10.4
0-day

7faef4d80d1100c3a233548473d4dd7d5bb570dd83e8d6e5faff509d6726baf2

112f9f0e8d349858a80dd8c14190e620.exe

分析耗时

81s

最近分析

文件大小

9.2MB
静态报毒 动态报毒 100% @BW@AA4WKMGI ACBZ AGENTB AI SCORE=100 BSCOPE CLOUD CMY3U CONFIDENCE CONJAR GENCIRC GENERICRXLT GIFT HIGH CONFIDENCE HSCUOU JZWZ KCLOUD KVMH017 KWHQ MALWARE@#1WKDABJJXG8Z8 MIKEY R354222 SAVE SCORE SIGGEN10 STATIC AI SUSGEN SUSPICIOUS PE UNSAFE XBSMP YHORZTFSPLE ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Trojan:Win32/Agentb.f63b46c8 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Malware-gen 20210321 21.1.5827.0
Tencent Malware.Win32.Gencirc.11b9adaa 20210321 1.0.0.1
Kingsoft Win32.Heur.KVMH017.a.(kcloud) 20210321 2017.9.26.565
McAfee GenericRXLT-OE!112F9F0E8D34 20210321 6.0.6.653
CrowdStrike win/malicious_confidence_100% (W) 20210203 1.0
行为判定
动态指标
Starts servers listening (7 个事件)
Time & API Arguments Status Return Repeated
1620119931.405499
bind
ip_address: 127.0.0.1
socket: 252
port: 0
success 0 0
1620119931.405499
listen
socket: 252
backlog: 1
success 0 0
1620119931.420499
accept
ip_address: 127.0.0.1
socket: 252
port: 49176
success 396 0
1620119931.420499
bind
ip_address: 127.0.0.1
socket: 252
port: 45808
success 0 0
1620119931.420499
listen
socket: 252
backlog: 2147483647
success 0 0
1620119936.108499
accept
ip_address: 127.0.0.1
socket: 252
port: 49180
success 428 0
1620119983.280499
accept
ip_address: 127.0.0.1
socket: 252
port: 49192
success 420 0
A process attempted to delay the analysis task. (1 个事件)
description 112f9f0e8d349858a80dd8c14190e620.exe tried to sleep 201 seconds, actually delayed analysis time by 201 seconds
Creates executable files on the filesystem (8 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libcrypto-1_1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libwinpthread-1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\Runtime Broker.exe
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\zlib1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libssp-0.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libgcc_s_sjlj-1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libevent-2-1-6.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libssl-1_1.dll
Drops a binary and executes it (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\Runtime Broker.exe
Drops an executable to the user AppData folder (9 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libevent-2-1-6.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\zlib1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libssl-1_1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libgcc_s_sjlj-1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libssp-0.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libcrypto-1_1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\Runtime Broker.exe
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\libwinpthread-1.dll
A process created a hidden window (1 个事件)
Time & API Arguments Status Return Repeated
1620119930.920876
ShellExecuteExW
parameters: -f torrc
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\Runtime Broker.exe
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\Runtime Broker.exe
show_type: 0
success 1 0
Moves the original executable to a new location (1 个事件)
Time & API Arguments Status Return Repeated
1620119935.920876
MoveFileWithProgressW
oldfilepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\112f9f0e8d349858a80dd8c14190e620.exe
newfilepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
newfilepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
flags: 3
oldfilepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\\112f9f0e8d349858a80dd8c14190e620.exe
success 1 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.378040679348856 section {'size_of_data': '0x00409e00', 'virtual_address': '0x00537000', 'entropy': 7.378040679348856, 'name': '.rsrc', 'virtual_size': '0x00409c28'} description A section with a high entropy has been found
