3.6
中危

14e45931824dcfdf4b9dee3eb202022199887175c43317be3b59aa4df8e1d610

117b1b524d46a070a858ebfdd03685a5.exe

分析耗时

83s

最近分析

文件大小

6.0MB
静态报毒 动态报毒 AUTOIT
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee 20190311 6.0.6.653
Alibaba 20190306 0.2.0.3
Baidu 20190306 1.0.0.2
Avast 20190311 18.4.3895.0
Tencent 20190311 1.0.0.1
Kingsoft 20190311 2013.8.14.323
CrowdStrike 20190212 1.0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (4 个事件)
Time & API Arguments Status Return Repeated
1620120164.657374
NtAllocateVirtualMemory
process_identifier: 580
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x01ff0000
success 0 0
1620120164.954374
NtAllocateVirtualMemory
process_identifier: 580
region_size: 3006464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x032f0000
success 0 0
1620120167.001374
NtProtectVirtualMemory
process_identifier: 580
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x002ad000
success 0 0
1620120167.485374
NtProtectVirtualMemory
process_identifier: 580
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00305000
success 0 0
Foreign language identified in PE resource (6 个事件)
name BIN language LANG_CHINESE offset 0x000a9890 filetype PE32 executable (DLL) (GUI) Intel 80386, for MS Windows sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00219688
name RT_ICON language LANG_CHINESE offset 0x002c4aa4 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000025a8
name RT_ICON language LANG_CHINESE offset 0x002c4aa4 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000025a8
name RT_ICON language LANG_CHINESE offset 0x002c4aa4 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000025a8
name RT_GROUP_ICON language LANG_CHINESE offset 0x002c9860 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000030
name RT_VERSION language LANG_CHINESE offset 0x002c9890 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000498
File has been identified by one AntiVirus engine on VirusTotal as malicious (1 个事件)
Zillya Trojan.Autoit.Win32.27948
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 6.848816315356306 section {'size_of_data': '0x00220e00', 'virtual_address': '0x000a9000', 'entropy': 6.848816315356306, 'name': '.rsrc', 'virtual_size': '0x00221000'} description A section with a high entropy has been found
entropy 0.7685119887165022 description Overall entropy of this PE file is high
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2007-04-17 19:21:06

