2.9
中危

013c7e7277076b915eed59211219b40740803b778c2285832b5df72505d9b8f1

013c7e7277076b915eed59211219b40740803b778c2285832b5df72505d9b8f1.exe

分析耗时

73s

最近分析

386天前

文件大小

83.3KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.71
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:TrojanX-gen [Trj] 20200501 18.4.3895.0
Baidu Win32.Trojan.Kryptik.ld 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200503 2013.8.14.323
McAfee Upatre-FACH!0BF98FB66659 20200503 6.0.6.653
Tencent Malware.Win32.Gencirc.10b9cf0a 20200503 1.0.0.1
静态指标
查询计算机名称 (2 个事件)
Time & API Arguments Status Return Repeated
1727545277.844125
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545278.218625
GetComputerNameW
computer_name: TU-PC
success 1 0
检查进程是否被调试器调试 (2 个事件)
Time & API Arguments Status Return Repeated
1727545277.672125
IsDebuggerPresent
failed 0 0
1727545278.108625
IsDebuggerPresent
failed 0 0
行为判定
动态指标
连接到动态 DNS 域 (1 个事件)
domain checkip.dyndns.org
分配可读-可写-可执行内存(通常用于自解压) (2 个事件)
Time & API Arguments Status Return Repeated
1727545277.797125
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00404000
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
success 0 0
1727545278.202625
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00404000
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2060
success 0 0
查找外部 IP 地址 (1 个事件)
domain checkip.dyndns.org
在文件系统上创建可执行文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\doveejy.exe
将可执行文件投放到用户的 AppData 文件夹 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\doveejy.exe
网络通信
与未执行 DNS 查询的主机进行通信 (3 个事件)
host 114.114.114.114
host 8.8.8.8
host 109.86.226.85
文件已被 VirusTotal 上 57 个反病毒引擎识别为恶意 (50 out of 57 个事件)
APEX Malicious
AVG Win32:TrojanX-gen [Trj]
Acronis suspicious
Ad-Aware Gen:Trojan.Ipatre.1
AhnLab-V3 Trojan/Win32.Upatre.R158710
Antiy-AVL Trojan/Win32.AGeneric
Arcabit Trojan.Ipatre.1
Avast Win32:TrojanX-gen [Trj]
Avira TR/Spy.Zbot.sbboqv
Baidu Win32.Trojan.Kryptik.ld
BitDefender Gen:Trojan.Ipatre.1
BitDefenderTheta Gen:NN.ZexaF.34108.fm1@aurDiXlc
Bkav W32.AIDetectVM.malware2
ClamAV Win.Downloader.Upatre-5744092-0
Comodo TrojWare.Win32.TrojanDownloader.Upatre.SMO@5tencg
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.666596
Cyren W32/Upatre.CA.gen!Eldorado
DrWeb Trojan.DownLoader14.62433
ESET-NOD32 a variant of Win32/Kryptik.DQIH
Emsisoft Gen:Trojan.Ipatre.1 (B)
Endgame malicious (high confidence)
F-Prot W32/Upatre.CA.gen!Eldorado
F-Secure Trojan.TR/Spy.Zbot.sbboqv
FireEye Generic.mg.0bf98fb666596352
Fortinet W32/Kryptik.DQAA!tr
GData Win32.Trojan.Kryptik.CE
Invincea heuristic
Jiangmin Trojan/Generic.bhhra
K7AntiVirus Trojan ( 0050e3271 )
K7GW Trojan ( 0050e3271 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=80)
Malwarebytes Trojan.Downloader
MaxSecure Trojan.Malware.300983.susgen
McAfee Upatre-FACH!0BF98FB66659
MicroWorld-eScan Gen:Trojan.Ipatre.1
Microsoft TrojanDownloader:Win32/Upatre.BV
NANO-Antivirus Trojan.Win32.Dwn.dufblq
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM09.0.F8BC.Malware.Gen
Rising Downloader.Upatre!8.B5 (TFE:dGZlOgXGQ+j5KsDZWg)
SUPERAntiSpyware Trojan.Agent/Gen-Upatre
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Troj/Dyreza-HK
Symantec Downloader.Upatre!gen5
Tencent Malware.Win32.Gencirc.10b9cf0a
Trapmine malicious.high.ml.score
TrendMicro TROJ_UPATRE.SM37
连接到不再响应请求的 IP 地址(合法服务通常会保持运行) (4 个事件)
dead_host 192.168.56.101:49164
dead_host 132.226.247.73:80
dead_host 192.168.56.101:49165
dead_host 109.86.226.85:443
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2013-05-24 14:33:25

PE Imphash

e0db9493366ea7231ec184554e4ce365

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00008d28 0x00008e00 6.7998665103439135
.data 0x0000a000 0x000051e4 0x00005200 5.00200375958216
.rsrc 0x00010000 0x00004e38 0x00005000 5.059856649045159

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x00014850 0x00000134 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_CURSOR 0x00014850 0x00000134 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_BITMAP 0x00014668 0x00000098 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_BITMAP 0x00014668 0x00000098 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_ICON 0x00010348 0x00004228 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_DIALOG 0x000102e0 0x00000066 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x00014988 0x00000014 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_GROUP_CURSOR 0x00014988 0x00000014 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_GROUP_ICON 0x00014570 0x00000014 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_VERSION 0x00014bb0 0x00000284 LANG_BELARUSIAN SUBLANG_DEFAULT None
RT_MANIFEST 0x000149a0 0x0000020c LANG_BELARUSIAN SUBLANG_DEFAULT None

Imports

Library USER32.dll:
0x40a128 LoadStringA
0x40a12c LoadIconA
0x40a130 RegisterClassExA
0x40a134 GetMessageA
0x40a138 TranslateMessage
0x40a13c DispatchMessageA
0x40a140 PostQuitMessage
0x40a144 SetWindowTextA
0x40a148 SendMessageA
0x40a14c DefWindowProcA
0x40a150 PostMessageA
0x40a154 CreateWindowExA
0x40a158 ShowWindow
0x40a15c UpdateWindow
Library KERNEL32.dll:
0x40a018 GetStringTypeW
0x40a01c GetStringTypeA
0x40a020 LCMapStringW
0x40a024 LCMapStringA
0x40a028 GetLocaleInfoA
0x40a02c MultiByteToWideChar
0x40a030 SizeofResource
0x40a034 GetDateFormatA
0x40a038 GetTimeFormatA
0x40a03c FindResourceA
0x40a040 LockResource
0x40a044 LoadResource
0x40a048 LoadLibraryA
0x40a04c lstrcpyA
0x40a050 SetLastError
0x40a054 HeapSize
0x40a058 GetFileType
0x40a05c GetCommandLineA
0x40a060 HeapFree
0x40a064 GetVersionExA
0x40a068 HeapAlloc
0x40a06c GetProcessHeap
0x40a070 GetStartupInfoA
0x40a074 GetProcAddress
0x40a078 GetModuleHandleA
0x40a07c ExitProcess
0x40a080 WriteFile
0x40a084 GetStdHandle
0x40a088 GetModuleFileNameA
0x40a09c WideCharToMultiByte
0x40a0a0 GetLastError
0x40a0a8 SetHandleCount
0x40a0b0 TlsGetValue
0x40a0b4 TlsAlloc
0x40a0b8 TlsSetValue
0x40a0bc TlsFree
0x40a0c4 GetCurrentThreadId
0x40a0cc HeapDestroy
0x40a0d0 HeapCreate
0x40a0d4 VirtualFree
0x40a0dc GetTickCount
0x40a0e0 GetCurrentProcessId
0x40a0e8 RaiseException
0x40a0f4 TerminateProcess
0x40a0f8 GetCurrentProcess
0x40a100 IsDebuggerPresent
0x40a108 GetCPInfo
0x40a10c GetACP
0x40a110 GetOEMCP
0x40a114 Sleep
0x40a118 VirtualAlloc
0x40a11c HeapReAlloc
0x40a120 RtlUnwind
Library COMCTL32.dll:
Library ADVAPI32.dll:
0x40a000 RegCloseKey
0x40a004 RegQueryValueExA
0x40a008 RegOpenKeyExA

L!This program cannot be run in DOS mode.
7"aich
`.data
VVVVVk
3PPPPPgk
@<Yv8V$m
3VVVVV$k
VVVVVj
;t%t j
Y^hS=@
3@VW3t$
YYu-9D$
u_^U @
Zf1Af0A@@Jui
@;vFF~
M_^3[Bo
S3;VWt
^0SSSSS
ui;cuX
GHuGHHGH
Au^H9E
_^[]VW3x@
r_^Vt$
+EPRQL
u@@u@t
(;r3_^[UU3H_@
GGGGE+
VW395@
8_^[]U
3]SUVt$
P_^][U
YSUVt$
3;Wto=@
;t^9(uZ
;tD9(u@
Y_^][UQVW
ttutt@
PuVF8%
MQVuPUTuUDuUDuh
W3}WuWWWWWuWU4WU0
WVP}3/fEU
MVWQ_3
^]USVu
3_^[];t
^0SSSSSd
SUVW=@
SSS+S@PVSSD$4
t#SSUPt$$VSS
DUVWbT
_^][YYjTh
Ej(j ^V
3FRj(j
;rF9=@
u(Mu$u u
MOI;|9M
3@_^[UWVE
P_][^S
Y+KWZ|(
9x "U$X(
]|ux}tf
f]pfElfehfmd
;YY=0@
E>=Yt/j
tJVUP7
SSSSSC
3Y]_^[50@
EPQEPEj
Map[VW3j
3;v.jX3;E
WWWWW.
;uL9=|@
SI VW}
HD9#U#
MLD3#u
]#\D\D
VPLYYE
S3;VWt
^0SSSSS]
3_^[UTVu
jiVjdh
Y;uSEP-Y;t
WWWWW9
Fpt"~l
YYt:V5@
_^VWh@
;r_^j h8@
Y+t"+t
+td+uD!}
3PPPPPM
u@OdMGd
uwdSUY
EYF`[_^U
u$Mu u
;r3Wh$@
13_V5t@
YYt4V5@
7YYuTVWhE@
8&x8F+>
RK,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,q,qB
(w("to
,xi?s[
v,Z#k$v{
k /#w{
k, u(@2Ya@6Yi
F(xk`/@j[{
RzcZ6,xDfY*.
"Td(zu+/p,:k->"yNJdOJd
L"(JNl8INF(UJ
{IE/#xi$
>D/(,xI
5=%-k8|/6@*/B
/Y6UwM),.B*[QB
#&"u({
-illhhx{b
[QIU{1
@n[aL+/uK
h6/ypB
<iDOU
J{IINJB#xINJ6n
bRJ"{/StOU
biH7#
F~6r/yh
D[y/z.
/:i4/6
/y<w,/6U
/Yi"ui6Yikx=a
i`.[.8@u1j1
h-Q6[iL"kx-b
4.[a*/y`J6
YZ^,x@z
/.ixU
Y\i`.[.
YiBV/y|C.
$(6&/y\g>1.T 6
Ig>)P}L
[G=ag>9rF-xk(.
z./ydg>1wM
[Q@bik
!I)}}0/{Na$/Y6Yii6/yx w
/"F0*"kd=aV/y|C.?1.
j7}bYs9[i#[Y
kP,xi.
L{/y<B
6z-/S`BBi8xF,x
U+u/bIU{{/
Z,x6[i6[)BVd/t
PYv$;5
-WWuuj
6PWu.(
t`][9}
WWWWVuWu
;YYEt+WWVPVuWu
uFYEe_^[M3$
F$|3@_^
QY}SYE;
]5V+YE;t'CH;r
SGESPk
9}uH;u
E;t CH;r
t4VYtvVY
YU SVW>39
u;tm95(@
Y;t%MQj
u3EP=Yt
SSSSSz
Vjjdh
Vjjdh
P3_^[]
WWWWW3
Y}SXYE;t
uUEPSS}S
=?sJMsB
;r6P;Yt)UEP
@@@u@@uutt
u@@@tt
ZJFRFXu
3SEEESX5
PZ+tQ3
FlvlYE
Mu^FF#
NMIIII
Virt^_
@@@uu@tu
3j`hp@
MPQ%YY
3F95P@
VW39=@
t.t$<"u
u_^UQM
FA>\t>"u&
UQQVE3PuuYt
VVVVVh
VVVVVM
1E3PeuEEEEd
Y__^[]Q
S\$ UVs
L$ St^Dm
L$(9csmu*=@
E3E3;u
Wt1t'P8
GWpYYF
QSUVW5@
,;YYr|+
rpV7;YsJ
;r;Pt$
3_^][YVj
YHU$X(
]|ux}tf
f]pfElfehfmd
+PR(YYt+@$
tAt2t$
ANu_^][U$d
8]tEMap<u
E`p[UWVu
DDDDDDDDDDDDDD
t7t3V0;t(W8
VJY^3;
URPQQh
t;T$4t
;v.4v\
UVWS33333[_^]
33333USVWj
_^[]Ul$
8csmu*x
Wu8SS3GWh@
39]$SSu
;~Ej3X
3;tAuVWuu
3;tuSW
PWu u u
e_^[M3)UQQ@
SV3;Wu:EP3FVh@
39] SSu
ESpEYu39]
e_^[M3qU
6v v$v(v,
vX{v\sv`kvdcvh[vlSvpKvtCvx;v|3@
VuY^UV3PPPPPPPPU
$s ^UV3PPPPPPPPU
$sF ^UWVu
DDDDDDDDDDDDDD
^_USVWUj
P(RP$R
t:|$,t
;t$,v-4v
UQPXY]Y[
0;u,DWWWWW
u,9uv'E
E`p3[_^UWVSM
B:t6t:t't
B^_[% @
HOLY SHIT MY
GARDEN'S ON FIRE!!
Anonymous #10
I just read a list of "the 100 things to do before yo
Langoback
button
Lobster
richedit
static
Sisanof
Masher
united
richerd
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
HOLY SHIT MY
GARDEN'S ON FIRE!!
GK-MOJ6EI@?I9
@JE#5.
J8=1=J6"8"=
L!'FJFC
K12B9
O*71C&
2 1.0AD GO"
&MI>G =,E
A,1''%#5
!H"50(&2
FDOM8-@
$1EG,
&:8O9/
5:MZ<x5D
D'3/).L5(
; M/" -/.%@/O
>JA>-F5M
&60!.I
<7.G,C$
2 4")
3;<F9I$6
"> 4@C
(;:G:?
)E"(7
@29-:I+
J1"F6-
,16#=
0<I(02
4KO#;;
8?.2J7
AO0BN:=
A8 "%-!
KN16F+N'
87<IJ2
HOLY SHIT MY
GARDEN'S ON FIRE!!
Anonymous #10
just read a list of "the 100 things to do before yo
8=0J'3
(4!@7K
/*'61F
AG-AO8::16
G.E"O9
/;! &0>
IG/5D
>%NJ8L
1.=F6/<DFM?
+/6N#&K
JK;J*KJM
AIL;16
&?8+.=8/**2J(;
)84DK+!F
I.)H<
$%$# B!
rhink probably skdlskfm asdwEF AWFSDFSDF SSFDSDFIUUH it was quite an attractive
Noredunet
Riched32.DLL
bad allocation
CorExitProcess
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
EncodePointer
KERNEL32.DLL
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
Unknown exception
InitializeCriticalSectionAndSpinCount
kernel32.dll
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
UpdateWindow
ShowWindow
CreateWindowExA
PostMessageA
DefWindowProcA
SendMessageA
SetWindowTextA
PostQuitMessage
DispatchMessageA
TranslateMessage
GetMessageA
RegisterClassExA
LoadIconA
LoadStringA
USER32.dll
SizeofResource
GetDateFormatA
GetTimeFormatA
FindResourceA
LockResource
LoadResource
LoadLibraryA
lstrcpyA
SetLastError
KERNEL32.dll
InitCommonControlsEx
COMCTL32.dll
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ADVAPI32.dll
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
8ISZ3:
owqumpmpqsqwo|p
o|ovqumorwqwqwqxqwryrysxtxrxryuyrqrr
}}{{{{
||yuvtoptopsoormn}}
{vunijokj{{
&!.!. ,!, ,
*!54;*4
0!-#2#4 ,!,!, ,", , ,!.
&!0!/!/"1!.)
"!-!1!/!1!/!/"/!/!/#0
!( *$0!/!/#0!/!/
!%3!/#0!/!/!0!/!0!0 -#/
$%"+#1"0"/"/"0
!,"-$,
"/#/"/"/#1"/#0"/#2!.
$/%3$/".".$/ )%5
%cohsegc_-.
!,"-PYgsgkhk47 *"1!+
hsgrltkrlqMT
'"."/".".#/"."/".#0"2
&.&3%0#.#/#.$/)7". * +'5&/'5#1+6&2'5%2".#2 *"/%7*7#.+8#/%1$3%3)6&3#.$/#.#0#.#.$.#.$0#/
&.'5$1#,$,#,&3'3$,").>.>'6*7&0#+"+(62@.>.;+:%1 '"+%1)70@+5+7(5&2'2&/&0%/&0%/%/&0%/&1'1
UUUUUUUUUp
DDDDUU
DDDDUU
DDDDUU
UUUwwww
UUUUUUUUUU(
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.2.81"
processorArchitecture="X86"
name="MissFuture"
type="win32"/>
<description>MissFuture</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel
level="asInvoker"
uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
@I@@@@@@
@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@
((((( H
h(((( H
H
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@
MissFuture
MS Sans Serif
VS_VERSION_INFO
StringFileInfo
02A95810
CompanyName
MissFuture
FileDescription
MissFuture
FileVersion
1.1.3.32
InternalName
LegalCopyright
LegalTrademarks
OriginalFilename
ProductName
MissFuture
ProductVersion
VarFileInfo
Translation
C:\jaqJqzo1.exe
C:\a451f6bc2692176ce49855db6b488d6700e29097e711716ea0545ee8fdd8391a
C:\2ac0341aa1ee6f044d1c667be9055856a04f9066e8a299ec94d9b3d4a2d2e8ea
C:\1535968bd602f284dc4e50967e298dad7403a45b87e04ec427848b0838eb80fd
C:\nTfq8MK5.exe
C:\3rzgJJmm.exe
C:\PLtlDET9.exe
C:\5Fp9mTkh.exe
C:\BhGz9TCg.exe
C:\tXGmZfqH.exe
C:\eY3vuso1.exe
C:\ELKbPQlt.exe
C:\jYfaIHQz.exe
C:\HkP1T1D4.exe
C:\Ey9pxFgH.exe
C:\wcB0T1M_.exe
C:\8VGyXZEV.exe
C:\f7bbf227dd041f2b74ef33fa44ccda85b56f751fd991d51aab32ba53044b88fa
C:\Users\admin\Downloads\doveejy.exe
C:\190ebaea2269c237bfcacfc159eeb914d487cf10870bc7a2c327edaca353f65b
C:\Users\admin\Downloads\doveejy.exe
C:\Users\Joe Cage\Desktop\gMp1cn4UaP.exe
C:\Users\admin\Downloads\ced8b610a7f6e0c3d7a0072ada4ca0e9.virus.exe
C:\0238234aa21158d5c1ee6bcf8d02ca9f0c6683e922824779f43e6fd1770f0162
C:\d527c3584ce846a515aa5f465d69b658b11cdc1ca57ad3389733ae3d98195d95
C:\949519cee65a2f927f4968d33803bbf16e1827851f51eb81c30577b08a5546a4
C:\Users\admin\Downloads\doveejy.exe
C:\Users\admin\Downloads\4d337e32985a17fc5b4b76ac81dd37ef44c5f9ee9a5fd92eed03e10b9f7026bc.exe
C:\91014ac9a18eadb49d76c1bcdc486c2b6fb9ae6313b9e750232d6efe4b15913c
C:\1849f56671c333f3f17a2d8aae74bb8abb8115416d27087f173b0d6d5f3ca03e
C:\Users\Petra\AppData\Local\Temp\doveejy.pe32
C:\Users\admin\Downloads\cd5d26c249ff1bab_doveejy.exe
C:\Users\admin\Downloads\ab000f6ad4bfad3d1c11f9a0900372642fb1929b0b84b31afb6739dd3e98d688.exe
C:\c81ea9cf3db64ba9add454f4ba6c3fb8d65bab7c4d324283b86280bfb6df828c
C:\Users\RA491~1.VUL\AppData\Local\Temp\784091fa4e6ffa28b8909d0e3538cf2c.exe
C:\Users\admin\Downloads\doveejy.exe
C:\90d3411697bd2003ecf8be4b9b68e2cebb53335264e73c2dcba9520fed5c9db4
C:\Users\admin\Downloads\doveejy.exe
C:\c3cfa02391cc6ca448ac10f94a5024954bddea6a62d76a19d5bbdd4ce77c4791
C:\Users\Petra\AppData\Local\Temp\doveejy.pe32
C:\211c89aa6f83d5ad1005c30709ac5a8b1b051db5ca7da731ae5172d9b2dbd998
C:\6d3ef3810091aa2d63ff17457f7e714e29372b83aa8b022beff78c28b40e285f
C:\Users\admin\Downloads\doveejy.exe
C:\Users\admin\Downloads\c17da9311e588feec36a30b0b35c4ef837990bba77646e823424e8e8835e7c01.exe
C:\Users\admin\Downloads\4877cab0cfde85374631f353e52d679f1ab4cc309d1ea53d644fab02b1d5460f.exe
C:\260bbacab81c54b492122c016c454734218d32d86d67358f71b23ff36c3589b5
C:\22d0ee72dc98805db3aeb88b254da22bae47f08e4af302a3591e017bd0b8a74e
C:\Users\admin\Downloads\doveejy.exe
C:\ba9959560e469d4946b73db6f01c13895909aee863210d797c252a20c5b06af9
C:\b8c4eff452373df152cd32859a8cea94c4ccd01304845452d8588b03a0c34440
C:\12f2a66ededc42e8e8e35c0f151b103ec15d77365d03572ac2160ee4a9578885
C:\b5fe7f2ca47631b2d0bc46d49febe3a2a4dfbb7d81e30d9eb48faae28898662a
C:\Users\admin\Downloads\doveejy.exe
C:\dbd08ad8c6cbda421e93c50bbb7755492a17d97849b5ef1448f2bb9a20bcf4d8
C:\e9300d83c29681fdaf0034ad7805d8bbd4f2216ee9d79abf9ff51a464f7dd6a8
C:\Users\admin\Downloads\doveejy.exe
C:\a524990a1fa4c6c71269ca81ae5733213b43dfb255fb9b75648d093587b32161
C:\Users\admin\Downloads\doveejy.exe
C:\0b57db9246131bdc9f161302b7d3eb2a33311d9655de256225453ad58cf422d8
C:\1688e81206d2ca44ff42e4e3fdc46088048f2fa4a2b64a922947297b48c8acf9
C:\479c1946ff61011f4891e6d378acb430a7e3ae52a1522224a2f3bc789f5e59df
C:\c4a919485a9c3ce19e3f0c061baf883eab3092f6703d3a17c2cf0b328429c602

Process Tree


013c7e7277076b915eed59211219b40740803b778c2285832b5df72505d9b8f1.exe, PID: 1856, Parent PID: 1784

default registry file network process services synchronisation iexplore office pdf

doveejy.exe, PID: 2060, Parent PID: 1856

default registry file network process services synchronisation iexplore office pdf

TCP

Source Source Port Destination Destination Port
192.168.56.101 49164 132.226.247.73 checkip.dyndns.org 80
192.168.56.101 49165 132.226.247.73 checkip.dyndns.org 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 58485 8.8.8.8 53
192.168.56.101 57665 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name a16ef3cc893b752a_doveejy.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\doveejy.exe
Size 83.5KB
Processes 1856 (013c7e7277076b915eed59211219b40740803b778c2285832b5df72505d9b8f1.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 16070cd27adf6240150a301bcfcfd32d
SHA1 844a7d0168d44ca3f98cfe5c5916e3c1772bde3e
SHA256 a16ef3cc893b752a785ea7d66f7a2a6732f84d2cfe4bdb65b419850a53abd257
CRC32 DF0196DE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.