5.8
高危

c51058733acbdfdb2281a3278a4fc05df65e823ed324033eef981e940db4dcf4

2d47e712019aa4a266acd4c5ed52289d.exe

分析耗时

107s

最近分析

文件大小

623.5KB
静态报毒 动态报毒 3OGGIBZCXFKBLGFYG A26ELRZQQ38 AGEN AI SCORE=89 AIDETECTVM ATTRIBUTE BJ+W BSCOPE CONFIDENCE DELF DELFINJECT EMIJ FAREIT GDSDA GENERIC@ML GENERICKD GULOADER HIGH CONFIDENCE HIGHCONFIDENCE HOGBHH HSIX MALWARE1 MALWARE@#27L3DKMMR9WXC MGW@AWVNSNOI OBIK RDMK REMCOS SCORE STATIC AI SUSPICIOUS PE UNSAFE ZELPHIF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Fareit-FUL!2D47E712019A 20201211 6.0.6.653
Alibaba Backdoor:Win32/Injector.851674e8 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20201210 21.1.5827.0
Tencent Win32.Backdoor.Remcos.Hsix 20201211 1.0.0.1
CrowdStrike win/malicious_confidence_70% (W) 20190702 1.0
静态指标
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 个事件)
section CODE
section DATA
section BSS
The executable uses a known packer (1 个事件)
packer BobSoft Mini Delphi -> BoB / BobSoft
One or more processes crashed (1 个事件)
Time & API Arguments Status Return Repeated
1619340521.250375
__exception__
stacktrace:
0x1ff41aa
0x36bfe6c

