4.0
中危

de1f7aaed6945bc94ca7f4ff38a29bd982310bb5dc561c0bf83474f29df7919a

23d0f637872032c715fca42b7a17985a.exe

分析耗时

76s

最近分析

文件大小

548.5KB
静态报毒 动态报毒 7XRX0UUB+OG AI SCORE=85 AIDETECTVM ATTRIBUTE BSCOPE CLASSIC CONFIDENCE ELDORADO GDSDA GENCIRC GENERICRXHI HIGH CONFIDENCE HIGHCONFIDENCE HSPMLE IMW@AU8SJCM MALWARE2 MALWARE@#13P7GZCHDKY71 PASSWORDSTEALER PREDATOR PWSX R002C0PHK20 R264426 SCORE SPYAGENT SUSGEN TROJANPSW UNSAFE VIDAR VIDARSTEALER ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
CrowdStrike win/malicious_confidence_80% (W) 20190702 1.0
Alibaba TrojanPSW:Win32/Vidar.40aad185 20190527 0.3.0.5
Avast Win32:PWSX-gen [Trj] 20201030 18.4.3895.0
Tencent Malware.Win32.Gencirc.11ad16f8 20201030 1.0.0.1
Baidu 20190318 1.0.0.2
Kingsoft 20201030 2013.8.14.323
McAfee GenericRXHI-GE!23D0F6378720 20201030 6.0.6.653
静态指标
Queries for the computername (1 个事件)
Time & API Arguments Status Return Repeated
1620119613.774307
GetComputerNameA
computer_name: OSKAR-PC
success 1 0
Collects information to fingerprint the system (MachineGuid, DigitalProductId, SystemBiosDate) (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
行为判定
动态指标
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1620119614.774307
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1620119617.368307
RegSetValueExA
key_handle: 0x00000360
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1620119617.368307
RegSetValueExA
key_handle: 0x00000360
value: àΫÒÌ@×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1620119617.368307
RegSetValueExA
key_handle: 0x00000360
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1620119617.368307
RegSetValueExW
key_handle: 0x00000360
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1620119617.368307
RegSetValueExA
key_handle: 0x00000378
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1620119617.368307
RegSetValueExA
key_handle: 0x00000378
value: àΫÒÌ@×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1620119617.368307
RegSetValueExA
key_handle: 0x00000378
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1620119617.399307
RegSetValueExW
key_handle: 0x0000035c
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
Generates some ICMP traffic
File has been identified by 58 AntiVirus engines on VirusTotal as malicious (50 out of 58 个事件)
Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
DrWeb Trojan.PWS.Stealer.29176
MicroWorld-eScan Generic.SpyAgent.6.92387743
FireEye Generic.mg.23d0f637872032c7
ALYac Generic.SpyAgent.6.92387743
Cylance Unsafe
Zillya Trojan.Agent.Win32.1373141
CrowdStrike win/malicious_confidence_80% (W)
Alibaba TrojanPSW:Win32/Vidar.40aad185
K7GW Password-Stealer ( 00569ede1 )
K7AntiVirus Password-Stealer ( 00569ede1 )
Arcabit Generic.SpyAgent.6.92387743
Invincea Mal/Generic-S
BitDefenderTheta Gen:NN.ZexaF.34590.ImW@au8sJcm
Cyren W32/Vidar.A.gen!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:PWSX-gen [Trj]
ClamAV Win.Dropper.Vidar-9369449-0
Kaspersky HEUR:Trojan-PSW.Win32.Vidar.vho
BitDefender Generic.SpyAgent.6.92387743
NANO-Antivirus Trojan.Win32.Vidar.hspmle
Paloalto generic.ml
Tencent Malware.Win32.Gencirc.11ad16f8
Ad-Aware Generic.SpyAgent.6.92387743
Emsisoft Generic.SpyAgent.6.92387743 (B)
Comodo Malware@#13p7gzchdky71
F-Secure Trojan.TR/AD.VidarStealer.FL
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R002C0PHK20
McAfee-GW-Edition BehavesLike.Win32.Generic.hh
Sophos Mal/Generic-S
Jiangmin Trojan.PSW.Vidar.ld
MaxSecure Trojan.Malware.300983.susgen
Avira TR/AD.VidarStealer.FL
Antiy-AVL Trojan[PSW]/Win32.Agent
Microsoft Trojan:Win32/PasswordStealer.KA!MTB
ZoneAlarm HEUR:Trojan-PSW.Win32.Vidar.vho
GData Generic.SpyAgent.6.92387743
Cynet Malicious (score: 100)
AhnLab-V3 Downloader/Win32.Vidar.R264426
McAfee GenericRXHI-GE!23D0F6378720
MAX malware (ai score=85)
VBA32 BScope.Backdoor.Predator
Malwarebytes Spyware.PasswordStealer.Generic
ESET-NOD32 a variant of Win32/PSW.Agent.OKD
TrendMicro-HouseCall TROJ_GEN.R002C0PHK20
Rising Stealer.Vidar!1.B80D (CLASSIC)
Yandex Trojan.PWS.Agent!7xRX0Uub+Og
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-08-20 04:16:40

Imports

Library KERNEL32.dll:
0x473058 CreateDirectoryA
0x47305c GetLastError
0x473060 CreateMutexA
0x473064 CloseHandle
0x473068 WriteFile
0x47306c CreateFileA
0x473070 MultiByteToWideChar
0x473074 ReadFile
0x473078 GetFileSize
0x47307c GetVersionExA
0x473080 GetFileSizeEx
0x473084 Process32Next
0x473088 Process32First
0x473090 TerminateProcess
0x473094 OpenProcess
0x473098 GetProcAddress
0x47309c LoadLibraryA
0x4730a4 FreeLibrary
0x4730ac lstrcatA
0x4730b0 GetFileAttributesW
0x4730c8 AreFileApisANSI
0x4730cc SetFilePointer
0x4730d0 SetEndOfFile
0x4730d4 FlushFileBuffers
0x4730d8 UnlockFile
0x4730dc LockFile
0x4730e0 LockFileEx
0x4730e4 UnlockFileEx
0x4730e8 GetFileAttributesA
0x4730f8 GetTickCount
0x4730fc GetSystemTime
0x473100 CopyFileW
0x473104 UnmapViewOfFile
0x473108 GetTempPathA
0x47310c GetTempPathW
0x473110 FormatMessageA
0x473114 FormatMessageW
0x473118 GetFullPathNameA
0x47311c GetFullPathNameW
0x473120 GetDiskFreeSpaceA
0x473124 GetDiskFreeSpaceW
0x473128 CreateFileW
0x47312c GetSystemInfo
0x473130 MapViewOfFile
0x473134 CreateFileMappingA
0x473138 GetComputerNameA
0x47313c IsWow64Process
0x473140 GetCurrentProcess
0x473144 GlobalMemoryStatus
0x473148 GetModuleHandleA
0x473158 GetLocaleInfoA
0x473164 GetLocalTime
0x473168 CompareStringW
0x47316c SetStdHandle
0x473170 IsValidLocale
0x473174 EnumSystemLocalesA
0x473178 GetUserDefaultLCID
0x47317c GetLocaleInfoW
0x473180 GetStringTypeW
0x473184 GetModuleFileNameA
0x473188 GetCurrentProcessId
0x47318c Sleep
0x473190 DeleteFileA
0x473194 ExitProcess
0x47319c GetDriveTypeA
0x4731a0 LoadLibraryW
0x4731a4 CreateDirectoryW
0x4731a8 lstrcpyW
0x4731ac lstrlenA
0x4731b0 lstrcatW
0x4731b4 FindFirstFileW
0x4731b8 lstrcmpW
0x4731bc DeleteFileW
0x4731c0 FindNextFileW
0x4731c4 FindClose
0x4731c8 HeapFree
0x4731cc GetProcessHeap
0x4731d0 HeapAlloc
0x4731d4 WideCharToMultiByte
0x4731e8 GetConsoleMode
0x4731ec GetConsoleCP
0x4731f0 GetModuleFileNameW
0x4731f4 IsValidCodePage
0x4731f8 LocalFree
0x4731fc LocalAlloc
0x473204 GetOEMCP
0x473208 GetACP
0x47320c HeapCreate
0x473210 GetFileType
0x473218 GetStdHandle
0x47321c SetHandleCount
0x473220 HeapSize
0x473224 IsDebuggerPresent
0x473230 GetCurrentThreadId
0x473234 SetLastError
0x473238 GetModuleHandleW
0x47323c TlsFree
0x473240 TlsSetValue
0x473244 TlsGetValue
0x473248 TlsAlloc
0x473250 GetCPInfo
0x473254 LCMapStringW
0x473258 GetStartupInfoW
0x47325c HeapSetInformation
0x473260 GetCommandLineA
0x473264 HeapReAlloc
0x473268 RtlUnwind
0x47326c RaiseException
0x473270 DecodePointer
0x473274 EncodePointer
0x473278 InterlockedExchange
0x473284 WriteConsoleW
Library USER32.dll:
0x4732b0 GetSystemMetrics
0x4732b4 wsprintfA
0x4732b8 EnumDisplayDevicesW
0x4732bc CharToOemA
0x4732c0 GetDC
0x4732c4 ReleaseDC
0x4732cc GetDesktopWindow
Library GDI32.dll:
0x47303c SelectObject
0x473040 BitBlt
0x473044 DeleteObject
0x473048 CreateDCA
0x47304c GetDeviceCaps
0x473050 CreateCompatibleDC
Library ADVAPI32.dll:
0x473000 RegOpenKeyExA
0x473004 RegQueryValueExA
0x473008 RegEnumKeyExA
0x47300c GetUserNameA
0x473014 RegOpenKeyExW
0x473018 RegGetValueW
0x47301c RegCloseKey
0x473020 RegGetValueA
0x473024 RegEnumValueA
Library SHELL32.dll:
0x47329c SHGetFolderPathA
0x4732a0 ShellExecuteA
Library ole32.dll:
0x47334c CoCreateInstance
0x473350 CoUninitialize
Library SHLWAPI.dll:
0x4732a8 PathMatchSpecW
Library CRYPT32.dll:
0x473030 CryptUnprotectData
Library PSAPI.DLL:
0x473290 EnumProcessModules
0x473294 GetModuleBaseNameA
Library WININET.dll:
0x4732d4 InternetConnectA
0x4732d8 HttpOpenRequestA
0x4732dc HttpSendRequestA
0x4732e0 InternetCloseHandle
0x4732e8 InternetReadFile
0x4732ec HttpQueryInfoA
0x4732f4 InternetSetOptionA
0x4732f8 InternetOpenA
0x4732fc InternetOpenUrlA
Library gdiplus.dll:
0x473324 GdipSaveImageToFile
0x47332c GdiplusShutdown
0x473330 GdiplusStartup
0x473334 GdipCloneImage
0x473338 GdipDisposeImage
0x47333c GdipAlloc
0x473344 GdipFree
Library bcrypt.dll:
0x473304 BCryptDecrypt
0x47330c BCryptDestroyKey
0x473314 BCryptSetProperty

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 57874 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 61680 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.