2.4
中危

3b0bd23e5f0a80a07822f0ac685baa601f4763440021f0cbb1695685c85cea84

25c97e3fccfb958dac33318d4fc52bd1.exe

分析耗时

80s

最近分析

文件大小

116.0KB
静态报毒 动态报毒 AGENERIC AI SCORE=95 AIDETECTVM ARTEMIS BETLOAD BSCOPE CLOUD CONFIDENCE CRYRAR ELDORADO HIGH HUW@AE3HNFK MALICIOUS MALICIOUS PE MALWARE1 MULDROP OCCAMY POSSIBLETHREAT SCORE SUSGEN TIGGRE TNX1 UNSAFE ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba 20190527 0.3.0.5
Avast 20200710 18.4.3895.0
Tencent 20200708 1.0.0.1
Baidu 20190318 1.0.0.2
Kingsoft 20200708 2013.8.14.323
McAfee Artemis!25C97E3FCCFB 20200708 6.0.6.653
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
行为判定
动态指标
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.23591102079471 section {'size_of_data': '0x0000bc00', 'virtual_address': '0x00014000', 'entropy': 7.23591102079471, 'name': '.rsrc', 'virtual_size': '0x0000baa0'} description A section with a high entropy has been found
entropy 0.40869565217391307 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 28 AntiVirus engines on VirusTotal as malicious (28 个事件)
Bkav W32.AIDetectVM.malware1
FireEye Generic.mg.25c97e3fccfb958d
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
AegisLab Trojan.Win32.Agent.tnx1
Sangfor Malware
BitDefenderTheta Gen:NN.ZexaF.34132.huW@ae3hnFk
F-Prot W32/Betload.A.gen!Eldorado
APEX Malicious
Zillya Downloader.Betload.Win32.51
Invincea heuristic
Trapmine malicious.high.ml.score
SentinelOne DFI - Malicious PE
Cyren W32/Betload.A.gen!Eldorado
Jiangmin Trojan.Cryrar.eb
Antiy-AVL Trojan/Win32.AGeneric
Microsoft Trojan:Win32/Occamy.C
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.Generic.C2716932
McAfee Artemis!25C97E3FCCFB
MAX malware (ai score=95)
VBA32 BScope.Trojan.MulDrop
Rising Trojan.Tiggre!8.ED98 (CLOUD)
eGambit Unsafe.AI_Score_77%
Fortinet W32/PossibleThreat
AVG Win32:Malware-gen
CrowdStrike win/malicious_confidence_90% (W)
MaxSecure Trojan.Malware.73428210.susgen
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2017-01-18 18:10:31

Imports

Library MSVCRT.dll:
0x4126e0 memset
0x4126e4 strncmp
0x4126e8 memmove
0x4126ec strncpy
0x4126f0 strstr
0x4126f4 _strnicmp
0x4126f8 _stricmp
0x4126fc strlen
0x412700 strcmp
0x412704 strcpy
0x412708 strcat
0x41270c memcpy
0x412710 sprintf
0x412714 fabs
0x412718 ceil
0x41271c malloc
0x412720 floor
0x412724 free
0x412728 fclose
0x41272c tolower
Library KERNEL32.dll:
0x412734 GetModuleHandleA
0x412738 HeapCreate
0x412740 HeapDestroy
0x412744 ExitProcess
0x412748 RemoveDirectoryA
0x41274c GetTempFileNameA
0x412750 GetCommandLineA
0x412754 GetNativeSystemInfo
0x412758 FindResourceA
0x41275c LoadResource
0x412760 SizeofResource
0x412764 GetShortPathNameA
0x41276c GetSystemDirectoryA
0x412770 HeapAlloc
0x412774 HeapFree
0x412778 Sleep
0x41277c LoadLibraryA
0x412780 GetProcAddress
0x412784 FreeLibrary
0x412788 GetCurrentThreadId
0x41278c GetCurrentProcessId
0x412790 CloseHandle
0x412798 GetModuleFileNameA
0x4127a4 GetCurrentProcess
0x4127a8 DuplicateHandle
0x4127ac CreatePipe
0x4127b0 GetStdHandle
0x4127b4 CreateProcessA
0x4127b8 WaitForSingleObject
0x4127c4 TerminateProcess
0x4127c8 GetExitCodeProcess
0x4127cc CreateFileA
0x4127d0 ReadFile
0x4127d4 WriteFile
0x4127d8 SetFilePointer
0x4127dc DeleteFileA
0x4127e0 GetFileSize
0x4127e4 HeapReAlloc
0x4127ec GetVersionExA
0x4127f0 SetLastError
0x4127f4 HeapSize
0x4127f8 TlsAlloc
0x4127fc CreateDirectoryA
0x412800 GetTempPathA
0x412804 SetFileAttributesA
0x412814 MultiByteToWideChar
0x412818 WideCharToMultiByte
Library USER32.DLL:
0x412820 CharUpperA
0x412824 CharLowerA
0x412828 MessageBoxA
0x41282c SendMessageA
0x412830 PostMessageA
0x412838 IsWindowVisible
0x41283c GetWindowLongA
0x412840 GetForegroundWindow
0x412844 IsWindowEnabled
0x412848 EnableWindow
0x41284c EnumWindows
0x412850 SetWindowPos
0x412854 DestroyWindow
0x412858 GetDC
0x412860 GetWindowTextA
0x412864 SetRect
0x412868 DrawTextA
0x41286c GetSystemMetrics
0x412870 ReleaseDC
0x412874 GetSysColor
0x412878 GetSysColorBrush
0x41287c CreateWindowExA
0x412880 CallWindowProcA
0x412884 SetWindowLongA
0x412888 SetFocus
0x41288c RedrawWindow
0x412890 RemovePropA
0x412894 DefWindowProcA
0x412898 SetPropA
0x41289c GetParent
0x4128a0 GetPropA
0x4128a4 GetWindow
0x4128a8 SetActiveWindow
0x4128ac UnregisterClassA
0x4128b4 LoadIconA
0x4128b8 LoadCursorA
0x4128bc RegisterClassA
0x4128c0 AdjustWindowRectEx
0x4128c4 ShowWindow
0x4128cc PeekMessageA
0x4128d4 GetMessageA
0x4128d8 GetActiveWindow
0x4128e0 TranslateMessage
0x4128e4 DispatchMessageA
0x4128e8 GetFocus
0x4128ec GetClientRect
0x4128f0 FillRect
0x4128f4 EnumChildWindows
0x4128f8 DefFrameProcA
0x4128fc GetWindowRect
0x412900 IsChild
0x412904 GetClassNameA
0x412908 GetKeyState
0x41290c DestroyIcon
Library GDI32.DLL:
0x412918 GetStockObject
0x41291c SelectObject
0x412920 SetBkColor
0x412924 SetTextColor
0x41292c CreateSolidBrush
0x412930 DeleteObject
0x412934 GetObjectA
0x412938 CreateCompatibleDC
0x41293c GetDIBits
0x412940 DeleteDC
0x412944 GetObjectType
0x412948 CreateDIBSection
0x41294c BitBlt
0x412950 CreateBitmap
0x412954 SetPixel
Library COMCTL32.DLL:
Library OLE32.DLL:
0x412964 CoInitialize
0x412968 CoTaskMemFree
0x41296c RevokeDragDrop
Library SHELL32.DLL:
0x412974 ShellExecuteExA
Library SHLWAPI.DLL:
0x41297c PathQuoteSpacesA
0x412980 PathAddBackslashA
0x412984 PathUnquoteSpacesA
0x412988 PathRemoveArgsA
0x41298c PathGetArgsA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.