
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