Imports

Library ADVAPI32.DLL:
0x49d100 RegCloseKey
0x49d104 RegOpenKeyExA
0x49d108 RegQueryValueExA
Library KERNEL32.DLL:
0x49d2bc CloseHandle
0x49d2c0 CompareStringA
0x49d2c4 CreateEventA
0x49d2c8 CreateFileA
0x49d2cc CreateThread
0x49d2d4 DeleteFileA
0x49d2d8 DeviceIoControl
0x49d2e0 EnumCalendarInfoA
0x49d2e4 ExitProcess
0x49d2f0 FindClose
0x49d2f4 FindFirstFileA
0x49d2f8 FindResourceA
0x49d300 FormatMessageA
0x49d304 FreeLibrary
0x49d308 FreeResource
0x49d30c GetACP
0x49d310 GetCPInfo
0x49d314 GetCommandLineA
0x49d31c GetCurrentProcessId
0x49d320 GetCurrentThreadId
0x49d324 GetDateFormatA
0x49d328 GetDiskFreeSpaceA
0x49d330 GetFileAttributesA
0x49d334 GetFileSize
0x49d338 GetFileType
0x49d33c GetLastError
0x49d340 GetLocalTime
0x49d344 GetLocaleInfoA
0x49d348 GetModuleFileNameA
0x49d34c GetModuleHandleA
0x49d350 GetOEMCP
0x49d354 GetProcAddress
0x49d358 GetProcessHeap
0x49d35c GetStartupInfoA
0x49d360 GetStdHandle
0x49d364 GetStringTypeExA
0x49d368 GetStringTypeW
0x49d36c GetSystemDirectoryA
0x49d370 GetSystemInfo
0x49d374 GetThreadLocale
0x49d378 GetTickCount
0x49d37c GetUserDefaultLCID
0x49d380 GetVersion
0x49d384 GetVersionExA
0x49d388 GlobalAddAtomA
0x49d38c GlobalAlloc
0x49d390 GlobalDeleteAtom
0x49d394 GlobalFindAtomA
0x49d398 GlobalFree
0x49d39c GlobalHandle
0x49d3a0 GlobalLock
0x49d3a4 GlobalReAlloc
0x49d3a8 GlobalUnlock
0x49d3ac HeapAlloc
0x49d3b0 HeapFree
0x49d3c4 LoadLibraryA
0x49d3c8 LoadLibraryExA
0x49d3cc LoadResource
0x49d3d0 LocalAlloc
0x49d3d4 LocalFree
0x49d3d8 LockResource
0x49d3dc MulDiv
0x49d3e0 MultiByteToWideChar
0x49d3e4 RaiseException
0x49d3e8 ReadFile
0x49d3ec ResetEvent
0x49d3f0 RtlUnwind
0x49d3fc SetEndOfFile
0x49d400 SetErrorMode
0x49d404 SetEvent
0x49d408 SetFilePointer
0x49d40c SetHandleCount
0x49d410 SetLastError
0x49d414 SetThreadLocale
0x49d418 SizeofResource
0x49d41c Sleep
0x49d420 TlsAlloc
0x49d424 TlsFree
0x49d428 TlsGetValue
0x49d42c TlsSetValue
0x49d434 VirtualAlloc
0x49d438 VirtualFree
0x49d43c VirtualProtect
0x49d440 VirtualQuery
0x49d444 WaitForSingleObject
0x49d448 WideCharToMultiByte
0x49d44c WriteFile
0x49d450 lstrcmpA
0x49d454 lstrcmpiA
0x49d458 lstrcpyA
0x49d45c lstrcpynA
0x49d460 lstrlenA
Library VERSION.DLL:
0x49d478 GetFileVersionInfoA
0x49d480 VerQueryValueA
Library COMCTL32.DLL:
0x49d4e4 ImageList_Add
0x49d4e8 ImageList_BeginDrag
0x49d4ec ImageList_Create
0x49d4f0 ImageList_Destroy
0x49d4f4 ImageList_DragEnter
0x49d4f8 ImageList_DragLeave
0x49d4fc ImageList_DragMove
0x49d504 ImageList_Draw
0x49d508 ImageList_DrawEx
0x49d50c ImageList_EndDrag
0x49d520 ImageList_Read
0x49d524 ImageList_Remove
0x49d538 ImageList_Write
Library COMDLG32.DLL:
0x49d54c GetOpenFileNameA
0x49d550 GetSaveFileNameA
Library GDI32.DLL:
0x49d674 BitBlt
0x49d678 CopyEnhMetaFileA
0x49d67c CreateBitmap
0x49d680 CreateBrushIndirect
0x49d688 CreateCompatibleDC
0x49d68c CreateDCA
0x49d690 CreateDIBSection
0x49d694 CreateDIBitmap
0x49d698 CreateFontIndirectA
0x49d6a0 CreatePalette
0x49d6a4 CreatePenIndirect
0x49d6a8 CreateSolidBrush
0x49d6ac DeleteDC
0x49d6b0 DeleteEnhMetaFile
