3.0
中危

14e2cdca0b6ed9bb2039d10e8fbca1e5cf86babe82e644340bde2e925b09e6b6

450aa2ad4877e84d2711339568f5b628.exe

分析耗时

80s

最近分析

文件大小

1.5MB
静态报毒 动态报毒 SCORE UNSAFE
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast 20200829 18.4.3895.0
Tencent 20200829 1.0.0.1
Kingsoft 20200829 2013.8.14.323
McAfee 20200829 6.0.6.653
CrowdStrike 20190702 1.0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (10 个事件)
Time & API Arguments Status Return Repeated
1620726224.635289
NtProtectVirtualMemory
process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x74f81000
success 0 0
1620726224.776289
NtProtectVirtualMemory
process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x746a1000
success 0 0
1620726224.963289
NtProtectVirtualMemory
process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x75131000
success 0 0
1620726224.963289
NtProtectVirtualMemory
process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76881000
success 0 0
1620726225.448289
NtProtectVirtualMemory
process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x75121000
success 0 0
1620754554.968249
NtAllocateVirtualMemory
process_identifier: 152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00370000
success 0 0
1620754554.968249
NtProtectVirtualMemory
process_identifier: 152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x75181000
success 0 0
1620754555.047249
NtProtectVirtualMemory
process_identifier: 152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x74591000
success 0 0
1620754555.093249
NtProtectVirtualMemory
process_identifier: 152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x746a1000
success 0 0
1620754555.390249
NtProtectVirtualMemory
process_identifier: 152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x74461000
success 0 0
Creates executable files on the filesystem (1 个事件)
file C:\Windows\GPInstall.exe
Drops a binary and executes it (1 个事件)
file C:\Windows\GPInstall.exe
File has been identified by one AntiVirus engine on VirusTotal as malicious (1 个事件)
eGambit Unsafe.AI_Score_99%
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Resumed a suspended thread in a remote process potentially indicative of process injection (2 个事件)
Process injection Process 2404 resumed a thread in remote process 152
Time & API Arguments Status Return Repeated
1620726225.948289
NtResumeThread
thread_handle: 0x0000025c
suspend_count: 1
process_identifier: 152
success 0 0
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x4150b4 GetCurrentThreadId
0x4150c8 VirtualFree
0x4150cc VirtualAlloc
0x4150d0 LocalFree
0x4150d4 LocalAlloc
0x4150d8 VirtualQuery
0x4150dc WideCharToMultiByte
0x4150e0 MultiByteToWideChar
0x4150e4 lstrlenA
0x4150e8 lstrcpynA
0x4150ec lstrcpyA
0x4150f0 LoadLibraryExA
0x4150f4 GetThreadLocale
0x4150f8 GetStartupInfoA
0x4150fc GetProcAddress
0x415100 GetModuleHandleA
0x415104 GetModuleFileNameA
0x415108 GetLocaleInfoA
0x41510c GetLastError
0x415110 GetCommandLineA
0x415114 FreeLibrary
0x415118 FindFirstFileA
0x41511c FindClose
0x415120 ExitProcess
0x415124 WriteFile
0x41512c SetFilePointer
0x415130 SetEndOfFile
0x415134 RtlUnwind
0x415138 ReadFile
0x41513c RaiseException
0x415140 GetStdHandle
0x415144 GetFileSize
0x415148 GetFileType
0x41514c CreateFileA
0x415150 CloseHandle
Library user32.dll:
0x415158 GetKeyboardType
0x41515c LoadStringA
0x415160 MessageBoxA
0x415164 CharNextA
Library advapi32.dll:
0x41516c RegQueryValueExA
0x415170 RegOpenKeyExA
0x415174 RegCloseKey
Library oleaut32.dll:
0x41517c VariantChangeTypeEx
0x415180 VariantCopyInd
0x415184 VariantClear
0x415188 SysStringLen
0x41518c SysFreeString
0x415190 SysReAllocStringLen
0x415194 SysAllocStringLen
Library kernel32.dll:
0x41519c TlsSetValue
0x4151a0 TlsGetValue
0x4151a4 LocalAlloc
0x4151a8 GetModuleHandleA
0x4151ac GetModuleFileNameA
Library kernel32.dll:
0x4151b4 WriteFile
0x4151b8 WaitForSingleObject
0x4151bc VirtualQuery
0x4151c0 TerminateProcess
0x4151c4 Sleep
0x4151c8 SetFilePointer
0x4151cc SetEndOfFile
0x4151d0 ReadFile
0x4151e0 GetVersionExA
0x4151e4 GetTickCount
0x4151e8 GetThreadLocale
0x4151ec GetTempPathA
0x4151f0 GetTempFileNameA
0x4151f4 GetProcAddress
0x4151f8 GetModuleHandleA
0x4151fc GetModuleFileNameA
0x415200 GetLocaleInfoA
0x415204 GetLastError
0x415208 GetExitCodeProcess
0x41520c GetDiskFreeSpaceA
0x415210 GetCurrentThreadId
0x415214 GetCPInfo
0x415218 FormatMessageA
0x41521c EnumCalendarInfoA
0x415228 CreateFileA
0x41522c CreateEventA
0x415230 CompareStringA
0x415234 CloseHandle
Library user32.dll:
0x41523c PeekMessageA
0x415240 MessageBoxA
0x415244 MessageBeep
0x415248 LoadStringA
0x41524c GetSystemMetrics
0x415250 DestroyWindow
Library shell32.dll:
0x415258 ShellExecuteExA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.