1.0
低危

11c727678d81b46379716068c320777f3da8676757a6c3aa5079e8ddc8df5880

11c727678d81b46379716068c320777f3da8676757a6c3aa5079e8ddc8df5880.exe

分析耗时

193s

最近分析

369天前

文件大小

40.8KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER ZBOT
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.63
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanDownloader:Win32/Zbot.fd027e16 20190527 0.3.0.5
Avast Win32:Agent-AUID [Trj] 20191109 18.4.3895.0
Baidu Win32.Trojan-Downloader.Waski.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Kingsoft None 20191109 2013.8.14.323
McAfee GenericATG-FBPK!0FD4BF6722A1 20191108 6.0.6.653
Tencent Trojan-spy.Win32.Zbot.robza 20191109 1.0.0.1
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
文件已被 VirusTotal 上 64 个反病毒引擎识别为恶意 (50 out of 64 个事件)
ALYac Trojan.Agent.BBVC
APEX Malicious
AVG Win32:Agent-AUID [Trj]
Acronis suspicious
Ad-Aware Trojan.Agent.BBVC
AhnLab-V3 Trojan/Win32.Upatre.C3083145
Alibaba TrojanDownloader:Win32/Zbot.fd027e16
Antiy-AVL Trojan[Spy]/Win32.Zbot
Arcabit Trojan.Agent.BBVC
Avast Win32:Agent-AUID [Trj]
Avira TR/Yarwi.AD.113
Baidu Win32.Trojan-Downloader.Waski.a
BitDefender Trojan.Agent.BBVC
BitDefenderTheta Gen:NN.ZexaF.32245.cqY@aOUb5ici
Bkav W32.FamVT.GeND.Trojan
CAT-QuickHeal Trojan.AgentCS.S5725868
ClamAV Win.Malware.Bavs-6804154-0
Comodo TrojWare.Win32.Upatre.O@58re0o
CrowdStrike win/malicious_confidence_100% (W)
Cybereason malicious.722a1f
Cylance Unsafe
Cyren W32/Upatre.IB.gen!Eldorado
DrWeb Trojan.DownLoad3.28161
ESET-NOD32 Win32/TrojanDownloader.Waski.A
Emsisoft Trojan.Agent.BBVC (B)
Endgame malicious (high confidence)
F-Prot W32/Upatre.IB.gen!Eldorado
F-Secure Trojan.TR/Yarwi.AD.113
FireEye Generic.mg.0fd4bf6722a1fd9e
Fortinet W32/Zbot.A!tr
GData Trojan.Agent.BBVC
Ikarus Trojan-Downloader.Win32.Upatre
Invincea heuristic
Jiangmin TrojanSpy.Zbot.ecat
K7AntiVirus Trojan ( 0052964f1 )
K7GW Trojan ( 0052964f1 )
Kaspersky Trojan-Spy.Win32.Zbot.zmzc
Lionic Trojan.Win32.Zbot.toaa
MAX malware (ai score=87)
McAfee GenericATG-FBPK!0FD4BF6722A1
McAfee-GW-Edition BehavesLike.Win32.Downloader.pt
MicroWorld-eScan Trojan.Agent.BBVC
Microsoft TrojanDownloader:Win32/Upatre.AA
NANO-Antivirus Trojan.Win32.Zbot.ctnosh
Paloalto generic.ml
Panda Trj/Genetic.gen
Qihoo-360 Win32/Trojan.Spy.573
Rising Worm.Allaple!1.AB29 (CLASSIC)
SentinelOne DFI - Malicious PE
Sophos Troj/ZBot-HQH
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2012-08-22 16:41:37

PE Imphash

1daa496caaaddcfabb11d00256706dda

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.MPRESS1 0x00001000 0x00005000 0x00004600 3.2463917788846763
.MPRESS2 0x00006000 0x00001000 0x00000400 5.892839290312011
.rsrc 0x00007000 0x00003000 0x00002600 4.780403912270365
.imports 0x0000a000 0x00001000 0x00000200 4.307410073100323

Resources

Name Offset Size Language Sub-language File type
RT_BITMAP 0x00005530 0x000000ae LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000070a8 0x00002428 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x00009510 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library USER32.dll:
0x402050 MessageBoxW
0x402054 SendMessageW
0x402058 EndDialog
0x40205c GetDlgItem
0x402064 ClientToScreen
0x402068 wsprintfW
0x40206c GetDialogBaseUnits
Library KERNEL32.dll:
0x402000 GetStartupInfoA
0x402004 GetModuleHandleA
0x402008 GetFileSize
0x40200c CloseHandle
0x402010 CreateFileW
Library MSVCRT.dll:
0x402018 __set_app_type
0x40201c __p__fmode
0x402020 _except_handler3
0x402024 _controlfp
0x402028 _exit
0x40202c _XcptFilter
0x402030 exit
0x402034 _acmdln
0x402038 __getmainargs
0x40203c _initterm
0x402040 __setusermatherr
0x402044 _adjust_fdiv
0x402048 __p__commode