0x49d6b4 DeleteObject
0x49d6b8 Ellipse
0x49d6bc ExcludeClipRect
0x49d6c0 GetBitmapBits
0x49d6c4 GetBrushOrgEx
0x49d6c8 GetClipBox
0x49d6d0 GetDCOrgEx
0x49d6d4 GetDIBColorTable
0x49d6d8 GetDIBits
0x49d6dc GetDeviceCaps
0x49d6e0 GetEnhMetaFileBits
0x49d6ec GetObjectA
0x49d6f0 GetPaletteEntries
0x49d6f4 GetPixel
0x49d6f8 GetStockObject
0x49d704 GetTextExtentPointA
0x49d708 GetTextMetricsA
0x49d70c GetWinMetaFileBits
0x49d710 GetWindowOrgEx
0x49d714 IntersectClipRect
0x49d718 LPtoDP
0x49d71c LineTo
0x49d720 MaskBlt
0x49d724 MoveToEx
0x49d728 PatBlt
0x49d72c PlayEnhMetaFile
0x49d730 RealizePalette
0x49d734 RectVisible
0x49d738 Rectangle
0x49d73c RestoreDC
0x49d740 RoundRect
0x49d744 SaveDC
0x49d748 SelectObject
0x49d74c SelectPalette
0x49d750 SetBkColor
0x49d754 SetBkMode
0x49d758 SetBrushOrgEx
0x49d75c SetDIBColorTable
0x49d760 SetEnhMetaFileBits
0x49d764 SetMapMode
0x49d768 SetPixel
0x49d76c SetROP2
0x49d770 SetStretchBltMode
0x49d774 SetTextColor
0x49d778 SetViewportOrgEx
0x49d77c SetWinMetaFileBits
0x49d780 SetWindowOrgEx
0x49d784 StretchBlt
0x49d788 UnrealizeObject
Library SHELL32.DLL:
0x49d798 ShellExecuteA
Library USER32.DLL:
0x49da4c AdjustWindowRectEx
0x49da50 BeginPaint
0x49da54 CallNextHookEx
0x49da58 CallWindowProcA
0x49da5c CharLowerA
0x49da60 CharLowerBuffA
0x49da64 CharNextA
0x49da68 CharUpperBuffA
0x49da6c CheckMenuItem
0x49da70 ClientToScreen
0x49da74 CloseClipboard
0x49da78 CreateIcon
0x49da7c CreateMenu
0x49da80 CreatePopupMenu
0x49da84 CreateWindowExA
0x49da88 DefFrameProcA
0x49da8c DefMDIChildProcA
0x49da90 DefWindowProcA
0x49da94 DeleteMenu
0x49da98 DestroyCursor
0x49da9c DestroyIcon
0x49daa0 DestroyMenu
0x49daa4 DestroyWindow
0x49daa8 DispatchMessageA
0x49daac DrawEdge
0x49dab0 DrawFrameControl
0x49dab4 DrawIcon
0x49dab8 DrawIconEx
0x49dabc DrawMenuBar
0x49dac0 DrawTextA
0x49dac4 EmptyClipboard
0x49dac8 EnableMenuItem
0x49dacc EnableScrollBar
0x49dad0 EnableWindow
0x49dad4 EndPaint
0x49dad8 EnumThreadWindows
0x49dadc EnumWindows
0x49dae0 EqualRect
0x49dae4 FillRect
0x49dae8 FindWindowA
0x49daec FrameRect
0x49daf0 GetActiveWindow
0x49daf4 GetCapture
0x49daf8 GetClassInfoA
0x49dafc GetClassNameA
0x49db00 GetClientRect
0x49db04 GetClipboardData
0x49db08 GetCursor
0x49db0c GetCursorPos
0x49db10 GetDC
0x49db14 GetDCEx
0x49db18 GetDesktopWindow
0x49db1c GetDlgItem
0x49db20 GetFocus
0x49db24 GetForegroundWindow
0x49db28 GetIconInfo
0x49db2c GetKeyNameTextA
0x49db30 GetKeyState
0x49db34 GetKeyboardLayout
0x49db3c GetKeyboardState
0x49db40 GetKeyboardType
0x49db44 GetLastActivePopup
0x49db48 GetMenu
0x49db4c GetMenuItemCount
0x49db50 GetMenuItemID
0x49db54 GetMenuItemInfoA
0x49db58 GetMenuState
0x49db5c GetMenuStringA
0x49db60 GetMessageTime
0x49db64 GetParent
0x49db68 GetPropA
0x49db6c GetScrollInfo
0x49db70 GetScrollPos
0x49db74 GetScrollRange
0x49db78 GetSubMenu
0x49db7c GetSysColorBrush
0x49db80 GetSystemMenu
0x49db84 GetSystemMetrics
0x49db88 GetTopWindow
0x49db8c GetWindow
0x49db90 GetWindowDC
0x49db94 GetWindowLongA
0x49db98 GetWindowPlacement
0x49db9c GetWindowRect
