6.0
高危

e76bec8296bd5cbfda99663d0ab1056dd2dcf34d7bc19cfbeea62b8b11876d5b

162dbeec448c7757134d86a57893d831.exe

分析耗时

88s

最近分析

文件大小

9.5MB
静态报毒 动态报毒
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
未检测 暂无反病毒引擎检测结果
静态指标
One or more processes crashed (4 个事件)
Time & API Arguments Status Return Repeated
1620842161.223875
__exception__
stacktrace:
dbkFCallWrapperAddr+0x3ab18ef 162dbeec448c7757134d86a57893d831+0x3dccf2b @ 0x3f4cf2b
dbkFCallWrapperAddr+0x3a1a51a 162dbeec448c7757134d86a57893d831+0x3d35b56 @ 0x3eb5b56

registers.esp: 73660908
registers.edi: 62541824
registers.eax: 73660908
registers.ebp: 73660988
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 2010805291
registers.ecx: 3400990720
exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x778eb727
success 0 0
1620842161.332875
__exception__
stacktrace:

                
            
            
            
registers.esp: 73661028
registers.edi: 73674442
registers.eax: 1750617430
registers.ebp: 62541824
registers.edx: 22614
registers.ebx: 2147483650
registers.esi: 64657090
registers.ecx: 20
exception.instruction_r: ed e9 d2 75 ff ff c3 e9 93 a2 ff ff 46 cd aa 70
exception.symbol: dbkFCallWrapperAddr+0x3b4483b 162dbeec448c7757134d86a57893d831+0x3e5fe77
exception.instruction: in eax, dx
exception.module: 162dbeec448c7757134d86a57893d831.exe
exception.exception_code: 0xc0000096
exception.offset: 65404535
exception.address: 0x3fdfe77
success 0 0
1620842161.332875
__exception__
stacktrace:

                
            
            
            
registers.esp: 73661028
registers.edi: 73674442
registers.eax: 1447909480
registers.ebp: 62541824
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 64657090
registers.ecx: 10
exception.instruction_r: ed e9 3b 3e 0f 00 4a 9e ff ff a2 00 77 00 3b 00
exception.symbol: dbkFCallWrapperAddr+0x3a4e3d5 162dbeec448c7757134d86a57893d831+0x3d69a11
exception.instruction: in eax, dx
exception.module: 162dbeec448c7757134d86a57893d831.exe
exception.exception_code: 0xc0000096
exception.offset: 64395793
exception.address: 0x3ee9a11
success 0 0
1620842163.238875
__exception__
stacktrace:
__dbk_fcall_wrapper+0x1ceb4 TMethodImplementationIntercept-0xab958 162dbeec448c7757134d86a57893d831+0x2e8c0 @ 0x1ae8c0
__dbk_fcall_wrapper+0x1ceb4 TMethodImplementationIntercept-0xab958 162dbeec448c7757134d86a57893d831+0x2e8c0 @ 0x1ae8c0
TMethodImplementationIntercept+0x1504ab dbkFCallWrapperAddr-0xf0f79 162dbeec448c7757134d86a57893d831+0x22a6c3 @ 0x3aa6c3
0x463faac