registers.esp: 57408536
registers.edi: 0
registers.eax: 0
registers.ebp: 57408564
registers.edx: 0
registers.ebx: 0
registers.esi: 57408580
registers.ecx: 4294967294
exception.instruction_r: 8b 40 3c 99 03 04 24 13 54 24 04 83 c4 08 89 44
exception.instruction: mov eax, dword ptr [eax + 0x3c]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x1ff8e01
success 0 0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619340465.937375
NtAllocateVirtualMemory
process_identifier: 2428
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x005c0000
success 0 0
Downloads a file or document from Google Drive (1 个事件)
domain drive.google.com
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1619340497.453375
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1619340500.015375
RegSetValueExA
key_handle: 0x000003b0
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1619340500.015375
RegSetValueExA
key_handle: 0x000003b0
value: °%4Ï9×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1619340500.015375
RegSetValueExA
key_handle: 0x000003b0
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1619340500.015375
RegSetValueExW
key_handle: 0x000003b0
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1619340500.015375
RegSetValueExA
key_handle: 0x000003c8
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1619340500.015375
RegSetValueExA
key_handle: 0x000003c8
value: °%4Ï9×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1619340500.015375
RegSetValueExA
key_handle: 0x000003c8
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1619340500.109375
RegSetValueExW
key_handle: 0x000003ac
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
File has been identified by 49 AntiVirus engines on VirusTotal as malicious (49 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.43285066
FireEye Generic.mg.2d47e712019aa4a2
McAfee Fareit-FUL!2D47E712019A
Malwarebytes Trojan.GuLoader
Zillya Trojan.Injector.Win32.740878
Sangfor Malware
K7AntiVirus Trojan ( 0056816b1 )
Alibaba Backdoor:Win32/Injector.851674e8
K7GW Trojan ( 0056816b1 )
Cybereason malicious.30794b
Arcabit Trojan.Generic.D2947A4A
BitDefenderTheta Gen:NN.ZelphiF.34670.MGW@aWVNsnoi
Cyren W32/DelfInject.OBIK-4124
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Trojan-gen
Kaspersky HEUR:Backdoor.Win32.Remcos.gen
BitDefender Trojan.GenericKD.43285066
NANO-Antivirus Trojan.Win32.Remcos.hogbhh
Paloalto generic.ml
Rising Trojan.Generic@ML.80 (RDMK:bJ+W/3OGGibZCxFKBLGfyg)
Ad-Aware Trojan.GenericKD.43285066
Emsisoft Trojan.GenericKD.43285066 (B)
Comodo Malware@#27l3dkmmr9wxc
F-Secure Heuristic.HEUR/AGEN.1136974
McAfee-GW-Edition Fareit-FUL!2D47E712019A
Sophos Mal/Generic-S
SentinelOne Static AI - Suspicious PE
Avira HEUR/AGEN.1136974
Antiy-AVL Trojan[Backdoor]/Win32.Remcos
Microsoft PWS:Win32/Fareit.ART!MTB
ZoneAlarm HEUR:Backdoor.Win32.Remcos.gen
GData Trojan.GenericKD.43285066
Cynet Malicious (score: 85)
VBA32 BScope.Backdoor.Remcos
ALYac Trojan.GenericKD.43285066
MAX malware (ai score=89)
ESET-NOD32 a variant of Win32/Injector.EMIJ
Tencent Win32.Backdoor.Remcos.Hsix
Yandex Trojan.Injector!a26elRzqQ38
