3.6
中危

f55f45f8b3d853534e87c21ee9c122b305b9b9aa5cd9ace06514d15d21d4c8bf

12882928722e9c24584636601dd40389.exe

分析耗时

74s

最近分析

文件大小

11.4MB
静态报毒 动态报毒 AGENERIC AOUP ARTEMIS AZNHI BSCOPE MALICIOUS VKONTAKTEDJ 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!12882928722E 20190805 6.0.6.653
Alibaba Downloader:Win32/Generic.580694c1 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20190805 18.4.3895.0
Tencent 20190805 1.0.0.1
Kingsoft 20190805 2013.8.14.323
CrowdStrike 20190212 1.0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:1409325940&cup2hreq=f57ab4c7531e2a407f0bad77eafb383b85acc7ed7425f0e6cb72cf6df54010e1
Performs some HTTP requests (3 个事件)
request HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
request HEAD http://r1---sn-j5o76n7l.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.99&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1620107538&mv=m&mvi=1&pl=23&shardbypass=yes
request POST https://update.googleapis.com/service/update2?cup2key=10:1409325940&cup2hreq=f57ab4c7531e2a407f0bad77eafb383b85acc7ed7425f0e6cb72cf6df54010e1
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:1409325940&cup2hreq=f57ab4c7531e2a407f0bad77eafb383b85acc7ed7425f0e6cb72cf6df54010e1
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.998099403483617 section {'size_of_data': '0x00b1b200', 'virtual_address': '0x00048000', 'entropy': 7.998099403483617, 'name': '.rsrc', 'virtual_size': '0x00b1b030'} description A section with a high entropy has been found
entropy 0.9755940636527408 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 20 AntiVirus engines on VirusTotal as malicious (20 个事件)
McAfee Artemis!12882928722E
Alibaba Downloader:Win32/Generic.580694c1
K7GW Riskware ( 0040eff71 )
K7AntiVirus Riskware ( 0040eff71 )
APEX Malicious
Kaspersky not-a-virus:HEUR:Downloader.Win32.Generic
Avast Win32:Trojan-gen
Emsisoft Application.AdLoad (A)
F-Secure Trojan.TR/Dldr.Agent.aznhi
DrWeb Program.VKontakteDJ.79
McAfee-GW-Edition Artemis!PUP
Jiangmin Downloader.Generic.aoup
Webroot W32.Adware.Gen
Avira TR/Dldr.Agent.aznhi
Antiy-AVL RiskWare[Downloader]/Win32.AGeneric
ZoneAlarm not-a-virus:HEUR:Downloader.Win32.Generic
AhnLab-V3 Malware/Gen.Generic.C3355309
VBA32 BScope.Downloader.Agent
AVG Win32:Trojan-gen
Qihoo-360 Win32/Virus.Downloader.c27
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2019-07-24 22:06:38

Imports

Library KERNEL32.dll:
0x438000 GetModuleFileNameW
0x438004 OutputDebugStringA
0x438008 OutputDebugStringW
0x43800c SizeofResource
0x438010 GetTempPathW
0x438014 GetLastError
0x438018 LockResource
0x43801c DeleteFileW
0x438020 LoadResource
0x438024 FindResourceW
0x438028 GetTempFileNameW
0x43802c TerminateProcess
0x438034 GetCurrentProcessId
0x438038 GetCurrentThreadId
0x438040 IsDebuggerPresent
0x438044 GetStartupInfoW
0x43804c WideCharToMultiByte
0x438050 CreateProcessW
0x43805c GetProcAddress
0x438060 GetModuleHandleW
0x438064 CreateEventW
0x43806c ResetEvent
0x438070 SetEvent
0x438084 CloseHandle
0x438088 InitializeSListHead
0x43808c GetCurrentProcess
Library MSVCP140.dll:
0x43810c _Strcoll
0x438120 _Strxfrm
Library VCRUNTIME140.dll:
0x438184 memcpy
0x438188 _CxxThrowException
0x438190 _purecall
0x438194 memset
0x4381a0 __CxxFrameHandler3
0x4381a8 memmove
0x4381ac __std_terminate
0x4381b0 __RTDynamicCast
0x4381b4 strchr
0x4381bc memcmp
Library api-ms-win-crt-stdio-l1-1-0.dll:
0x4382b8 ungetc
0x4382bc fputc
0x4382c0 fflush
0x4382c4 fclose
0x4382c8 fgetc
0x4382cc _set_fmode
0x4382d0 __p__commode
0x4382d4 fwrite
0x4382e0 fgetpos
0x4382e4 _fseeki64
0x4382e8 fread
0x4382ec fsetpos
0x4382f0 setvbuf
Library api-ms-win-crt-filesystem-l1-1-0.dll:
0x438218 _unlock_file
0x43821c _lock_file
Library api-ms-win-crt-runtime-l1-1-0.dll:
0x43826c _c_exit
0x438270 _cexit
0x438274 _errno
0x438278 _exit
0x43827c exit
0x438280 _initterm_e
0x438284 _initterm
0x438294 _set_app_type
0x438298 _seh_filter_exe
0x43829c _crt_atexit
0x4382a0 _controlfp_s
0x4382b0 terminate
Library api-ms-win-crt-heap-l1-1-0.dll:
0x438224 free
0x438228 _aligned_malloc
0x43822c _callnewh
0x438230 _aligned_free
0x438234 realloc
0x438238 malloc
0x43823c _set_new_mode
Library api-ms-win-crt-convert-l1-1-0.dll:
0x43820c strtoull
0x438210 strtol
Library api-ms-win-crt-string-l1-1-0.dll:
0x4382f8 _stricmp
0x4382fc tolower
Library api-ms-win-crt-math-l1-1-0.dll:
0x438250 _except1
0x438254 __setusermatherr
0x438258 _dtest
0x43825c _dsign
Library api-ms-win-crt-time-l1-1-0.dll:
0x438304 _time64
0x438308 _localtime64_s
Library api-ms-win-crt-locale-l1-1-0.dll:
0x438244 localeconv
0x438248 _configthreadlocale
Library WS2_32.dll:
0x4381c4 WSACleanup
0x4381c8 select
0x4381cc __WSAFDIsSet
0x4381d0 closesocket
0x4381d4 WSASocketW
0x4381d8 getaddrinfo
0x4381dc WSAStartup
0x4381e0 getpeername
0x4381e4 WSAGetLastError
0x4381e8 setsockopt
0x4381ec getnameinfo
0x4381f0 ioctlsocket
0x4381f4 freeaddrinfo
0x4381f8 getsockopt
0x4381fc recv
0x438200 connect
0x438204 send
Library RPCRT4.dll:
0x438174 UuidCreate
0x438178 UuidToStringW
0x43817c RpcStringFreeW

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49178 203.208.40.34 update.googleapis.com 443
192.168.56.101 49179 203.208.41.65 redirector.gvt1.com 80
192.168.56.101 49180 58.63.233.66 r1---sn-j5o76n7l.gvt1.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 57236 114.114.114.114 53
192.168.56.101 60221 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 62912 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53210 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 61680 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355

HTTP & HTTPS Requests

URI Data
http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: redirector.gvt1.com

http://r1---sn-j5o76n7l.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.99&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1620107538&mv=m&mvi=1&pl=23&shardbypass=yes
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.99&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1620107538&mv=m&mvi=1&pl=23&shardbypass=yes HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r1---sn-j5o76n7l.gvt1.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.