entropy 0.4394559268901759 description Overall entropy of this PE file is high
Checks for the Locally Unique Identifier on the system for a suspicious privilege (2 个事件)
Time & API Arguments Status Return Repeated
1620119927.780876
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620119927.780876
LookupPrivilegeValueW
system_name:
privilege_name: SeShutdownPrivilege
success 1 0
网络通信
Communicates with host for which no DNS query was performed (10 个事件)
host 154.35.175.225
host 171.25.193.25
host 172.217.24.14
host 37.187.20.59
host 64.79.152.132
host 81.7.11.186
host 85.230.178.139
host 86.59.21.38
host 92.222.38.67
host 95.128.43.164
Looks for the Windows Idle Time to determine the uptime (1 个事件)
Time & API Arguments Status Return Repeated
1620119935.936876
NtQuerySystemInformation
information_class: 8 (SystemProcessorPerformanceInformation)
success 0 0
Installs itself for autorun at Windows startup (20 个事件)
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\auth reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Xauth\auth.exe
Installs an hook procedure to monitor for mouse events (1 个事件)
Time & API Arguments Status Return Repeated
1620119935.936876
SetWindowsHookExW
thread_identifier: 0
callback_function: 0x004e5bf2
module_address: 0x00000000
hook_identifier: 14 (WH_MOUSE_LL)
success 197051 0
Creates a windows hook that monitors keyboard input (keylogger) (1 个事件)
Time & API Arguments Status Return Repeated
1620119935.936876
SetWindowsHookExW
thread_identifier: 0
callback_function: 0x004abc8d
module_address: 0x00000000
hook_identifier: 13 (WH_KEYBOARD_LL)
success 65989 0
Installs Tor on the machine (2 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\tor\geoip
file C:\Users\Administrator.Oskar-PC\AppData\Local\e37752d7\tor\torrc
File has been identified by 55 AntiVirus engines on VirusTotal as malicious (50 out of 55 个事件)
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Heur.Conjar.6
CAT-QuickHeal Trojan.Agentb
Qihoo-360 Win32/Trojan.0c0
ALYac Trojan.Agent.gen
Cylance Unsafe
Zillya Trojan.Agent.Win32.1378886
Sangfor Virus.Win32.Save.a
K7AntiVirus Trojan ( 00569be91 )
Alibaba Trojan:Win32/Agentb.f63b46c8
K7GW Trojan ( 00569be91 )
Cybereason malicious.e8d349
Arcabit Trojan.Conjar.6
Cyren W32/Trojan.KWHQ-5203
ESET-NOD32 a variant of Win32/Agent.ACBZ
Avast Win32:Malware-gen
ClamAV Win.Malware.Mikey-9819889-0
Kaspersky Trojan.Win32.Agentb.jzwz
BitDefender Gen:Heur.Conjar.6
NANO-Antivirus Trojan.Win32.CMY3U.hscuou
Paloalto generic.ml
ViRobot Trojan.Win32.S.Agent.9637376
Tencent Malware.Win32.Gencirc.11b9adaa
Ad-Aware Gen:Heur.Conjar.6
Comodo Malware@#1wkdabjjxg8z8
DrWeb Trojan.Siggen10.14119
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition BehavesLike.Win32.Generic.tc
FireEye Generic.mg.112f9f0e8d349858
Emsisoft Gen:Heur.Conjar.6 (B)
SentinelOne Static AI - Suspicious PE
Jiangmin Backdoor.Agent.ick
Webroot W32.Malware.Gen
Avira TR/Agent.xbsmp
Kingsoft Win32.Heur.KVMH017.a.(kcloud)
Gridinsoft Trojan.Win32.Agent.oa
Microsoft Worm:DOS/Gift!rfn
AegisLab Trojan.Win32.Agentb.4!c
GData Gen:Heur.Conjar.6
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.RL_Generic.R354222
McAfee GenericRXLT-OE!112F9F0E8D34
MAX malware (ai score=100)
VBA32 BScope.Trojan.CMY3U
Malwarebytes Trojan.Dropper
Rising Backdoor.Agent!8.C5D (CLOUD)
Yandex Trojan.Agentb!yHoRztfSPLE
Ikarus Trojan.Win32.Agent
eGambit Unsafe.AI_Score_99%
Fortinet W32/Agent.ACBZ!tr
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (8 个事件)
dead_host 85.230.178.139:443
dead_host 37.187.20.59:443
dead_host 95.128.43.164:443
dead_host 192.168.56.101:49188
dead_host 81.7.11.186:443
dead_host 92.222.38.67:443
dead_host 64.79.152.132:443
dead_host 86.59.21.38:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-08-14 09:32:11

Imports

Library KERNEL32.DLL:
0x7a9000 HeapFree
0x7a9010 HeapSize
0x7a9018 FormatMessageW
0x7a901c GetLastError
0x7a9020 TlsAlloc
0x7a9024 HeapReAlloc
0x7a9028 RaiseException
0x7a902c HeapAlloc
0x7a9030 DecodePointer
0x7a9034 HeapDestroy
0x7a9038 LocalFree
0x7a9040 GetProcessHeap
0x7a9044 WideCharToMultiByte
0x7a9048 TlsFree
0x7a904c FormatMessageA
0x7a9050 GetCurrentProcess
0x7a9054 GetSystemTimes
0x7a9058 GetTickCount64
0x7a905c GetProcessTimes
0x7a9060 SetWaitableTimer
0x7a9064 TlsSetValue
0x7a9068 SetLastError
0x7a907c WaitForSingleObject
0x7a9080 GetModuleHandleA
0x7a9084 CreateEventW
0x7a9088 MultiByteToWideChar
0x7a908c SetEvent
0x7a9090 TerminateThread
0x7a9094 CloseHandle
0x7a9098 QueueUserAPC
0x7a909c GetProcAddress
0x7a90a0 VerSetConditionMask
0x7a90a4 SleepEx
0x7a90a8 VerifyVersionInfoW
0x7a90ac TlsGetValue
0x7a90b8 CreateDirectoryW
0x7a90bc ReadFile
0x7a90c0 SizeofResource
0x7a90c4 QueryDosDeviceW
0x7a90cc FindFirstFileW
0x7a90d0 WriteProcessMemory
0x7a90d4 FindFirstFileExW
0x7a90d8 SetPriorityClass
0x7a90dc VirtualFree
0x7a90e0 GetFullPathNameW
0x7a90e4 FindNextFileW
0x7a90e8 lstrlenW
0x7a90f4 GetDiskFreeSpaceW
0x7a90f8 VirtualAlloc
0x7a90fc TerminateProcess
0x7a9100 GetModuleFileNameW
0x7a9108 GetProcessId
0x7a9110 GetProductInfo
0x7a9114 Thread32Next
0x7a9118 GetTempPathW
0x7a911c CreateMutexW
0x7a9120 Thread32First
0x7a9124 FindClose
0x7a9128 GetLocaleInfoW
0x7a912c LocalAlloc
0x7a9130 CreateFileW
0x7a9134 GetFileAttributesW
0x7a9138 GetVersionExW
0x7a9140 SuspendThread
0x7a9144 GetSystemDirectoryW
0x7a9148 ResumeThread
0x7a914c lstrcatA
0x7a9150 OpenProcess
0x7a915c Sleep
0x7a9160 Process32NextW
0x7a9168 CreateFileA
0x7a916c GetCurrentThread
0x7a9170 LoadLibraryA
0x7a9174 LockResource
0x7a9178 GlobalAlloc
0x7a917c Process32FirstW
0x7a9180 GlobalFree
0x7a9184 GetNativeSystemInfo
0x7a9188 GetSystemInfo
0x7a918c FindResourceExW
0x7a9190 LoadResource
0x7a9194 FindResourceW
0x7a9198 GetThreadContext
0x7a919c GetPriorityClass
0x7a91a0 GlobalLock
0x7a91a4 VirtualAllocEx
0x7a91a8 MoveFileExW
0x7a91ac GetFileSize
0x7a91b0 ExitProcess
0x7a91b4 ReadProcessMemory
0x7a91b8 GetComputerNameW
0x7a91bc FindFirstStreamW
0x7a91c0 GetCurrentProcessId
0x7a91c8 CreateProcessW
0x7a91cc WinExec
0x7a91d4 CreateProcessA
