5.0
中危

f0e5c96c21b1e2dd469cd4e5e6ee29bb65d7940772c4d94052ef6a05665ed57d

2ea8ae7de822b8cd96468f73fc7d3703.exe

分析耗时

75s

最近分析

文件大小

548.5KB
静态报毒 动态报毒 7XRX0UUB+OG AI SCORE=82 AIDETECTVM ATTRIBUTE BSCOPE CLASSIC CONFIDENCE GDSDA GENCIRC GENERICRXHI HIGH CONFIDENCE HIGHCONFIDENCE HSPMLE IMW@A4PH8OI MALWARE1 MALWARE@#2SH34FQZZ1TQE NXAK PASSWORDSTEALER PREDATOR PWSX R002C0PHP20 R264426 SCORE SPYAGENT SUSGEN TROJANPSW TROJANPWS UNSAFE VIDAR VIDARSTEALER ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee GenericRXHI-GE!2EA8AE7DE822 20201128 6.0.6.653
Baidu 20190318 1.0.0.2
Avast Win32:PWSX-gen [Trj] 20201128 20.10.5736.0
Alibaba TrojanPSW:Win32/Vidar.1e5a80c8 20190527 0.3.0.5
Tencent Malware.Win32.Gencirc.11ad16f8 20201129 1.0.0.1
Kingsoft 20201129 2017.9.26.565
CrowdStrike win/malicious_confidence_80% (W) 20190702 1.0
静态指标
Queries for the computername (1 个事件)
Time & API Arguments Status Return Repeated
1620726219.732017
GetComputerNameA
computer_name: OSKAR-PC
success 1 0
Collects information to fingerprint the system (MachineGuid, DigitalProductId, SystemBiosDate) (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
行为判定
动态指标
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1620726220.685017
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1620726223.263017
RegSetValueExA
key_handle: 0x0000035c
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1620726223.263017
RegSetValueExA
key_handle: 0x0000035c
value: @‰,Ç}F×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1620726223.263017
RegSetValueExA
key_handle: 0x0000035c
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1620726223.263017
RegSetValueExW
key_handle: 0x0000035c
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1620726223.263017
RegSetValueExA
key_handle: 0x00000374
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1620726223.263017
RegSetValueExA
key_handle: 0x00000374
value: @‰,Ç}F×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1620726223.263017
RegSetValueExA
key_handle: 0x00000374
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1620726223.279017
RegSetValueExW
key_handle: 0x00000358
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
Generates some ICMP traffic
Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) (1 个事件)
dead_host 169.239.128.190:80
File has been identified by 60 AntiVirus engines on VirusTotal as malicious (50 out of 60 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Generic.SpyAgent.6.F6EB15AF
CAT-QuickHeal Trojanpws.Vidar
McAfee GenericRXHI-GE!2EA8AE7DE822
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
AegisLab Trojan.Win32.Vidar.i!c
Sangfor Malware
K7AntiVirus Password-Stealer ( 00569ede1 )
BitDefender Generic.SpyAgent.6.F6EB15AF
K7GW Password-Stealer ( 00569ede1 )
Cybereason malicious.0d3b26
Arcabit Generic.SpyAgent.6.F6EB15AF
Cyren W32/Trojan.NXAK-5790
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:PWSX-gen [Trj]
ClamAV Win.Dropper.Vidar-9369449-0
Kaspersky HEUR:Trojan-PSW.Win32.Vidar.vho
Alibaba TrojanPSW:Win32/Vidar.1e5a80c8
NANO-Antivirus Trojan.Win32.Vidar.hspmle
Tencent Malware.Win32.Gencirc.11ad16f8
Ad-Aware Generic.SpyAgent.6.F6EB15AF
Emsisoft Generic.SpyAgent.6.F6EB15AF (B)
Comodo Malware@#2sh34fqzz1tqe
F-Secure Trojan.TR/AD.VidarStealer.FL
DrWeb Trojan.PWS.Stealer.29176
Zillya Trojan.Agent.Win32.1373141
TrendMicro TROJ_GEN.R002C0PHP20
McAfee-GW-Edition BehavesLike.Win32.Generic.hh
FireEye Generic.mg.2ea8ae7de822b8cd
Sophos Mal/Generic-S
Ikarus Trojan-PSW.Agent
Jiangmin Trojan.PSW.Vidar.ld
Webroot W32.Trojan.Gen
Avira TR/AD.VidarStealer.FL
MAX malware (ai score=82)
Antiy-AVL Trojan[PSW]/Win32.Agent
Gridinsoft Trojan.Win32.Agent.vb
Microsoft Trojan:Win32/PasswordStealer.KA!MTB
ZoneAlarm HEUR:Trojan-PSW.Win32.Vidar.vho
GData Generic.SpyAgent.6.F6EB15AF
Cynet Malicious (score: 100)
AhnLab-V3 Downloader/Win32.Vidar.R264426
VBA32 BScope.Backdoor.Predator
ALYac Generic.SpyAgent.6.F6EB15AF
Malwarebytes Spyware.PasswordStealer.Generic
Panda Trj/GdSda.A
ESET-NOD32 a variant of Win32/PSW.Agent.OKD
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-08-24 15:06:39