Ikarus Trojan.Agent
eGambit Unsafe.AI_Score_99%
Fortinet W32/Delf.BZL!tr
AVG Win32:Trojan-gen
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_70% (W)
Qihoo-360 Win32/Backdoor.a07
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (4 个事件)
dead_host 172.217.24.14:443
dead_host 216.58.200.238:443
dead_host 172.217.160.110:443
dead_host 31.13.84.1:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x46d178 VirtualFree
0x46d17c VirtualAlloc
0x46d180 LocalFree
0x46d184 LocalAlloc
0x46d188 GetVersion
0x46d18c GetCurrentThreadId
0x46d198 VirtualQuery
0x46d19c WideCharToMultiByte
0x46d1a0 MultiByteToWideChar
0x46d1a4 lstrlenA
0x46d1a8 lstrcpynA
0x46d1ac LoadLibraryExA
0x46d1b0 GetThreadLocale
0x46d1b4 GetStartupInfoA
0x46d1b8 GetProcAddress
0x46d1bc GetModuleHandleA
0x46d1c0 GetModuleFileNameA
0x46d1c4 GetLocaleInfoA
0x46d1c8 GetCommandLineA
0x46d1cc FreeLibrary
0x46d1d0 FindFirstFileA
0x46d1d4 FindClose
0x46d1d8 ExitProcess
0x46d1dc WriteFile
0x46d1e4 RtlUnwind
0x46d1e8 RaiseException
0x46d1ec GetStdHandle
Library user32.dll:
0x46d1f4 GetKeyboardType
0x46d1f8 LoadStringA
0x46d1fc MessageBoxA
0x46d200 CharNextA
Library advapi32.dll:
0x46d208 RegQueryValueExA
0x46d20c RegOpenKeyExA
0x46d210 RegCloseKey
Library oleaut32.dll:
0x46d218 SysFreeString
0x46d21c SysReAllocStringLen
0x46d220 SysAllocStringLen
Library kernel32.dll:
0x46d228 TlsSetValue
0x46d22c TlsGetValue
0x46d230 LocalAlloc
0x46d234 GetModuleHandleA
Library advapi32.dll:
0x46d23c RegQueryValueExA
0x46d240 RegOpenKeyExA
0x46d244 RegCloseKey
Library kernel32.dll:
0x46d24c lstrcpyA
0x46d250 WriteFile
0x46d254 WaitForSingleObject
0x46d258 VirtualQuery
0x46d25c VirtualProtect
0x46d260 VirtualAlloc
0x46d264 Sleep
0x46d268 SizeofResource
0x46d26c SetThreadLocale
0x46d270 SetFilePointer
0x46d274 SetEvent
0x46d278 SetErrorMode
0x46d27c SetEndOfFile
0x46d280 ResetEvent
0x46d284 ReadFile
0x46d288 MultiByteToWideChar
0x46d28c MulDiv
0x46d290 LockResource
0x46d294 LoadResource
0x46d298 LoadLibraryA
0x46d2a4 GlobalUnlock
0x46d2a8 GlobalSize
0x46d2ac GlobalReAlloc
0x46d2b0 GlobalHandle
0x46d2b4 GlobalLock
0x46d2b8 GlobalFree
0x46d2bc GlobalFindAtomA
0x46d2c0 GlobalDeleteAtom
0x46d2c4 GlobalAlloc
0x46d2c8 GlobalAddAtomA
0x46d2cc GetVersionExA
0x46d2d0 GetVersion
0x46d2d4 GetUserDefaultLCID
0x46d2d8 GetTickCount
0x46d2dc GetThreadLocale
0x46d2e0 GetSystemInfo
0x46d2e4 GetStringTypeExA
0x46d2e8 GetStdHandle
0x46d2ec GetProcAddress
0x46d2f0 GetModuleHandleA
0x46d2f4 GetModuleFileNameA
0x46d2f8 GetLocaleInfoA
0x46d2fc GetLocalTime
0x46d300 GetLastError
0x46d304 GetFullPathNameA
0x46d308 GetDiskFreeSpaceA
0x46d30c GetDateFormatA
0x46d310 GetCurrentThreadId
0x46d314 GetCurrentProcessId
0x46d318 GetCPInfo
0x46d31c GetACP
0x46d320 FreeResource
0x46d324 InterlockedExchange
0x46d328 FreeLibrary
0x46d32c FormatMessageA
0x46d330 FindResourceA
0x46d334 EnumCalendarInfoA
0x46d340 CreateThread
0x46d344 CreateFileA
0x46d348 CreateEventA
0x46d34c CompareStringA
0x46d350 CloseHandle
Library version.dll:
0x46d358 VerQueryValueA
0x46d360 GetFileVersionInfoA
Library gdi32.dll:
0x46d368 UnrealizeObject
0x46d36c StretchBlt
0x46d370 SetWindowOrgEx
0x46d374 SetWinMetaFileBits
0x46d378 SetViewportOrgEx
0x46d37c SetTextColor
0x46d380 SetStretchBltMode
0x46d384 SetROP2
0x46d388 SetPixel
0x46d38c SetEnhMetaFileBits
0x46d390 SetDIBColorTable
0x46d394 SetBrushOrgEx
0x46d398 SetBkMode
0x46d39c SetBkColor
0x46d3a0 SelectPalette
0x46d3a4 SelectObject
0x46d3a8 SelectClipRgn
0x46d3ac SaveDC
0x46d3b0 RestoreDC
0x46d3b4 RectVisible
0x46d3b8 RealizePalette
0x46d3bc PlayEnhMetaFile
0x46d3c0 PatBlt
0x46d3c4 MoveToEx
0x46d3c8 MaskBlt
0x46d3cc LineTo
0x46d3d0 IntersectClipRect
0x46d3d4 GetWindowOrgEx
0x46d3d8 GetWinMetaFileBits
0x46d3dc GetTextMetricsA
0x46d3e8 GetStockObject
0x46d3ec GetPixel
0x46d3f0 GetPaletteEntries
0x46d3f4 GetObjectA
0x46d404 GetEnhMetaFileBits
0x46d408 GetDeviceCaps
0x46d40c GetDIBits
0x46d410 GetDIBColorTable
0x46d414 GetDCOrgEx
0x46d41c GetClipBox
0x46d420 GetBrushOrgEx
0x46d424 GetBitmapBits
0x46d428 ExcludeClipRect
0x46d42c DeleteObject
0x46d430 DeleteEnhMetaFile
0x46d434 DeleteDC
0x46d438 CreateSolidBrush
0x46d43c CreatePenIndirect
0x46d440 CreatePalette
0x46d448 CreateFontIndirectA
0x46d44c CreateEnhMetaFileA
0x46d450 CreateDIBitmap
0x46d454 CreateDIBSection
0x46d458 CreateCompatibleDC
0x46d460 CreateBrushIndirect
0x46d464 CreateBitmap
0x46d468 CopyEnhMetaFileA
0x46d46c CloseEnhMetaFile
0x46d470 BitBlt
Library user32.dll:
0x46d478 CreateWindowExA
0x46d47c WindowFromPoint
0x46d480 WinHelpA
0x46d484 WaitMessage
0x46d488 UpdateWindow
0x46d48c UnregisterClassA
0x46d490 UnhookWindowsHookEx
0x46d494 TranslateMessage
0x46d49c TrackPopupMenu
0x46d4a4 ShowWindow
0x46d4a8 ShowScrollBar
0x46d4ac ShowOwnedPopups
0x46d4b0 ShowCursor
0x46d4b4 SetWindowsHookExA
0x46d4b8 SetWindowTextA
0x46d4bc SetWindowPos
0x46d4c0 SetWindowPlacement
0x46d4c4 SetWindowLongA
0x46d4c8 SetTimer
0x46d4cc SetScrollRange
0x46d4d0 SetScrollPos
0x46d4d4 SetScrollInfo
0x46d4d8 SetRect
0x46d4dc SetPropA
0x46d4e0 SetParent
0x46d4e4 SetMenuItemInfoA
0x46d4e8 SetMenu
0x46d4ec SetForegroundWindow
0x46d4f0 SetFocus
0x46d4f4 SetCursor
0x46d4f8 SetClassLongA
0x46d4fc SetCapture
0x46d500 SetActiveWindow
0x46d504 SendMessageA
0x46d508 ScrollWindow
0x46d50c ScreenToClient
0x46d510 RemovePropA
0x46d514 RemoveMenu
0x46d518 ReleaseDC
0x46d51c ReleaseCapture
0x46d528 RegisterClassA
0x46d52c RedrawWindow
0x46d530 PtInRect
0x46d534 PostQuitMessage
0x46d538 PostMessageA
0x46d53c PeekMessageA
0x46d540 OffsetRect
0x46d544 OemToCharA
0x46d548 MessageBoxA
0x46d54c MapWindowPoints
0x46d550 MapVirtualKeyA
0x46d554 LoadStringA
0x46d558 LoadKeyboardLayoutA
0x46d55c LoadIconA
0x46d560 LoadCursorA
0x46d564 LoadBitmapA
0x46d568 KillTimer
0x46d56c IsZoomed
0x46d570 IsWindowVisible
0x46d574 IsWindowEnabled
0x46d578 IsWindow
0x46d57c IsRectEmpty
0x46d580 IsIconic
0x46d584 IsDialogMessageA
0x46d588 IsChild
0x46d58c InvalidateRect
0x46d590 IntersectRect
0x46d594 InsertMenuItemA
0x46d598 InsertMenuA
0x46d59c InflateRect
0x46d5a4 GetWindowTextA
0x46d5a8 GetWindowRect
0x46d5ac GetWindowPlacement
0x46d5b0 GetWindowLongA
0x46d5b4 GetWindowDC
0x46d5b8 GetTopWindow
0x46d5bc GetSystemMetrics
0x46d5c0 GetSystemMenu
0x46d5c4 GetSysColorBrush
0x46d5c8 GetSysColor
0x46d5cc GetSubMenu
0x46d5d0 GetScrollRange
0x46d5d4 GetScrollPos
0x46d5d8 GetScrollInfo
0x46d5dc GetPropA
0x46d5e0 GetParent
0x46d5e4 GetWindow
0x46d5e8 GetMessageTime
0x46d5ec GetMenuStringA
0x46d5f0 GetMenuState
0x46d5f4 GetMenuItemInfoA
0x46d5f8 GetMenuItemID
0x46d5fc GetMenuItemCount
0x46d600 GetMenu
0x46d604 GetLastActivePopup
0x46d608 GetKeyboardState
0x46d610 GetKeyboardLayout
0x46d614 GetKeyState
0x46d618 GetKeyNameTextA
0x46d61c GetIconInfo
0x46d620 GetForegroundWindow
0x46d624 GetFocus
0x46d628 GetDesktopWindow
0x46d62c GetDCEx
0x46d630 GetDC
0x46d634 GetCursorPos
0x46d638 GetCursor
0x46d63c GetClipboardData
0x46d640 GetClientRect
0x46d644 GetClassNameA
0x46d648 GetClassInfoA
0x46d64c GetCapture
0x46d650 GetActiveWindow
0x46d654 FrameRect
0x46d658 FindWindowA
0x46d65c FillRect
0x46d660 EqualRect
0x46d664 EnumWindows
0x46d668 EnumThreadWindows
0x46d66c EndPaint
0x46d670 EnableWindow
0x46d674 EnableScrollBar
0x46d678 EnableMenuItem
0x46d67c DrawTextA
0x46d680 DrawMenuBar
0x46d684 DrawIconEx
0x46d688 DrawIcon
0x46d68c DrawFrameControl
0x46d690 DrawEdge
0x46d694 DispatchMessageA
0x46d698 DestroyWindow
0x46d69c DestroyMenu
0x46d6a0 DestroyIcon
0x46d6a4 DestroyCursor
0x46d6a8 DeleteMenu
0x46d6ac DefWindowProcA
0x46d6b0 DefMDIChildProcA
0x46d6b4 DefFrameProcA
0x46d6b8 CreatePopupMenu
0x46d6bc CreateMenu
0x46d6c0 CreateIcon
0x46d6c4 ClientToScreen
0x46d6c8 CheckMenuItem
0x46d6cc CallWindowProcA
0x46d6d0 CallNextHookEx
0x46d6d4 BeginPaint
0x46d6d8 CharNextA
0x46d6dc CharLowerBuffA
0x46d6e0 CharLowerA
0x46d6e4 CharUpperBuffA
0x46d6e8 CharToOemA
0x46d6ec AdjustWindowRectEx
Library kernel32.dll:
0x46d6f8 Sleep
Library oleaut32.dll:
0x46d700 SafeArrayPtrOfIndex
0x46d704 SafeArrayGetUBound
0x46d708 SafeArrayGetLBound
0x46d70c SafeArrayCreate
0x46d710 VariantChangeType
0x46d714 VariantCopy
0x46d718 VariantClear
0x46d71c VariantInit
Library ole32.dll:
0x46d728 IsAccelerator
0x46d72c OleDraw
0x46d734 CoCreateInstance
0x46d738 CoGetClassObject
0x46d73c CoUninitialize
0x46d740 CoInitialize
0x46d744 IsEqualGUID
Library oleaut32.dll:
0x46d74c GetErrorInfo
0x46d750 SysFreeString
Library comctl32.dll:
0x46d760 ImageList_Write
0x46d764 ImageList_Read
0x46d774 ImageList_DragMove
0x46d778 ImageList_DragLeave
0x46d77c ImageList_DragEnter
0x46d780 ImageList_EndDrag
0x46d784 ImageList_BeginDrag
0x46d788 ImageList_Remove
0x46d78c ImageList_DrawEx
0x46d790 ImageList_Draw
0x46d7a0 ImageList_Add
0x46d7ac ImageList_Destroy
0x46d7b0 ImageList_Create
Library URL.DLL:
0x46d7b8 InetIsOffline
Library advapi32.dll:
0x46d7c0 QueryServiceStatus
0x46d7c4 OpenServiceA
0x46d7c8 OpenSCManagerA
0x46d7cc CloseServiceHandle

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 53210 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 54178 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 60215 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53380 224.0.0.252 5355
192.168.56.101 56539 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 60088 224.0.0.252 5355

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.