0x7a91d8 DebugBreak
0x7a91dc SetThreadContext
0x7a91e0 FindNextStreamW
0x7a91e4 GetTickCount
0x7a91e8 GlobalUnlock
0x7a91ec GetDriveTypeW
0x7a91f0 GetFileTime
0x7a91f4 OpenThread
0x7a91f8 GetExitCodeProcess
0x7a91fc Beep
0x7a9200 WriteFile
0x7a9204 CreatePipe
0x7a9208 PeekNamedPipe
0x7a920c GetStartupInfoA
0x7a9210 SetThreadPriority
0x7a9214 GetCurrentThreadId
0x7a9218 lstrcpyA
0x7a921c CreateThread
0x7a9220 lstrlenA
0x7a9224 GetCommandLineW
0x7a9228 GetModuleHandleW
0x7a922c VirtualProtect
0x7a9230 VirtualQuery
0x7a9234 FreeLibrary
0x7a9238 LoadLibraryExA
0x7a923c EncodePointer
0x7a9244 DuplicateHandle
0x7a925c SetEndOfFile
0x7a9260 SetFilePointerEx
0x7a9264 AreFileApisANSI
0x7a9268 GetStringTypeW
0x7a926c GetCPInfo
0x7a9270 CompareStringW
0x7a9274 LCMapStringW
0x7a9278 IsDebuggerPresent
0x7a927c OutputDebugStringW
0x7a9280 GetSystemDirectoryA
0x7a9284 VerifyVersionInfoA
0x7a928c GetStdHandle
0x7a9290 GetFileType
0x7a9298 DeleteFileW
0x7a929c RemoveDirectoryW
0x7a92a0 DeviceIoControl
0x7a92a4 CreateDirectoryExW
0x7a92a8 GetFileSizeEx
0x7a92ac GetModuleHandleExW
0x7a92b0 LoadLibraryW
0x7a92b4 GetSystemTime
0x7a92c0 ResetEvent
0x7a92c4 CreateEventA
0x7a92c8 SetFilePointer
0x7a92cc MapViewOfFile
0x7a92d0 UnmapViewOfFile
0x7a92d4 CreateFileMappingA
0x7a92d8 ReleaseSemaphore
0x7a92dc CreateSemaphoreA
0x7a92ec GetStartupInfoW
0x7a92f0 InitializeSListHead
0x7a92f4 CreateTimerQueue
0x7a92f8 GetThreadTimes
0x7a9300 LoadLibraryExW
0x7a9310 QueryDepthSList
0x7a9314 UnregisterWaitEx
0x7a931c SignalObjectAndWait
0x7a9320 SwitchToThread
0x7a9324 GetThreadPriority
0x7a9344 UnregisterWait
0x7a9348 RtlUnwind
0x7a9350 ExitThread
0x7a9354 GetModuleFileNameA
0x7a9358 WriteConsoleW
0x7a9368 GetACP
0x7a936c GetConsoleMode
0x7a9370 ReadConsoleW
0x7a9374 GetConsoleCP
0x7a9378 GetDateFormatW
0x7a937c GetTimeFormatW
0x7a9380 IsValidLocale
0x7a9384 GetUserDefaultLCID
0x7a9388 EnumSystemLocalesW
0x7a938c FlushFileBuffers
0x7a9390 SetStdHandle
0x7a9398 FindFirstFileExA
0x7a939c FindNextFileA
0x7a93a0 IsValidCodePage
0x7a93a4 GetOEMCP
0x7a93a8 GetCommandLineA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58370 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 62192 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.