2.4
中危

3d965f4ae06812e9b204725e2e112e39ed0f6a817000b539c559a41befabcb04

34978ebe9439661fe8799051781e90c9.exe

分析耗时

19s

最近分析

文件大小

118.0KB
静态报毒 动态报毒 100% AGEN AGENERIC AI SCORE=100 AIDETECTVM AYELS BETISRYPT BITCOVAR BTCW BTCWARE CLASSIC CONFIDENCE ETOQYQ FILECODER GDSDA GENCIRC HFDUDYWTEYM HIGH CONFIDENCE HUW@A8GSLCGI KCLOUD MALICIOUS PE MALWARE1 MALWARE@#3UP4LNTLEKM97 PARADISE PAYDAY R + TROJ SCORE STATIC AI UNSAFE ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Ransom:Win32/Bitcovar.96ccd260 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Avast Win32:Malware-gen 20201210 21.1.5827.0
Baidu 20190318 1.0.0.2
Kingsoft Win32.Troj.Undef.(kcloud) 20201211 2017.9.26.565
McAfee Ransom-BTCWare!34978EBE9439 20201211 6.0.6.653
Tencent Malware.Win32.Gencirc.11495cb0 20201211 1.0.0.1
静态指标
One or more processes crashed (1 个事件)
Time & API Arguments Status Return Repeated
1619345030.785436
__exception__
stacktrace:
34978ebe9439661fe8799051781e90c9+0x51de @ 0xad51de
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 3930096
registers.edi: 0
registers.eax: 1983198136
registers.ebp: 3930116
registers.edx: 11358681
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
exception.instruction_r: a1 08 e0 41 00 56 57 bf 4e e6 40 bb be 00 00 ff
exception.symbol: 34978ebe9439661fe8799051781e90c9+0x5689
exception.instruction: mov eax, dword ptr [0x41e008]
exception.module: 34978ebe9439661fe8799051781e90c9.exe
exception.exception_code: 0xc0000005
exception.offset: 22153
exception.address: 0xad5689
success 0 0
行为判定
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 53 AntiVirus engines on VirusTotal as malicious (50 out of 53 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
DrWeb Trojan.Encoder.11958
MicroWorld-eScan Gen:Variant.Ransom.BTCWare.34
FireEye Generic.mg.34978ebe9439661f
ALYac Trojan.Ransom.BTCWare
Malwarebytes Ransom.Payday
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
K7AntiVirus Trojan ( 0050b0f71 )
Alibaba Ransom:Win32/Bitcovar.96ccd260
K7GW Trojan ( 0050b0f71 )
CrowdStrike win/malicious_confidence_100% (W)
BitDefenderTheta Gen:NN.ZexaF.34670.huW@a8GSLCgi
Symantec Ransom.BTCware
ESET-NOD32 a variant of Win32/Filecoder.BTCware.J
APEX Malicious
Avast Win32:Malware-gen
Kaspersky Trojan-Ransom.Win32.Bitcovar.oq
BitDefender Gen:Variant.Ransom.BTCWare.34
NANO-Antivirus Trojan.Win32.Encoder.etoqyq
SUPERAntiSpyware Ransom.Filecoder/Variant
Rising Ransom.payday!1.AE30 (CLASSIC)
Ad-Aware Gen:Variant.Ransom.BTCWare.34
Sophos Mal/Generic-R + Troj/Btcware-A
Comodo Malware@#3up4lntlekm97
F-Secure Heuristic.HEUR/AGEN.1138883
Zillya Trojan.Filecoder.Win32.6411
TrendMicro Ransom_PARADISE.SM1
McAfee-GW-Edition BehavesLike.Win32.Dropper.ch
Emsisoft Gen:Variant.Ransom.BTCWare.34 (B)
Paloalto generic.ml
Jiangmin Trojan.Generic.ayels
Avira HEUR/AGEN.1138883
MAX malware (ai score=100)
Antiy-AVL Trojan/Win32.AGeneric
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Ransom:Win32/Betisrypt.D
ZoneAlarm Trojan-Ransom.Win32.Bitcovar.oq
GData Win32.Trojan-Ransom.BTCWare.L
Cynet Malicious (score: 100)
McAfee Ransom-BTCWare!34978EBE9439
VBA32 Trojan.Encoder
Cylance Unsafe
TrendMicro-HouseCall Ransom_PARADISE.SM1
Tencent Malware.Win32.Gencirc.11495cb0
Yandex Trojan.Filecoder!HFDuDywTeyM
SentinelOne Static AI - Malicious PE
Fortinet W32/Filecoder.BTCW!tr
AVG Win32:Malware-gen
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2017-10-03 15:22:15

Imports

Library KERNEL32.DLL:
0x412044 CreateMutexA
0x412048 OpenMutexA
0x41204c ExitProcess
0x412050 lstrcpynA
0x412054 GetCurrentProcessId
0x412058 GetDriveTypeW
0x41205c CreateFileW
0x412060 GetLogicalDrives
0x412064 SetFilePointerEx
0x412068 GetModuleFileNameA
0x41206c GlobalFree
0x412070 GlobalAlloc
0x412074 FindClose
0x412078 FindNextFileA
0x41207c FindFirstFileA
0x412080 lstrcmpiA
0x412084 GetFileSize
0x412088 CloseHandle
0x41208c CreateFileA
0x412090 MoveFileExA
0x412094 lstrlenA
0x412098 GetConsoleMode
0x41209c GetConsoleCP
0x4120a0 FlushFileBuffers
0x4120a4 HeapReAlloc
0x4120a8 HeapSize
0x4120ac GetStringTypeW
0x4120b0 SetStdHandle
0x4120b4 SetFilePointer
0x4120b8 WriteFile
0x4120bc DecodePointer
0x4120c0 ReadFile
0x4120cc GetCurrentProcess
0x4120d0 TerminateProcess
0x4120d8 IsDebuggerPresent
0x4120dc GetStartupInfoW
0x4120e0 GetModuleHandleW
0x4120e8 GetCurrentThreadId
0x4120f0 InitializeSListHead
0x4120f4 RtlUnwind
0x4120f8 EncodePointer
0x4120fc RaiseException
0x412100 GetLastError
0x412104 SetLastError
0x412118 TlsAlloc
0x41211c TlsGetValue
0x412120 TlsSetValue
0x412124 TlsFree
0x412128 FreeLibrary
0x41212c GetProcAddress
0x412130 LoadLibraryExW
0x412134 GetModuleHandleExW
0x412138 MultiByteToWideChar
0x41213c WideCharToMultiByte
0x412140 GetStdHandle
0x412144 GetACP
0x412148 HeapFree
0x41214c HeapAlloc
0x412150 FindFirstFileExA
0x412154 IsValidCodePage
0x412158 GetOEMCP
0x41215c GetCPInfo
0x412160 GetCommandLineA
0x412164 GetCommandLineW
0x412170 LCMapStringW
0x412174 GetProcessHeap
0x412178 GetFileType
0x41217c WriteConsoleW
Library ADVAPI32.dll:
0x412000 RegOpenKeyExA
0x412004 CryptHashData
0x412008 CryptDeriveKey
0x41200c RegCloseKey
0x412010 CryptGenRandom
0x412014 RegSetValueExA
0x412018 CryptSetKeyParam
0x41201c CryptReleaseContext
0x412024 CryptEncrypt
0x412028 CryptCreateHash
Library CRYPT32.dll:
0x412034 CryptDecodeObjectEx
Library MPR.dll:
0x412184 WNetEnumResourceA
0x412188 WNetOpenEnumA
0x41218c WNetCloseEnum
Library SHELL32.dll:
0x412194 ShellExecuteA
Library SHLWAPI.dll:
0x41219c PathFindFileNameA
0x4121a0 PathFindExtensionA
Library USER32.dll:
0x4121a8 wsprintfA
0x4121ac wsprintfW

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 60124 239.255.255.250 3702
192.168.56.101 62194 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.