3.6
中危

db22918448227528a18aecf02cfdb6bdecbc180f5c2ed64c4b0c0ca378eb8c4e

03dd3192eb33342cea0ffd9bf42247a9.exe

分析耗时

23s

最近分析

文件大小

346.2KB
静态报毒 动态报毒 9761U4 AI SCORE=100 ARTEMIS B8BCVWX0C8U CLOUD CMNGK CONFIDENCE DANGEROUSSIG FOHDGP GDSDA GENERICKD HIGH CONFIDENCE JZSW MALWARE@#3CJ1GP5H52C4O MODERATE PHANTOM R002C0WCK19 ROZENA SCORE SUSPIG2 SWRORT TIGGRE 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!03DD3192EB33 20190417 6.0.6.653
Alibaba 20190402 0.3.0.4
Baidu 20190318 1.0.0.2
Avast Win32:DangerousSig [Trj] 20190417 18.4.3895.0
Tencent Win32.Trojan.Swrort.Gcb 20190418 1.0.0.1
Kingsoft 20190418 2013.8.14.323
CrowdStrike win/malicious_confidence_60% (W) 20190212 1.0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (2 个事件)
Time & API Arguments Status Return Repeated
1619134512.304315
NtAllocateVirtualMemory
process_identifier: 1544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12289 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x005e0000
success 0 0
1619134512.304315
NtAllocateVirtualMemory
process_identifier: 1544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12289 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00630000
success 0 0
网络通信
Communicates with host for which no DNS query was performed (2 个事件)
host 101.132.33.79
host 172.217.24.14
File has been identified by 38 AntiVirus engines on VirusTotal as malicious (38 个事件)
K7AntiVirus Trojan ( 004affda1 )
MicroWorld-eScan Trojan.GenericKD.31805534
FireEye Trojan.GenericKD.31805534
CAT-QuickHeal Trojan.Tiggre
McAfee Artemis!03DD3192EB33
K7GW Trojan ( 004affda1 )
Cyren W32/Trojan.JZSW-3079
ESET-NOD32 a variant of Win32/Agent.TFP
TrendMicro-HouseCall TROJ_GEN.R002C0WCK19
Avast Win32:DangerousSig [Trj]
Kaspersky Trojan.Win32.Swrort.bap
BitDefender Trojan.GenericKD.31805534
NANO-Antivirus Trojan.Win32.Generic.fohdgp
AegisLab Trojan.Win32.Swrort.4!c
Tencent Win32.Trojan.Swrort.Gcb
Endgame malicious (high confidence)
Emsisoft Trojan.GenericKD.31805534 (B)
Comodo Malware@#3cj1gp5h52c4o
F-Secure Trojan.TR/Agent.cmngk
McAfee-GW-Edition Artemis!Trojan
Trapmine malicious.moderate.ml.score
Sophos Troj/Phantom-B
Paloalto generic.ml
Avira TR/Agent.cmngk
MAX malware (ai score=100)
Antiy-AVL Trojan/Win32.Swrort
Microsoft Trojan:Win32/Tiggre!rfn
ZoneAlarm Trojan.Win32.Swrort.bap
GData Win32.Trojan.Agent.9761U4
AhnLab-V3 Win-Trojan/Suspig2.Exp
Ad-Aware Trojan.GenericKD.31805534
Rising Trojan.Agent!8.B1E (CLOUD)
Yandex Trojan.Swrort!B8bCvWx0c8U
Fortinet W32/Rozena.AAM!tr
AVG Win32:DangerousSig [Trj]
Cybereason malicious.2eb333
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_60% (W)
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 101.132.33.79:5555
dead_host 192.168.56.101:49175
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2019-03-13 19:35:01

Imports

Library KERNEL32.dll:
0x408154 CreateThread
0x408160 GetCurrentProcess
0x408164 GetCurrentProcessId
0x408168 GetCurrentThreadId
0x40816c GetLastError
0x408170 GetModuleHandleA
0x408174 GetProcAddress
0x408178 GetStartupInfoA
0x408180 GetTickCount
0x408184 HeapAlloc
0x408188 HeapCreate
0x408194 LoadLibraryA
0x40819c SetErrorMode
0x4081a4 Sleep
0x4081a8 TerminateProcess
0x4081ac TlsGetValue
0x4081b4 VirtualProtect
0x4081b8 VirtualQuery
0x4081bc WaitForSingleObject
Library msvcrt.dll:
0x4081c4 __getmainargs
0x4081c8 __initenv
0x4081cc __lconv_init
0x4081d0 __p__acmdln
0x4081d4 __p__fmode
0x4081d8 __set_app_type
0x4081dc __setusermatherr
0x4081e0 _amsg_exit
0x4081e4 _cexit
0x4081e8 _errno
0x4081ec _initterm
0x4081f0 _iob
0x4081f4 _onexit
0x4081f8 abort
0x4081fc calloc
0x408200 exit
0x408204 fprintf
0x408208 free
0x40820c fwrite
0x408210 malloc
0x408214 memcpy
0x408218 printf
0x40821c rand
0x408220 signal
0x408224 strlen
0x408228 strncmp
0x40822c vfprintf
Library WS2_32.dll:
0x408234 WSACleanup
0x408238 WSAStartup
0x40823c closesocket
0x408240 connect
0x408244 gethostbyname
0x408248 htons
0x40824c recv
0x408250 socket

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51809 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 123 51.105.208.173 time.windows.com 123
192.168.56.101 51808 8.8.8.8 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.