L!Win32 .EXE.
.MPRESS1
.MPRESS2
.imports
MuM!]@ @UE
M!@]]!M
u@u@]]
!u!!]MMMM]uu u]]]@! ]!!]M ]MuM! u@
QHM] @@]M M]MM]u
] MMMu @!u !! ]M!
M uH<E
u@]@!!
]@M Mu
@u@!]
M!u ]@MMM!
M@@MM
8u ] ]M]u@u ]!M@u@!
!M]u! ! ]@
uH @]u !]!M @@M]!@]
] ]]@]@u!@]
! ]]@]@u!
Mu]]@M!@@uM]$
uM M!]!@ !]!@]]]=!Mu/
]_MvzU
ZMuSSAWVAf9
KIM3EE
GEGEGMG;r
]]u @]! M !]u@u@u ]
!]]!u!uUV3W}
FG3@_^]
@@uu!u@uM ]@u
]]]]@u="@
3!M.lF^M:
_S,4hs)-.7
IS."hs)08
<s@ uJb
OD,3Cs
jS$3Cs]:(
6]d8+$
_W10M3
[A]+=9LT("gb)
:!3XvM
Bu/NX_M8
,0y|Ueu
mKMU-dZ
/@=!M'0
I>!MvE
}8ZZ RDMva?"lF
4y.Pw'hzX-T
/@=!M!uD
2!=#M}
wbKvzu)
/@=!M!u
38I>nx%uE
^a?f?!M
z?TOe^_
,kw'.0s_Mu a
7Mvh1kw9
6:w_"M$S
:2aUZE
^m}G<!M#
kv 2udj ]R
?Mu[+u9
MS(7Ip8_9
7_M'kd+Nb.d_+K
}Lub?$
DCzME,*Kps'M
_Nf-6,
y[Wb]^
7mocE-wu8+
@! @!u @M!M]@M
M @u@!M@]]
IuKXG[O_
u!!!uM M]
]]uM M
@GKYUVu
^]hUjh&@
hSVWe3
EEP5&@
EPEPEP
0u>"u:Fu
<"u>"u
> vFuj
YY3% @
8Muex<
KERNEL32
VirtualProtect
G(XPTPjxWXt=
-5$09+
E!4*B#0&=9
1)E(>6>&. )<B
#,"<D=&
;%)$+.3
":E?0!-03 -(
k!l4l/t
;09>,7
*4$.B7
($; 9(3
D1>D.39=6
,C0*A!
770;'C
,8?;=2
%!CD;
4'-=.D-2!
UURVWU
QVVVVWU
USER32.dll
MessageBoxW
SendMessageW
EndDialog
GetDlgItem
DialogBoxIndirectParamW
ClientToScreen
wsprintfW
GetDialogBaseUnits
KERNEL32.dll
GetStartupInfoA
GetModuleHandleA
GetFileSize
CloseHandle
CreateFileW
MSVCRT.dll
__set_app_type
__p__fmode
_except_handler3
_controlfp
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
"""""""
"""#"""
"""DB""
"""BB""
""$BD""
""$"$""
""$"$""
"""""""
GetModuleHandleA
GetProcAddress
KERNEL32.DLL
USER32.dll
EndDialog
MSVCRT.dll
t7Kt'Kt
ZXWZYXZZXZZX
KKMM""
uuDD--
117722
}}^^mm
I'6*(******************++""
!!##**********************::v
DZ5Lar|||
'@WmAYG_
_p\\\n
`s]]]m
L$f3L$
USER32.dll
MessageBoxW
SendMessageW
EndDialog
GetDlgItem
DialogBoxIndirectParamW
ClientToScreen
wsprintfW
GetDialogBaseUnits
KERNEL32.dll
GetStartupInfoA
GetModuleHandleA
GetFileSize
CloseHandle
CreateFileW
MSVCRT.dll
__set_app_type
__p__fmode
_except_handler3
_controlfp
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
MS Sans Serif
Push to exit
s24157acf4716b609214cc6c437bd
C:\LPTlFnmn.exe
C:\8bsO07Aa.exe
C:\21cfd140a5831dc8b292c555bb488a5e0997edf360bad67bcb45993e8c86ad7f
C:\6cf57c5bda659feb2d55e7fe1cb6299836664572f1d54bb38cb4cac471655241
C:\598c3ff79e4fdbe30b8622c5e5f98bb8e82761c3454e6d745a92774bc9bb5c64
C:\bc1febc5a1b417e6ab1b2b5c13f113ee7e10f6ef3451b2920d1aaf5128be49b3
c:\task\1B8A5F542E821EA21B841B2FE23D06A4.exe
c:\task\809FEAAF46B494CB1E9D8D61F3E39F50.exe
C:\Documents and Settings\Administrator\Desktop\mvKijrNV.exe
C:\dd89baf3541a3b24f4d92f86f10147d645e74f8f9497336df77f77dc1c6e5dc3
C:\4a6e61493eced46ece04fde435f41138017e4da13d098f752f19d35a9a6d32ac
C:\418d8f99b402109adbf160618e3347cd2d1d1a9dad7cc2c0fa7b1c78d216f7a7
C:\Users\Lisa\Desktop\DTPiWdZN.exe
