2.6
中危

65b0c3b5a2848b43d86af783235652fa14567c56a802e0fc2fc04f87e2b60de8

421a57c14d76b89bb74dc7540f3ece4c.exe

分析耗时

74s

最近分析

文件大小

9.0MB
静态报毒 动态报毒 JAVA MALICIOUS RATTY
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee 20201218 6.0.6.653
Alibaba 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast 20201218 21.1.5827.0
Tencent 20201218 1.0.0.1
Kingsoft 20201218 2017.9.26.565
CrowdStrike 20190702 1.0
行为判定
动态指标
File has been identified by 4 AntiVirus engines on VirusTotal as malicious (4 个事件)
Zillya Trojan.Ratty.JS.13
APEX Malicious
Jiangmin Exploit.Java.dps
Gridinsoft Trojan.Heur!.02052021
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.99966944223052 section {'size_of_data': '0x008bf000', 'virtual_address': '0x0004d000', 'entropy': 7.99966944223052, 'name': '.rsrc', 'virtual_size': '0x008bee68'} description A section with a high entropy has been found
entropy 0.9680069174232598 description Overall entropy of this PE file is high
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2019-06-09 08:12:46

Imports

Library KERNEL32.dll:
0x43b048 ReleaseMutex
0x43b04c WaitForSingleObject
0x43b050 CreateMutexA
0x43b054 MapViewOfFile
0x43b058 CreateFileMappingA
0x43b05c GetFullPathNameA
0x43b064 GetModuleFileNameA
0x43b068 lstrlenA
0x43b06c GetExitCodeThread
0x43b070 ReadFile
0x43b074 GetFileSize
0x43b078 CreateFileA
0x43b080 SetThreadPriority
0x43b084 GetCurrentThread
0x43b088 SetEvent
0x43b08c Sleep
0x43b090 CreateEventA
0x43b094 GetVersionExA
0x43b098 GetCurrentProcess
0x43b09c SetStdHandle
0x43b0a0 SetFilePointer
0x43b0a4 CreateProcessA
0x43b0a8 DuplicateHandle
0x43b0ac CreatePipe
0x43b0b0 GetStdHandle
0x43b0b4 WriteFile
0x43b0b8 GetExitCodeProcess
0x43b0bc OpenProcess
0x43b0c4 PulseEvent
0x43b0c8 GetCommandLineA
0x43b0cc GetVersion
0x43b0d0 ExitProcess
0x43b0d4 HeapFree
0x43b0d8 RtlUnwind
0x43b0dc HeapReAlloc
0x43b0e0 HeapAlloc
0x43b0ec MultiByteToWideChar
0x43b0f0 WideCharToMultiByte
0x43b0f4 TerminateProcess
0x43b100 GetSystemTime
0x43b104 GetLocalTime
0x43b108 CreateThread
0x43b10c GetCurrentThreadId
0x43b110 TlsSetValue
0x43b114 TlsGetValue
0x43b118 ExitThread
0x43b11c RaiseException
0x43b120 FindFirstFileA
0x43b124 FindNextFileA
0x43b128 FindClose
0x43b134 UnmapViewOfFile
0x43b138 GetFileType
0x43b150 SetHandleCount
0x43b154 GetStartupInfoA
0x43b158 TlsAlloc
0x43b15c SetLastError
0x43b164 HeapDestroy
0x43b168 HeapCreate
0x43b16c VirtualFree
0x43b170 HeapSize
0x43b174 VirtualAlloc
0x43b178 IsBadWritePtr
0x43b17c LCMapStringA
0x43b180 LCMapStringW
0x43b184 GetCPInfo
0x43b188 IsValidLocale
0x43b18c IsValidCodePage
0x43b190 GetLocaleInfoA
0x43b194 EnumSystemLocalesA
0x43b198 GetUserDefaultLCID
0x43b1a0 GetACP
0x43b1a4 GetOEMCP
0x43b1a8 IsBadReadPtr
0x43b1ac IsBadCodePtr
0x43b1b0 GetStringTypeA
0x43b1b4 GetStringTypeW
0x43b1b8 CompareStringA
0x43b1bc CompareStringW
0x43b1c4 FlushFileBuffers
0x43b1c8 GetLocaleInfoW
0x43b1d8 SetFileTime
0x43b1dc GetCurrentProcessId
0x43b1e0 MoveFileA
0x43b1e4 DeleteFileA
0x43b1e8 SetVolumeLabelA
0x43b1ec GetDriveTypeA
0x43b1f0 GetFileAttributesA
0x43b1f4 SetFileAttributesA
0x43b1f8 GetDiskFreeSpaceA
0x43b1fc CloseHandle
0x43b200 GetLastError
0x43b204 GetModuleHandleA
0x43b208 FindResourceA
0x43b20c SizeofResource
0x43b210 LoadResource
0x43b214 FormatMessageA
0x43b218 LocalFree
0x43b21c GetProcAddress
0x43b220 SetErrorMode
0x43b224 LoadLibraryA
0x43b228 ResumeThread
0x43b22c FreeLibrary
0x43b230 LockResource
0x43b244 SetEndOfFile
Library USER32.dll:
0x43b24c KillTimer
0x43b250 SetTimer
0x43b254 GetClassInfoA
0x43b258 LoadCursorA
0x43b25c RegisterClassA
0x43b260 GetSystemMetrics
0x43b264 CreateWindowExA
0x43b268 ShowWindow
0x43b26c UpdateWindow
0x43b270 GetClientRect
0x43b274 BeginPaint
0x43b278 EndPaint
0x43b27c PostQuitMessage
0x43b280 PostMessageA
0x43b284 DefWindowProcA
0x43b288 GetMessageA
0x43b28c TranslateMessage
0x43b290 DispatchMessageA
0x43b294 LoadBitmapA
0x43b298 MessageBoxA
Library GDI32.dll:
0x43b02c BitBlt
0x43b030 DeleteDC
0x43b034 DeleteObject
0x43b038 SelectObject
0x43b03c CreateCompatibleDC
0x43b040 GetObjectA
Library ADVAPI32.dll:
0x43b000 RegSetValueExA
0x43b004 RegOpenKeyExA
0x43b008 RegCreateKeyExA
0x43b00c RegCloseKey
0x43b010 RegDeleteValueA
0x43b014 GetTokenInformation
0x43b018 OpenProcessToken
0x43b01c RegQueryValueExA
Library COMCTL32.dll:

Exports

Ordinal Address Name
1 0x402c80 _Java_com_regexlab_j2e_Handler_loadResourceData@12
2 0x419d30 _Java_com_regexlab_j2e_Instances_flush@8
3 0x419ae0 _Java_com_regexlab_j2e_Instances_getCurrentInstance@8
4 0x419ab0 _Java_com_regexlab_j2e_Instances_getFirstInstance@8
5 0x419b10 _Java_com_regexlab_j2e_Instances_getInstances@8
6 0x419c20 _Java_com_regexlab_j2e_Instances_sendObject@16
7 0x419d70 _Java_com_regexlab_j2e_Instances_setReceiver@12
8 0x4015b0 _Java_com_regexlab_j2e_Jar2ExeClassLoader_defineClass@12
9 0x4010c0 _Java_com_regexlab_j2e_Jar2ExeClassLoader_findClass@12
10 0x4023e0 _Java_com_regexlab_j2e_Jar2ExeClassLoader_findResource@12

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 50537 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.