4.6
中危

32299f3b0dff8b77dc20b8ea4ed55204fb498ebf180e8f81028131f44e0bb91a

0d0e718d9e7e3360ec7798abc6be4736.exe

分析耗时

79s

最近分析

文件大小

14.1MB
静态报毒 动态报毒 0DYHF8FC4JDTPUQQPJSMWW AI SCORE=82 AIDETECTVM ARTEMIS ATTRIBUTE AYQE CONFIDENCE FILEREPMALWARE GENERIC@ML GENERICKD HGQG HIGH CONFIDENCE HIGHCONFIDENCE MALWARE2 MALWARE@#27KB4ICOIBG18 METERPRETER RDML ROZENA SCORE SHELLTER SHELMA SWRORT UNSAFE YRTOI5L5+JS 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!0D0E718D9E7E 20201022 6.0.6.653
Alibaba Trojan:Win32/Shelma.5fb51c4f 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast 20201022 18.4.3895.0
Tencent Win32.Trojan.Shelma.Eyo 20201022 1.0.0.1
Kingsoft 20201022 2013.8.14.323
CrowdStrike win/malicious_confidence_60% (W) 20190702 1.0
静态指标
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1620126839.752126
NtAllocateVirtualMemory
process_identifier: 520
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00340000
success 0 0
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1620126841.268126
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.368548198929247 section {'size_of_data': '0x00e03800', 'virtual_address': '0x00023000', 'entropy': 7.368548198929247, 'name': '.rsrc', 'virtual_size': '0x00e037e0'} description A section with a high entropy has been found
entropy 0.9911932308754965 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1620126843.830126
RegSetValueExA
key_handle: 0x0000034c
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1620126843.830126
RegSetValueExA
key_handle: 0x0000034c
value: pk]=À@×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1620126843.830126
RegSetValueExA
key_handle: 0x0000034c
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1620126843.830126
RegSetValueExW
key_handle: 0x0000034c
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1620126843.830126
RegSetValueExA
key_handle: 0x00000364
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1620126843.830126
RegSetValueExA
key_handle: 0x00000364
value: pk]=À@×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1620126843.830126
RegSetValueExA
key_handle: 0x00000364
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1620126843.846126
RegSetValueExW
key_handle: 0x00000348
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) (1 个事件)
dead_host 172.16.61.176:4444
File has been identified by 47 AntiVirus engines on VirusTotal as malicious (47 个事件)
Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.43802777
FireEye Trojan.GenericKD.43802777
Qihoo-360 Generic/Trojan.b95
McAfee Artemis!0D0E718D9E7E
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Trojan:Win32/Shelma.5fb51c4f
K7GW Riskware ( 0040eff71 )
Arcabit Trojan.Generic.D29C6099
Cyren W32/Trojan.HGQG-3546
Symantec ML.Attribute.HighConfidence
APEX Malicious
Kaspersky Trojan.Win32.Shelma.ayqe
BitDefender Trojan.GenericKD.43802777
Paloalto generic.ml
AegisLab Trojan.Win32.Shelma.4!c
Tencent Win32.Trojan.Shelma.Eyo
Ad-Aware Trojan.GenericKD.43802777
Sophos ATK/Shellter-AC
Comodo Malware@#27kb4icoibg18
F-Secure Trojan.TR/AD.Swrort.BY
Zillya Trojan.Rozena.Win32.102292
Invincea ATK/Shellter-AC
McAfee-GW-Edition Artemis
Emsisoft Trojan.GenericKD.43802777 (B)
Ikarus Trojan.Win32.Rozena
Avira TR/AD.Swrort.BY
Antiy-AVL Trojan/Win32.Shelma
Microsoft Trojan:Win32/Meterpreter.gen!C
ViRobot Trojan.Win32.Z.Rozena.14825984
ZoneAlarm Trojan.Win32.Shelma.ayqe
GData Trojan.GenericKD.43802777
Cynet Malicious (score: 85)
ALYac Trojan.Agent.Meterpreter
MAX malware (ai score=82)
VBA32 Trojan.Shelma
Malwarebytes Trojan.Agent
ESET-NOD32 a variant of Win32/Rozena.AVX
Rising Trojan.Generic@ML.81 (RDML:0dYHf8FC4JdTPUQQPjSmWw)
Yandex Trojan.Rozena!yrTOI5l5+js
Fortinet W32/Rozena.AC!tr
AVG FileRepMalware
CrowdStrike win/malicious_confidence_60% (W)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2016-03-25 17:45:50