C:\Users\Virtual\AppData\Local\Temp\f77126ad8585d0941850d88ffbdf332d5b6bd284dc23917c595a559a35af5f41.exe
C:\Documents and Settings\Administrator\Desktop\J2KcQUbL.exe
C:\0db6a001b1524dc59a72a7b9d7ae3d19c3f90afb243ed40f256d0ebe02110ba6
C:\Documents and Settings\Administrator\Desktop\SZ4IejXj.exe
C:\KFCXi7de.exe
C:\d98c5f8e66427dcd9c10b1e034223c7de7a34acb66819322132c79049d777a12
C:\edda987f35f8cfa0e91d391c957ede674776cd3fe99e18fbff32ccc8842943bc
C:\39b8e6f0a63ccb023ca66f611f23bd877e7a4389cb81dc71d8460ed846e3db49
C:\Documents and Settings\Administrator\Desktop\vWUoq9Op.exe
C:\37a96e375d4208c492beb6540541921d148d0572e0c4864c5acdd1cd56650e4e
C:\p8m0eG86.exe
C:\af5d481450dea13ce0857344f60e34af7af37d9c68db0624c5eeb0edc79cadc3
C:\9e4ef11509878b80db8ea894d0f94ac4f189139fe4417169a2dec0fb2cfe8780
C:\c8b77e6978fe7b78a3d4dbb6e846a00cf08a89d4e81a7dd24b870b46fe1c4215
C:\Documents and Settings\luser\Desktop\ZhtjOab5.exe
C:\J2DBjGUf.exe
C:\b860abae41e096860318d420b4036cb86d2fdce2de9a88a8451d51b9f4905ca2
C:\Users\Lisa\Desktop\LlrRxIV7.exe
C:\fb19acf00cad0fbefbc5af8ab237942c7861b237e2f9f10f1d93ac362b466e28
C:\31a56f20985ee22989f8f85d571a351c67464439edf9932e7397320e18f41161
C:\b1be5a8f177470a55c639a2d10e0add055a8d25fc11fc0810fce10dd02c57b0a
C:\42f6fcff9f8577a6228465c34a0a09e535efd03eaae0cbae04f67ae143a56a31
C:\Sh0KMaY9.exe
C:\Users\Lisa\Desktop\y4mLh8aJ.exe
C:\oLIYBpHm.exe
C:\52726c0110a1dc340de5b4731472d9d84326888d3fc3be13d3ddf50fd4616e2a
C:\ff6b61ab090c4239e49d334e68bcbb9aa7be1d4a19eaf9e411fb7cdd9a3ca662
C:\524f7e4d54195f5ed5325e7e28722426bf950d5213b9e5aae37c6d057789cffc
C:\597cad1999e124981fa6dbc6b31f6a3d70e6a56b10c456c518e4bd8bcb7ba8c7
C:\77b58919222107b6d1c669c0a24dd8679c648c3db0fa914615ef04a32ee380f1
C:\d7QXmy1W.exe
C:\92acb187c0320dc8742590f6c00c24d1d0c3f029a063bd3cfb06769cf88814e6
C:\c1d5b9f3c748f23d2efc74e81093d7c197da940e8a6610292b6210f6e2ac0bd8
C:\Users\Lisa\Desktop\plthMkzr.exe
C:\n2nLicMC.exe
C:\Users\Lisa\Desktop\YcPbEqkt.exe
C:\7ca92b0cf132f23d78a8e1d40b10e98c4da7d311e7ba75a5272d190f2df08cdd
C:\Users\Lisa\Desktop\rK0JKZNd.exe
C:\1ebe60740fe10ab3e30026872481e1c38ec0b041b30d28b1aa86b083cacd37ff
C:\91e45cee8e42261430e565d5544ead6c546bdef14b7f452fd174e9a1d43962c0
C:\f9d31422289a8b50d5efd8f0f7c114d0bbde82804cda8aa2d9489718304b5bee
C:\7812e53426c2ee52cf7c2408f191664b37e76603df557d4929cf718afedcc898
C:\Documents and Settings\Administrator\Desktop\gjXLLEKF.exe
C:\56ea9f1211d8d74016884ea9cb19371c5c8667c54c2f5f2b0440ecd27dd3fbcf
C:\Documents and Settings\Administrator\Desktop\BEVE2yzz.exe
C:\16b7920be9649e03f87ecf6dacc47ad16a821fbcdce8f1cd5991073595b6ef22
C:\Users\Lisa\Desktop\8heTb0n6.exe
C:\Maufuvqx.exe
C:\Users\Petra\AppData\Local\Temp\file.pe32
C:\abed03829c35007e2caed6393d79dc8e8636c11ae20c69fd70bde25cb4105c12
C:\f10ee74d74b8e6ba01c055daa6b0277d127bb17577e3e4bc1b66d54dbf96a8a4
C:\f71e3e7f516b336855f2c2b36605b3e81b6d005e75fa16035cb37c951e8cf1ec
C:\384128228ec794990cff1198e61dc1e220ed15676de99c5b786c8404a793993f
C:\Documents and Settings\Administrator\Desktop\YJ5b364l.exe
C:\tShr8upe.exe
C:\3aa0a6b7dd82a7f8e15001c968a24fdb374509da5d968b8697e7ffca056cc5f0
C:\7c868beb4ae9a91f58472629325ad60eb9cbdab0cf9eb5198eb298f6d7f850bd
C:\Users\Petra\AppData\Local\Temp\update-pdf.pe32
C:\737369ec26c92b722e85a2faecd3a4328cb6af1cf8e3f37e344bd78a9abac397
C:\60c30b271c5bee960f4b36d9a0d977debceeb1a08d2a23ec8709c0e56a2e1d62
C:\Users\Lisa\Desktop\wXEuGCOU.exe
C:\XqI0MIpa.exe
c:\task\44F8AC704FD5723159CBFC045C7A9E46.exe
c:\task\8B1C11DA221C7C810C1719FD3F75FD1F.exe
c:\task\05E895C1A4E25642D9F2DBE160DF6AA9.exe
C:\BzLkdfXV.exe
C:\Users\Petra\AppData\Local\Temp\bba2c310e69dbd0df1be.pe32
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\important_document.exe
C:\61325e4ecd0f84735d3b182560ae393b039b8285be9f09440d71b786ddc3bda9
C:\Users\admin\Downloads\important_document.exe
C:\d5f4c456201874b93c607bfb9b1ee779950797bf7a28738e645b79daee2473c0
C:\Documents and Settings\Administrator\Desktop\vVqB8mwk.exe
C:\Users\admin\Downloads\factura.exe
C:\Users\admin\Downloads\sample.exe
C:\Users\admin\Downloads\invoice.exe
C:\Users\admin\Downloads\factura.exe
C:\9bfcece6e7dfa0befea9ca5efd54ebc128cba361cc305484fb0ba274bcb3d622
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\important_document.exe
C:\7091a8652c5cbaaf13227a8f11dfdf4a51bacdefa2137a5726dc82a78766cbac
C:\6e9097919c383c52c867dd7454ab1d6ccd7609882c03bb905c9d82052ce67517
C:\Users\admin\Downloads\factura.exe
C:\ea9Terfo.exe
C:\204bad2074be70ae0f63de0ed1f501c29e9208c5cde5a4b38c04165eb908aa31
C:\Users\admin\Downloads\factura.exe
C:\ZWvb2PVM.exe
C:\Users\admin\Downloads\invoice.exe
C:\f9f173efdce69e5cfaee1805adf5166b3cc2c8b7f7d526de29c44508a11a185e
C:\Documents and Settings\Administrator\Desktop\5Y10JLnC.exe
C:\AKk0R296.exe
C:\Users\admin\Downloads\important_document.exe
C:\42d4486fd65cabf7c2b2c524e89dfdc771c9bc8e3a0c62591ed1a53a943582c4
C:\541f0fb8f42b2eefdf7ab5671a9a1fb53d74de5efc14b26400262e0dcdfb801a
C:\5dfa2c3e730159e4a1cd3c29f7a3677697f1800bf601c4d606e31bcb04ab7b15
C:\a866959c95b5b409ea7aaa874941d41a0ad9e3d9ae1d679ad6cb9bba4cb943b4
C:\Users\Petra\AppData\Local\Temp\update-pdf.pe32
C:\13e198762a78e8fdc3700337b94eac1ddbb716a9a64729604a985f0c534b36c3
C:\eb8I04oc.exe
C:\b8c741e31cdaa92005566d7bf0ba57f8bf2e992a69cc1d938627d6b7c1cf2f7d
C:\cd7749d2d660aa787114ce6a3e2c9724a4fe4f94450f65747fbb29870f6d4ac1

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255
dns.msftncsi.com

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 58485 8.8.8.8 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.