Imports

Library KERNEL32.dll:
0x473058 CreateDirectoryA
0x47305c GetLastError
0x473060 CreateMutexA
0x473064 CloseHandle
0x473068 WriteFile
0x47306c CreateFileA
0x473070 MultiByteToWideChar
0x473074 ReadFile
0x473078 GetFileSize
0x47307c GetVersionExA
0x473080 GetFileSizeEx
0x473084 Process32Next
0x473088 Process32First
0x473090 TerminateProcess
0x473094 OpenProcess
0x473098 GetProcAddress
0x47309c LoadLibraryA
0x4730a4 FreeLibrary
0x4730ac lstrcatA
0x4730b0 GetFileAttributesW
0x4730c8 AreFileApisANSI
0x4730cc SetFilePointer
0x4730d0 SetEndOfFile
0x4730d4 FlushFileBuffers
0x4730d8 UnlockFile
0x4730dc LockFile
0x4730e0 LockFileEx
0x4730e4 UnlockFileEx
0x4730e8 GetFileAttributesA
0x4730f8 GetTickCount
0x4730fc GetSystemTime
0x473100 CopyFileW
0x473104 UnmapViewOfFile
0x473108 GetTempPathA
0x47310c GetTempPathW
0x473110 FormatMessageA
0x473114 FormatMessageW
0x473118 GetFullPathNameA
0x47311c GetFullPathNameW
0x473120 GetDiskFreeSpaceA
0x473124 GetDiskFreeSpaceW
0x473128 CreateFileW
0x47312c GetSystemInfo
0x473130 MapViewOfFile
0x473134 CreateFileMappingA
0x473138 GetComputerNameA
0x47313c IsWow64Process
0x473140 GetCurrentProcess
0x473144 GlobalMemoryStatus
0x473148 GetModuleHandleA
0x473158 GetLocaleInfoA
0x473164 GetLocalTime
0x473168 CompareStringW
0x47316c SetStdHandle
0x473170 IsValidLocale
0x473174 EnumSystemLocalesA
0x473178 GetUserDefaultLCID
0x47317c GetLocaleInfoW
0x473180 GetStringTypeW
0x473184 GetModuleFileNameA
0x473188 GetCurrentProcessId
0x47318c Sleep
0x473190 DeleteFileA
0x473194 ExitProcess
0x47319c GetDriveTypeA
0x4731a0 LoadLibraryW
0x4731a4 CreateDirectoryW
0x4731a8 lstrcpyW
0x4731ac lstrlenA
0x4731b0 lstrcatW
0x4731b4 FindFirstFileW
0x4731b8 lstrcmpW
0x4731bc DeleteFileW
0x4731c0 FindNextFileW
0x4731c4 FindClose
0x4731c8 HeapFree
0x4731cc GetProcessHeap
0x4731d0 HeapAlloc
0x4731d4 WideCharToMultiByte
0x4731e8 GetConsoleMode
0x4731ec GetConsoleCP
0x4731f0 GetModuleFileNameW
0x4731f4 IsValidCodePage
0x4731f8 LocalFree
0x4731fc LocalAlloc
0x473204 GetOEMCP
0x473208 GetACP
0x47320c HeapCreate
0x473210 GetFileType
0x473218 GetStdHandle
0x47321c SetHandleCount
0x473220 HeapSize
0x473224 IsDebuggerPresent
0x473230 GetCurrentThreadId
0x473234 SetLastError
0x473238 GetModuleHandleW
0x47323c TlsFree
0x473240 TlsSetValue
0x473244 TlsGetValue
0x473248 TlsAlloc
0x473250 GetCPInfo
0x473254 LCMapStringW
0x473258 GetStartupInfoW
0x47325c HeapSetInformation
0x473260 GetCommandLineA
0x473264 HeapReAlloc
0x473268 RtlUnwind
0x47326c RaiseException
0x473270 DecodePointer
0x473274 EncodePointer
0x473278 InterlockedExchange
0x473284 WriteConsoleW
Library USER32.dll:
0x4732b0 GetSystemMetrics
0x4732b4 wsprintfA
0x4732b8 EnumDisplayDevicesW
0x4732bc CharToOemA
0x4732c0 GetDC
0x4732c4 ReleaseDC
0x4732cc GetDesktopWindow
Library GDI32.dll:
0x47303c SelectObject
0x473040 BitBlt
0x473044 DeleteObject
0x473048 CreateDCA
0x47304c GetDeviceCaps
0x473050 CreateCompatibleDC
Library ADVAPI32.dll:
0x473000 RegOpenKeyExA
0x473004 RegQueryValueExA
0x473008 RegEnumKeyExA
0x47300c GetUserNameA
0x473014 RegOpenKeyExW
0x473018 RegGetValueW
0x47301c RegCloseKey
0x473020 RegGetValueA
0x473024 RegEnumValueA
Library SHELL32.dll:
0x47329c SHGetFolderPathA
0x4732a0 ShellExecuteA
Library ole32.dll:
0x47334c CoCreateInstance
0x473350 CoUninitialize
Library SHLWAPI.dll:
0x4732a8 PathMatchSpecW
Library CRYPT32.dll:
0x473030 CryptUnprotectData
Library PSAPI.DLL:
0x473290 EnumProcessModules
0x473294 GetModuleBaseNameA
Library WININET.dll:
0x4732d4 InternetConnectA
0x4732d8 HttpOpenRequestA
0x4732dc HttpSendRequestA
0x4732e0 InternetCloseHandle
0x4732e8 InternetReadFile
0x4732ec HttpQueryInfoA
0x4732f4 InternetSetOptionA
0x4732f8 InternetOpenA
0x4732fc InternetOpenUrlA
Library gdiplus.dll:
0x473324 GdipSaveImageToFile
0x47332c GdiplusShutdown
0x473330 GdiplusStartup
0x473334 GdipCloneImage
0x473338 GdipDisposeImage
0x47333c GdipAlloc
0x473344 GdipFree
Library bcrypt.dll:
0x473304 BCryptDecrypt
0x47330c BCryptDestroyKey
0x473314 BCryptSetProperty

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 62912 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 61680 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.