registers.esp: 73660444
registers.edi: 73660676
registers.eax: 73660444
registers.ebp: 73660524
registers.edx: 0
registers.ebx: 126
registers.esi: 0
registers.ecx: 7
exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xeedfade
exception.offset: 46887
exception.address: 0x778eb727
success 0 0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (6 个事件)
Time & API Arguments Status Return Repeated
1620842161.192875
NtProtectVirtualMemory
process_identifier: 1176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77dcf000
success 0 0
1620842161.192875
NtProtectVirtualMemory
process_identifier: 1176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d40000
success 0 0
1620842162.160875
NtProtectVirtualMemory
process_identifier: 1176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 16384
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x03561000
success 0 0
1620842162.160875
NtProtectVirtualMemory
process_identifier: 1176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x03561000
success 0 0
1620842162.160875
NtProtectVirtualMemory
process_identifier: 1176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x03561000
success 0 0
1620842162.801875
NtAllocateVirtualMemory
process_identifier: 1176
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x06080000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (10 个事件)
entropy 7.98210667939138 section {'size_of_data': '0x0010fe00', 'virtual_address': '0x00001000', 'entropy': 7.98210667939138, 'name': '.text', 'virtual_size': '0x00306c64'} description A section with a high entropy has been found
entropy 7.804269981969655 section {'size_of_data': '0x00001200', 'virtual_address': '0x00308000', 'entropy': 7.804269981969655, 'name': '.text', 'virtual_size': '0x000022e4'} description A section with a high entropy has been found
entropy 7.9409647287707665 section {'size_of_data': '0x00008400', 'virtual_address': '0x0030b000', 'entropy': 7.9409647287707665, 'name': '.data', 'virtual_size': '0x0000cbcc'} description A section with a high entropy has been found
entropy 6.808580048794839 section {'size_of_data': '0x00000600', 'virtual_address': '0x033e5000', 'entropy': 6.808580048794839, 'name': '.data', 'virtual_size': '0x00000bd6'} description A section with a high entropy has been found
entropy 7.977450929111993 section {'size_of_data': '0x00026400', 'virtual_address': '0x033e9000', 'entropy': 7.977450929111993, 'name': '.data', 'virtual_size': '0x00042c24'} description A section with a high entropy has been found
entropy 7.93342590420978 section {'size_of_data': '0x004a6a00', 'virtual_address': '0x0342c000', 'entropy': 7.93342590420978, 'name': '.data', 'virtual_size': '0x005cbe00'} description A section with a high entropy has been found
entropy 7.395723950756055 section {'size_of_data': '0x0002a000', 'virtual_address': '0x039fb000', 'entropy': 7.395723950756055, 'name': '.rsrc', 'virtual_size': '0x0002a000'} description A section with a high entropy has been found
entropy 7.940803983715923 section {'size_of_data': '0x00363e00', 'virtual_address': '0x03fcf000', 'entropy': 7.940803983715923, 'name': '.text', 'virtual_size': '0x00363e00'} description A section with a high entropy has been found
entropy 7.9305739698950095 section {'size_of_data': '0x00004800', 'virtual_address': '0x04337000', 'entropy': 7.9305739698950095, 'name': '.data', 'virtual_size': '0x00004800'} description A section with a high entropy has been found
entropy 0.9977923028764357 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (2 个事件)
host 172.217.24.14
host 203.208.41.65
Checks for the presence of known windows from debuggers and forensic tools (50 out of 99 个事件)
Time & API Arguments Status Return Repeated
1620842161.238875
FindWindowA
class_name: RegmonClass
window_name:
failed 0 0
1620842161.238875
FindWindowA
class_name: RegmonClass
window_name:
failed 0 0
1620842161.238875
FindWindowA
class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620842161.238875
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620842161.332875
FindWindowA
class_name: FilemonClass
window_name:
failed 0 0
1620842161.332875
FindWindowA
class_name: FilemonClass
window_name:
failed 0 0
1620842161.332875
FindWindowA
class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620842161.332875
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620842161.332875
FindWindowA
class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620842165.348875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842165.348875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842165.660875
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620842165.973875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842165.973875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842165.973875
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620842169.973875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842169.973875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842170.285875
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620842170.598875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842170.598875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842170.598875
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620842174.598875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842174.598875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842174.910875
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620842175.223875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842175.223875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842175.223875
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620842179.223875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842179.223875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842179.535875
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620842179.848875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842179.848875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842179.848875
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620842183.848875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842183.848875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842184.160875
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620842184.473875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842184.473875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842184.473875
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620842188.473875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842188.473875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842188.785875
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620842189.098875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842189.098875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842189.098875
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620842193.098875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842193.098875
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620842193.410875
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620842193.723875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620842193.723875
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
Checks the version of Bios, possibly for anti-virtualization (2 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Detects VirtualBox through the presence of a registry key (1 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Detects Virtual Machines through their custom firmware (1 个事件)
Time & API Arguments Status Return Repeated
1620842161.238875
NtQuerySystemInformation
information_class: 76 (SystemFirmwareTableInformation)
failed 3221225507 0
Detects VMWare through the in instruction feature (1 个事件)
Time & API Arguments Status Return Repeated
1620842161.332875
__exception__
stacktrace:

                
            
            
            
registers.esp: 73661028
registers.edi: 73674442
registers.eax: 1447909480
registers.ebp: 62541824
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 64657090
registers.ecx: 10
exception.instruction_r: ed e9 3b 3e 0f 00 4a 9e ff ff a2 00 77 00 3b 00
exception.symbol: dbkFCallWrapperAddr+0x3a4e3d5 162dbeec448c7757134d86a57893d831+0x3d69a11
exception.instruction: in eax, dx
exception.module: 162dbeec448c7757134d86a57893d831.exe
exception.exception_code: 0xc0000096
exception.offset: 64395793
exception.address: 0x3ee9a11
success 0 0
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 192.168.56.101:49189
dead_host 203.208.41.65:80
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-04-28 05:26:01

Imports

Library kernel32.dll:
0x3df96a0 GetModuleHandleA
0x3df96a4 GetCurrentThreadId
0x3df96a8 DecodePointer
0x3df96ac GetCommandLineA
0x3df96b0 TerminateProcess
0x3df96b4 GetCurrentProcess
0x3df96c0 IsDebuggerPresent
0x3df96c4 EncodePointer
0x3df96c8 TlsAlloc
0x3df96cc TlsGetValue
0x3df96d0 TlsSetValue
0x3df96d4 TlsFree
0x3df96d8 InterlockedIncrement
0x3df96dc GetModuleHandleW
0x3df96e0 SetLastError
0x3df96e4 GetLastError
0x3df96e8 InterlockedDecrement
0x3df96ec GetProcAddress
0x3df96f0 HeapFree
0x3df96f4 Sleep
0x3df96f8 ExitProcess
0x3df96fc SetHandleCount
0x3df9700 GetStdHandle
0x3df9708 GetFileType
0x3df970c GetStartupInfoW
0x3df9710 DeleteCriticalSection
0x3df9714 GetModuleFileNameA
0x3df971c WideCharToMultiByte
0x3df9724 HeapCreate
0x3df9728 HeapDestroy
0x3df9730 GetTickCount
0x3df9734 GetCurrentProcessId
0x3df973c LeaveCriticalSection
0x3df9740 EnterCriticalSection
0x3df9744 GetCPInfo
0x3df9748 GetACP
0x3df974c GetOEMCP
0x3df9750 IsValidCodePage
0x3df9754 HeapAlloc
0x3df9758 HeapReAlloc
0x3df975c LoadLibraryW
0x3df9760 WriteFile
0x3df9764 GetModuleFileNameW
0x3df9768 RtlUnwind
0x3df976c LCMapStringW
0x3df9770 MultiByteToWideChar
0x3df9774 GetStringTypeW
0x3df9778 HeapSize
Library winmm.dll:
0x3df9784 timeGetTime
Library winspool.drv:
0x3df978c DocumentPropertiesW
Library comctl32.dll:
Library shell32.dll:
0x3df979c Shell_NotifyIconW
Library user32.dll:
0x3df97a4 CopyImage
Library version.dll:
Library oleaut32.dll:
0x3df97b4 SysFreeString
Library advapi32.dll:
0x3df97bc RegSetValueExW
Library netapi32.dll:
0x3df97c4 NetWkstaGetInfo
Library msvcrt.dll:
0x3df97cc memcpy
Library wsock32.dll:
0x3df97d4 gethostbyaddr
Library ole32.dll:
0x3df97dc IsEqualGUID
Library gdi32.dll:
0x3df97e4 Pie

Exports

Ordinal Address Name
3 0x4da218 TMethodImplementationIntercept
2 0x411a0c __dbk_fcall_wrapper
1 0x71b63c dbkFCallWrapperAddr

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 57874 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50537 239.255.255.250 1900
192.168.56.101 50539 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.