wsGetWndInfo
wsHookGetWndInfo
wsHookGetWndText
wsInitData
wsReadWndInfo
wsSetWndHook
wsUnSetWndHook
Overview
overview
3Static
static
3WindowSpyc...py.chm
windows7-x64
1WindowSpyc...py.chm
windows10-2004-x64
1WindowSpyc...py.dll
windows7-x64
3WindowSpyc...py.dll
windows10-2004-x64
3WindowSpyc...py.exe
windows7-x64
3WindowSpyc...py.exe
windows10-2004-x64
3WindowSpyc...��.url
windows7-x64
1WindowSpyc...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
WindowSpychs-v1.6/WndSpy.chm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WindowSpychs-v1.6/WndSpy.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
WindowSpychs-v1.6/WndSpy.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
WindowSpychs-v1.6/WndSpy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
WindowSpychs-v1.6/WndSpy.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
WindowSpychs-v1.6/WndSpy.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
WindowSpychs-v1.6/新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
WindowSpychs-v1.6/新云软件.url
Resource
win10v2004-20240802-en
Target
d22365aefcaa97305564a383d89f1969_JaffaCakes118
Size
104KB
MD5
d22365aefcaa97305564a383d89f1969
SHA1
e8e34a10ba6d22a7747c369451dd4121cbac6db1
SHA256
8d8626c607c3a1fa48a00503d7e5fe9bb663ade73cb910cfbccef5b43bc97aa0
SHA512
08c63880d4a4a91d2e66d0132014c2e5f2c9bb54e79234d442fdf7e27a00cf6d9aca434b169a8f91634b6b8ca431752c3ca0f950dbf71b9b14a390eb4c63cb39
SSDEEP
3072:R+VSjRe6SiziWCLO2eqbdopArkiy3O0FrxO84JH:RiirNio25doigbz08g
Checks for missing Authenticode signature.
resource |
---|
unpack001/WindowSpychs-v1.6/WndSpy.dll |
unpack001/WindowSpychs-v1.6/WndSpy.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleW
lstrcpynW
GetCommandLineW
GetModuleFileNameW
GetCurrentDirectoryW
GetPriorityClass
GetCurrentProcess
lstrlenW
FormatMessageW
GetLastError
MultiByteToWideChar
lstrlenA
lstrcmpiW
lstrcatW
GetSystemDirectoryW
DisableThreadLibraryCalls
SendMessageTimeoutW
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
wsprintfW
GetWindowLongA
GetClassLongA
GetClassLongW
GetWindowLongW
IsWindowUnicode
ClientToScreen
GetClientRect
GetWindowRect
GetWindowInfo
GetClassNameW
GetDesktopWindow
wsGetWndInfo
wsHookGetWndInfo
wsHookGetWndText
wsInitData
wsReadWndInfo
wsSetWndHook
wsUnSetWndHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
SetForegroundWindow
GetDeviceCaps
GetOpenFileNameW
RegSetValueExW
DragQueryFileW
CoInitialize
SysFreeString
ColorRGBToHLS
_controlfp
ImageList_Create
PlaySoundW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE