7.6
高危

2793307989ef735ddfa8b05bfeef647eeb27ad5d5d3d8874180d71e5cd9b9bb0

2dc1d4a1f1c0baa62b7091efc2ccf4e0.exe

分析耗时

84s

最近分析

文件大小

2.9MB
静态报毒 动态报毒 2A0@A0NSRJM AI SCORE=84 AIDETECT ARTEMIS ATTRIBUTE BANLOAD BSCOPE CCNC CLOUD GENERICKD HIGH CONFIDENCE HIGHCONFIDENCE HXMBCAYA MALREP MALWARE1 OCCAMY R365126 SAVE SCORE STATIC AI SUSGEN SUSPICIOUS PE THBAFBA UNSAFE WACATAC XPACK ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!2DC1D4A1F1C0 20210226 6.0.6.653
Alibaba Trojan:Win32/XPACK.ee3fb0a0 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Malware-gen 20210226 21.1.5827.0
Tencent 20210226 1.0.0.1
Kingsoft 20210226 2017.9.26.565
CrowdStrike 20210203 1.0
静态指标
Checks if process is being debugged by a debugger (2 个事件)
Time & API Arguments Status Return Repeated
1620726222.143081
IsDebuggerPresent
failed 0 0
1620726222.143081
IsDebuggerPresent
failed 0 0
Uses Windows APIs to generate a cryptographic key (4 个事件)
Time & API Arguments Status Return Repeated
1620726223.018081
CryptExportKey
crypto_handle: 0x00270f80
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620726223.034081
CryptExportKey
crypto_handle: 0x00270f80
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620726223.799081
CryptExportKey
crypto_handle: 0x00277df0
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620726227.971081
CryptExportKey
crypto_handle: 0x002783f0
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1620726222.221081
GlobalMemoryStatusEx
success 1 0
The executable contains unknown PE section names indicative of a packer (could be a false positive) (2 个事件)
section .themida
section .boot
One or more processes crashed (2 个事件)
Time & API Arguments Status Return Repeated
1620726221.393081
__exception__
stacktrace:

                
            
            
            
registers.esp: 4520960
registers.edi: 17521646
registers.eax: 1750617430
registers.ebp: 14352384
registers.edx: 22614
registers.ebx: 2147483650
registers.esi: 14491264
registers.ecx: 20
exception.instruction_r: ed e9 f5 b2 00 00 c3 e9 88 41 00 00 fa 9e 70 94
exception.symbol: 2dc1d4a1f1c0baa62b7091efc2ccf4e0+0x4c525e
exception.instruction: in eax, dx
exception.module: 2dc1d4a1f1c0baa62b7091efc2ccf4e0.exe
exception.exception_code: 0xc0000096
exception.offset: 5001822
exception.address: 0x125525e
success 0 0
1620726221.393081
__exception__
stacktrace:

                
            
            
            
registers.esp: 4520960
registers.edi: 17521646
registers.eax: 1447909480
registers.ebp: 14352384
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 14491264
registers.ecx: 10
exception.instruction_r: ed e9 ba 0e 04 00 e8 c7 2f 52 73 00 f6 f9 0a 00
exception.symbol: 2dc1d4a1f1c0baa62b7091efc2ccf4e0+0x4adf9d
exception.instruction: in eax, dx
exception.module: 2dc1d4a1f1c0baa62b7091efc2ccf4e0.exe
exception.exception_code: 0xc0000096
exception.offset: 4906909
exception.address: 0x123df9d
success 0 0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (2 个事件)
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://54.36.180.122/easypotsy/updater.json
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://54.36.180.122/easypotsy/settings.json
Performs some HTTP requests (2 个事件)
request GET http://54.36.180.122/easypotsy/updater.json
request GET http://54.36.180.122/easypotsy/settings.json
Allocates read-write-execute memory (usually to unpack itself) (50 out of 123 个事件)
Time & API Arguments Status Return Repeated
1620726220.831081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x7636c000
success 0 0
1620726220.846081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1620726220.846081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778eb000
success 0 0
1620726220.846081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1620726220.846081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ed000
success 0 0
1620726220.862081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1620726220.877081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x763cf000
success 0 0
1620726220.893081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1620726220.893081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778eb000
success 0 0
1620726220.909081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76355000
success 0 0
1620726220.924081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1620726220.924081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ed000
success 0 0
1620726220.924081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1620726220.924081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ed000
success 0 0
1620726220.924081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76355000
success 0 0
1620726220.924081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ec000
success 0 0
1620726220.924081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1620726220.940081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ed000
success 0 0
1620726220.940081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1620726220.940081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ed000
success 0 0
1620726220.940081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1620726220.940081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778fb000
success 0 0
1620726220.940081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76355000
success 0 0
1620726220.940081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778fb000
success 0 0
1620726220.940081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1620726220.956081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778f1000
success 0 0
1620726220.956081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1620726220.956081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ec000
success 0 0
1620726220.956081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76357000
success 0 0
1620726220.956081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ee000
success 0 0
1620726220.956081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778f8000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778f8000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x7637c000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778f8000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76355000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778f8000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1620726220.971081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778ed000
success 0 0
1620726220.987081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76355000
success 0 0
1620726221.002081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76355000
success 0 0
1620726221.002081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778eb000
success 0 0
1620726221.018081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x7636a000
success 0 0
1620726221.034081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x7636c000
success 0 0
1620726221.034081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778eb000
success 0 0
1620726221.049081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1620726221.049081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x778eb000
success 0 0
1620726221.049081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76373000
success 0 0
1620726221.065081
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76378000
success 0 0
A process attempted to delay the analysis task. (1 个事件)
description 2dc1d4a1f1c0baa62b7091efc2ccf4e0.exe tried to sleep 129 seconds, actually delayed analysis time by 129 seconds
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1620726224.549081
GetAdaptersAddresses
flags: 15
family: 0
failed 111 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.9551937570125295 section {'size_of_data': '0x002c1c00', 'virtual_address': '0x00534000', 'entropy': 7.9551937570125295, 'name': '.boot', 'virtual_size': '0x002c1c00'} description A section with a high entropy has been found
entropy 0.9671120246659815 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (2 个事件)
host 172.217.24.14
host 54.36.180.122
Checks for the presence of known windows from debuggers and forensic tools (50 out of 99 个事件)
Time & API Arguments Status Return Repeated
1620726221.221081
FindWindowA
class_name: RegmonClass
window_name:
failed 0 0
1620726221.221081
FindWindowA
class_name: RegmonClass
window_name:
failed 0 0
1620726221.221081
FindWindowA
class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620726221.221081
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620726221.362081
FindWindowA
class_name: FilemonClass
window_name:
failed 0 0
1620726221.362081
FindWindowA
class_name: FilemonClass
window_name:
failed 0 0
1620726221.362081
FindWindowA
class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620726221.362081
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620726221.362081
FindWindowA
class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620726225.456081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726225.456081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726225.768081
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620726226.081081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726226.081081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726226.081081
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620726230.081081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726230.081081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726230.393081
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620726230.706081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726230.706081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726230.706081
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620726234.706081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726234.706081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726235.018081
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620726235.331081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726235.331081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726235.331081
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620726239.331081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726239.331081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726239.643081
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620726239.956081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726239.956081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726239.956081
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620726243.956081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726243.956081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726244.268081
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620726244.581081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726244.581081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726244.581081
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620726248.581081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726248.581081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726248.893081
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620726249.206081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726249.206081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726249.206081
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620726253.206081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726253.206081
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620726253.518081
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620726253.831081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620726253.831081
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
Checks the version of Bios, possibly for anti-virtualization (2 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Detects Virtual Machines through their custom firmware (1 个事件)
Time & API Arguments Status Return Repeated
1620726221.393081
NtQuerySystemInformation
information_class: 76 (SystemFirmwareTableInformation)
failed 3221225507 0
Detects VMWare through the in instruction feature (1 个事件)
Time & API Arguments Status Return Repeated
1620726221.393081
__exception__
stacktrace:

                
            
            
            
registers.esp: 4520960
registers.edi: 17521646
registers.eax: 1447909480
registers.ebp: 14352384
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 14491264
registers.ecx: 10
exception.instruction_r: ed e9 ba 0e 04 00 e8 c7 2f 52 73 00 f6 f9 0a 00
exception.symbol: 2dc1d4a1f1c0baa62b7091efc2ccf4e0+0x4adf9d
exception.instruction: in eax, dx
exception.module: 2dc1d4a1f1c0baa62b7091efc2ccf4e0.exe
exception.exception_code: 0xc0000096
exception.offset: 4906909
exception.address: 0x123df9d
success 0 0
File has been identified by 45 AntiVirus engines on VirusTotal as malicious (45 个事件)
Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.43113578
FireEye Generic.mg.2dc1d4a1f1c0baa6
Qihoo-360 Win32/Trojan.Generic.HxMBcAYA
McAfee Artemis!2DC1D4A1F1C0
Cylance Unsafe
Zillya Downloader.Generic.Win32.9932
Sangfor Trojan.Win32.Save.a
Alibaba Trojan:Win32/XPACK.ee3fb0a0
Cybereason malicious.1f1c0b
Arcabit Trojan.Generic.D291DC6A
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Malware-gen
Kaspersky Trojan-Downloader.MSIL.Banload.efa
BitDefender Trojan.GenericKD.43113578
NANO-Antivirus Virus.Win32.Gen-Crypt.ccnc
Paloalto generic.ml
Ad-Aware Trojan.GenericKD.43113578
Sophos ML/PE-A
F-Secure Trojan.TR/Crypt.XPACK.Gen
TrendMicro Trojan.Win32.MALREP.THBAFBA
McAfee-GW-Edition BehavesLike.Win32.Generic.vc
Emsisoft Trojan.GenericKD.43113578 (B)
SentinelOne Static AI - Suspicious PE
Avira TR/Crypt.XPACK.Gen
MAX malware (ai score=84)
Antiy-AVL Trojan/Win32.Wacatac
Gridinsoft Trojan.Heur!.032104A1
Microsoft Trojan:Win32/Occamy.C27
AegisLab Trojan.Win32.Generic.4!c
ZoneAlarm Trojan-Downloader.MSIL.Banload.efa
GData Trojan.GenericKD.43113578
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.RL_Generic.R365126
BitDefenderTheta Gen:NN.ZexaF.34590.2A0@a0nsrjm
ALYac Trojan.GenericKD.43113578
VBA32 BScope.Trojan.Wacatac
Malwarebytes Malware.Heuristic.1003
TrendMicro-HouseCall Trojan.Win32.MALREP.THBAFBA
Rising Trojan.Occamy!8.F1CD (CLOUD)
Ikarus Trojan.Crypt
AVG Win32:Malware-gen
MaxSecure Trojan.Malware.8336380.susgen
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2068-03-22 01:14:03

Imports

Library kernel32.dll:
0x41e078 GetModuleHandleA
Library mscoree.dll:
0x41e080 _CorExeMain

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49176 54.36.180.122 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 60124 239.255.255.250 3702
192.168.56.101 62194 239.255.255.250 1900

HTTP & HTTPS Requests

URI Data
http://54.36.180.122/easypotsy/updater.json
GET /easypotsy/updater.json HTTP/1.1
Host: 54.36.180.122
Cache-Control: no-store,no-cache
Pragma: no-cache
Connection: Keep-Alive

http://54.36.180.122/easypotsy/settings.json
GET /easypotsy/settings.json HTTP/1.1
Host: 54.36.180.122

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.