0x49dba0 GetWindowTextA
0x49dba8 InflateRect
0x49dbac InsertMenuA
0x49dbb0 InsertMenuItemA
0x49dbb4 IntersectRect
0x49dbb8 InvalidateRect
0x49dbbc InvalidateRgn
0x49dbc0 IsChild
0x49dbc4 IsDialogMessageA
0x49dbc8 IsIconic
0x49dbcc IsRectEmpty
0x49dbd0 IsWindow
0x49dbd4 IsWindowEnabled
0x49dbd8 IsWindowVisible
0x49dbdc IsZoomed
0x49dbe0 KillTimer
0x49dbe4 LoadBitmapA
0x49dbe8 LoadCursorA
0x49dbec LoadIconA
0x49dbf0 LoadKeyboardLayoutA
0x49dbf4 LoadMenuIndirectA
0x49dbf8 LoadStringA
0x49dbfc MapVirtualKeyA
0x49dc00 MapWindowPoints
0x49dc04 MessageBeep
0x49dc08 MessageBoxA
0x49dc0c OemToCharA
0x49dc10 OffsetRect
0x49dc14 OpenClipboard
0x49dc18 PeekMessageA
0x49dc1c PostMessageA
0x49dc20 PostQuitMessage
0x49dc24 PtInRect
0x49dc28 RedrawWindow
0x49dc2c RegisterClassA
0x49dc30 RegisterClassExA
0x49dc3c ReleaseCapture
0x49dc40 ReleaseDC
0x49dc44 RemoveMenu
0x49dc48 RemovePropA
0x49dc4c ScreenToClient
0x49dc50 ScrollWindow
0x49dc54 SendMessageA
0x49dc58 SetActiveWindow
0x49dc5c SetCapture
0x49dc60 SetClassLongA
0x49dc64 SetClipboardData
0x49dc68 SetCursor
0x49dc6c SetFocus
0x49dc70 SetForegroundWindow
0x49dc74 SetMenu
0x49dc78 SetMenuItemInfoA
0x49dc7c SetPropA
0x49dc80 SetRect
0x49dc84 SetScrollInfo
0x49dc88 SetScrollPos
0x49dc8c SetScrollRange
0x49dc90 SetTimer
0x49dc94 SetWindowLongA
0x49dc98 SetWindowPlacement
0x49dc9c SetWindowPos
0x49dca0 SetWindowTextA
0x49dca4 SetWindowsHookExA
0x49dca8 ShowCursor
0x49dcac ShowOwnedPopups
0x49dcb0 ShowScrollBar
0x49dcb4 ShowWindow
0x49dcbc TrackPopupMenu
0x49dcc4 TranslateMessage
0x49dcc8 UnhookWindowsHookEx
0x49dccc UnregisterClassA
0x49dcd0 UpdateWindow
0x49dcd4 ValidateRect
0x49dcd8 WaitMessage
0x49dcdc WinHelpA
0x49dce0 WindowFromPoint
0x49dce4 wsprintfA
0x49dce8 GetSysColor
Library WINMM.DLL:
0x49dcf8 waveOutWrite
Library OLE32.DLL:
0x49dd20 CoCreateInstance
0x49dd24 CoInitialize
0x49dd28 CoUninitialize
0x49dd30 IsAccelerator
0x49dd34 OleLockRunning
Library OLEAUT32.DLL:
0x49dd84 GetErrorInfo
0x49dd88 SafeArrayCreate
0x49dd8c SafeArrayGetElement
0x49dd90 SafeArrayGetLBound
0x49dd94 SafeArrayGetUBound
0x49dd98 SafeArrayPtrOfIndex
0x49dd9c SafeArrayPutElement
0x49dda0 SafeArrayRedim
0x49dda4 SysAllocStringLen
0x49dda8 SysFreeString
0x49ddac SysReAllocStringLen
0x49ddb0 VariantChangeType
0x49ddb4 VariantClear
0x49ddb8 VariantCopy
0x49ddbc VariantCopyInd
0x49ddc0 VariantInit

Exports

Ordinal Address Name
29 0x408acc @$xp$27Flashplayercontrol@IBindCtx
33 0x408bcc @$xp$27Flashplayercontrol@IMoniker
7 0x407e2e @$xp$28Flashplayercontrol@PBindOpts
5 0x407ded @$xp$28Flashplayercontrol@PIMoniker
8 0x407e2e @$xp$28Flashplayercontrol@TBindOpts
26 0x408a10 @$xp$29Flashplayercontrol@IOleObject
27 0x408a4c @$xp$30Flashplayercontrol@IDropTarget
4 0x407db0 @$xp$30Flashplayercontrol@IEnumString
28 0x408a8c @$xp$30Flashplayercontrol@IViewObject
24 0x408988 @$xp$31Flashplayercontrol@IEnumMoniker

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58370 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 62192 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.