2.8
中危

bf40106d619467e0334103e98e08d6a1859a6f3fcd06e416fe55b9a1345b9ec2

2125021e03d1afb4e68dd8b663c208f6.exe

分析耗时

74s

最近分析

文件大小

64.0KB
静态报毒 动态报毒 ARTEMIS CLOUD FILEREPMALWARE PRESENOKER UNSAFE
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast 20200510 18.4.3895.0
Kingsoft 20200510 2013.8.14.323
McAfee Artemis!2125021E03D1 20200510 6.0.6.653
Tencent 20200510 1.0.0.1
CrowdStrike 20190702 1.0
静态指标
行为判定
动态指标
Foreign language identified in PE resource (24 个事件)
name RT_DIALOG language LANG_CHINESE offset 0x00010c5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000342
name RT_DIALOG language LANG_CHINESE offset 0x00010c5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000342
name RT_DIALOG language LANG_CHINESE offset 0x00010c5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000342
name RT_DIALOG language LANG_CHINESE offset 0x00010c5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000342
name RT_DIALOG language LANG_CHINESE offset 0x00010c5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000342
name RT_DIALOG language LANG_CHINESE offset 0x00010c5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000342
name RT_DIALOG language LANG_CHINESE offset 0x00010c5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000342
name RT_DIALOG language LANG_CHINESE offset 0x00010c5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000342
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
name RT_STRING language LANG_CHINESE offset 0x00012948 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d6
File has been identified by 9 AntiVirus engines on VirusTotal as malicious (9 个事件)
Cylance Unsafe
Paloalto generic.ml
AegisLab Trojan.Win32.Generic.4!c
Rising PUA.Presenoker!8.F608 (CLOUD)
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition Artemis!Trojan
Microsoft PUA:Win32/Presenoker
McAfee Artemis!2125021E03D1
AVG FileRepMalware
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Attempts to disable System Restore (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\DisableSR
Attempts to modify Explorer settings to prevent hidden files from being displayed (2 个事件)
registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden
registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2009-04-07 13:37:25

Imports

Library KERNEL32.dll:
0x407020 TerminateProcess
0x407024 SetFilePointer
0x407028 FlushFileBuffers
0x40702c SetStdHandle
0x407030 GetStringTypeW
0x407034 GetStringTypeA
0x407038 TlsGetValue
0x40703c SetLastError
0x407040 TlsAlloc
0x407044 TlsSetValue
0x407048 GetCurrentThreadId
0x40704c GetFileType
0x407050 GetModuleFileNameA
0x407054 ExitProcess
0x407058 GetVersionExA
0x40705c GetCurrentProcess
0x407060 GetProcAddress
0x407064 CloseHandle
0x407068 GetLastError
0x40706c LoadLibraryA
0x407070 GetStdHandle
0x407074 SetHandleCount
0x40707c HeapFree
0x407080 HeapAlloc
0x40708c GetModuleHandleA
0x407090 GetStartupInfoA
0x407094 GetCommandLineA
0x407098 GetVersion
0x4070ac GetCPInfo
0x4070b0 GetACP
0x4070b4 GetOEMCP
0x4070b8 WideCharToMultiByte
0x4070c0 HeapDestroy
0x4070c4 HeapCreate
0x4070c8 VirtualFree
0x4070cc VirtualAlloc
0x4070d0 HeapReAlloc
0x4070d4 RtlUnwind
0x4070d8 MultiByteToWideChar
0x4070dc LCMapStringA
0x4070e0 LCMapStringW
0x4070e4 WriteFile
Library USER32.dll:
0x4070fc LoadStringA
0x407100 MessageBoxA
Library ADVAPI32.dll:
0x407000 RegSetValueExA
0x407004 RegOpenKeyExA
0x407008 RegQueryInfoKeyA
0x40700c RegQueryValueExA
0x407010 RegEnumKeyExA
0x407014 RegDeleteValueA
0x407018 RegCloseKey

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58370 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 62194 239.255.255.250 1900
192.168.56.101 65005 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.