Imports

Library USER32.dll:
0x4171a8 wvsprintfA
0x4171ac wsprintfA
0x4171b0 MessageBoxA
Library ADVAPI32.dll:
0x417000 RegQueryValueExA
0x417004 RegOpenKeyExA
0x417008 RegCloseKey
Library SHELL32.dll:
0x417198 ShellExecuteA
0x4171a0 SHGetFolderPathA
Library KERNEL32.dll:
0x417010 SetEndOfFile
0x417014 ReadFile
0x417018 AreFileApisANSI
0x41701c CreateFileW
0x417020 WriteConsoleW
0x417024 FlushFileBuffers
0x417028 SetStdHandle
0x41702c SetFilePointerEx
0x417030 FreeResource
0x417034 LockResource
0x417038 HeapAlloc
0x41703c HeapFree
0x417040 GetProcessHeap
0x417044 GetShortPathNameA
0x417048 OpenProcess
0x41704c TerminateProcess
0x417050 GetExitCodeProcess
0x417054 GetLastError
0x417058 SetLastError
0x41705c WaitForSingleObject
0x417060 LoadResource
0x417064 SizeofResource
0x417068 WriteFile
0x41706c CloseHandle
0x417070 FormatMessageA
0x417074 lstrcpyA
0x417078 lstrcatA
0x41707c lstrlenA
0x417080 GetModuleFileNameA
0x417084 CreateProcessA
0x417090 FindResourceA
0x417094 GetTempPathA
0x417098 GetTempFileNameA
0x4170a4 CreateDirectoryA
0x4170a8 QueryDosDeviceA
0x4170ac CreateFileA
0x4170b0 DeleteFileA
0x4170b4 MoveFileExA
0x4170bc Process32First
0x4170c0 Process32Next
0x4170c4 GetLocalTime
0x4170c8 lstrcmpA
0x4170cc GetConsoleMode
0x4170d0 GetConsoleCP
0x4170d4 GetStringTypeW
0x4170d8 EncodePointer
0x4170dc DecodePointer
0x4170e0 ExitProcess
0x4170e4 GetModuleHandleExW
0x4170e8 GetProcAddress
0x4170ec ReadConsoleW
0x4170f0 MultiByteToWideChar
0x4170f4 WideCharToMultiByte
0x4170f8 RaiseException
0x4170fc RtlUnwind
0x417100 GetCommandLineA
0x417104 IsDebuggerPresent
0x417124 Sleep
0x417128 GetCurrentProcess
0x41712c TlsAlloc
0x417130 TlsGetValue
0x417134 TlsSetValue
0x417138 TlsFree
0x41713c GetStartupInfoW
0x417140 GetModuleHandleW
0x417144 GetStdHandle
0x417148 GetModuleFileNameW
0x41714c LoadLibraryExW
0x417150 IsValidCodePage
0x417154 GetACP
0x417158 GetOEMCP
0x41715c GetCPInfo
0x417160 HeapSize
0x417164 GetCurrentThreadId
0x417168 GetFileType
0x417170 GetCurrentProcessId
0x417180 OutputDebugStringW
0x417184 HeapReAlloc
0x417188 LCMapStringW
Library VERSION.dll:
0x4171b8 VerQueryValueA
0x4171bc GetFileVersionInfoA
Library PSAPI.DLL:

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702
192.168.56.101 57875 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.