1.4
低危

100a6a73c48e2600f56c3c35511c1f6023246b6bb37d4287e750d8f89f1e6cec

100a6a73c48e2600f56c3c35511c1f6023246b6bb37d4287e750d8f89f1e6cec.exe

分析耗时

193s

最近分析

373天前

文件大小

50.3KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.68
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Upatre-D [Cryp] 20191222 18.4.3895.0
Baidu Win32.Trojan-Downloader.Waski.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20191222 2013.8.14.323
McAfee IStartSurf 20191222 6.0.6.653
Tencent Malware.Win32.Gencirc.10b07883 20191222 1.0.0.1
行为判定
动态指标
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (1 个事件)
section {'name': 'UPX1', 'virtual_address': '0x00007000', 'virtual_size': '0x00002000', 'size_of_data': '0x00001a00', 'entropy': 7.2090034506255956} entropy 7.2090034506255956 description 发现高熵的节
可执行文件使用UPX压缩 (2 个事件)
section UPX0 description 节名称指示UPX
section UPX1 description 节名称指示UPX
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 60 个反病毒引擎识别为恶意 (50 out of 60 个事件)
APEX Malicious
AVG Win32:Upatre-D [Cryp]
Acronis suspicious
Ad-Aware Gen:Trojan.Ipatre.1
AhnLab-V3 Trojan/Win32.Upatre.R261778
Antiy-AVL Trojan[Spy]/Win32.Zbot
Arcabit Trojan.Ipatre.1
Avast Win32:Upatre-D [Cryp]
Avira TR/Crypt.ULPM.Gen
Baidu Win32.Trojan-Downloader.Waski.a
BitDefender Gen:Trojan.Ipatre.1
BitDefenderTheta Gen:NN.ZexaF.33556.dqY@aqqdcWhi
Bkav W32.AIDetectVM.malware1
CAT-QuickHeal Trojanspy.Zbot.8657
ClamAV Win.Downloader.Upatre-5744092-0
Comodo Packed.Win32.MUPX.Gen@24tbus
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.40d64a
Cylance Unsafe
Cyren W32/S-44ff66f0!Eldorado
DrWeb Trojan.DownLoad3.28161
ESET-NOD32 Win32/TrojanDownloader.Waski.A
Emsisoft Gen:Trojan.Ipatre.1 (B)
Endgame malicious (high confidence)
F-Prot W32/S-44ff66f0!Eldorado
F-Secure Trojan.TR/Crypt.ULPM.Gen
FireEye Generic.mg.45d542240d64a874
Fortinet W32/Kryptik.GQIX!tr
GData Gen:Trojan.Ipatre.1
Ikarus Trojan-Spy.Zbot
Invincea heuristic
Jiangmin TrojanSpy.Zbot.eeim
K7AntiVirus Trojan-Downloader ( 004b972f1 )
K7GW Trojan-Downloader ( 004b972f1 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=86)
McAfee IStartSurf
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.qt
MicroWorld-eScan Gen:Trojan.Ipatre.1
Microsoft TrojanDownloader:Win32/Upatre
NANO-Antivirus Trojan.Win32.Zbot.czktya
Panda Generic Malware
Qihoo-360 HEUR/QVM19.1.0CBF.Malware.Gen
Rising Trojan.Waski!1.A489 (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-Dropper
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Mal/Zbot-QL
Symantec ML.Attribute.HighConfidence
Tencent Malware.Win32.Gencirc.10b07883
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-01-17 12:30:14

PE Imphash

120333c7f5efe2cf1ca4b387c2c6ca58

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x00006000 0x00006000 2.57189557917262
UPX1 0x00007000 0x00002000 0x00001a00 7.2090034506255956
.rsrc 0x00009000 0x00002000 0x00002000 3.7808033053841013
.imports 0x0000b000 0x00001000 0x00000200 4.310025885684905

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000090ec 0x00001ca8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_STRING 0x00006db0 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x0000ad98 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library KERNEL32.DLL:
0x403018 HeapAlloc
0x40301c GetProcessHeap
0x403020 LoadLibraryW
0x403024 GetModuleHandleA
0x403028 CloseHandle
0x40302c GetCurrentThreadId
Library COMCTL32.dll:
0x403000 ImageList_Add
0x403004 None
0x403008 ImageList_Create
0x40300c ImageList_Destroy
0x403010 ImageList_AddMasked
Library USER32.dll:
0x403034 PostQuitMessage
0x403038 GetMessageA
0x40303c DispatchMessageA
0x403040 TranslateMessage
0x403044 CreateWindowExA
0x403048 RegisterClassExA
0x40304c DefWindowProcA
0x403050 SendMessageA
0x403054 SetWindowTextA
0x403058 GetActiveWindow
0x40305c TrackPopupMenu

L!This program cannot be run in DOS mode.
qHy'q&
qHy%q!
qHy#q&
qHy$q&
qRich'
.imports
^YQVVD$
tRVW|$
)+_^][
PjuhZ\
fold.html
userDefine.currenP@
@@@@@@
3PQPVj h
SWAVAf9
;wME;r
@@@@@@
@@@@@@@@@
P+5$0@
BBBBUE
tF]%L0@
AK}h'E$pJb
_Te=Bk}w.E9fKkn
rhb}n;13vKk
T"zKhXv-
i.f}{*E9fKij
Yn{~2E$vaiFn;r8vZO
D%DfwaH;
EV}Kbci;]V}Kbj~
r;T#v.M/
:GrQSZ
<DM{1BQeMmBC.
DM{A%J%C]
p\YVSM[
dM{GrU
^+zO.2
O@,1Vy
DGrYSZ
rAM[;GR1o[0
R{[mSz
;kS(|oBTDVB
$+BPg:@.
|cyV"X
1VJ1S-c
FC9kW'zA
lJ:.pl4;T/=V"
VcBf`5tK#|I7f{9
?Rx|.t
fqs&J_
:,F$l{|r
X+PQyY
nectarine
name please
plucklife
somnolent
static
RichEdit
button
trigeder
reelese
welation
tinits
hidelism
@@@@@@@
HeapAlloc
GetProcessHeap
LoadLibraryW
GetModuleHandleA
CloseHandle
GetCurrentThreadId
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
PostQuitMessage
GetMessageA
DispatchMessageA
TranslateMessage
CreateWindowExA
RegisterClassExA
DefWindowProcA
SendMessageA
SetWindowTextA
GetActiveWindow
TrackPopupMenu
`.rdata
@.data
tDi69;8sm%
N<u?F8b
QUR/Q=X
s4>)s\KFGW<
{M+<RJ#Z
8%+3}_k.8U
o@s{>sjY
|@L_0/
AURu.P0
|w{I_5B
fold.html*userDefine.currP
QM;H:j h-
hn hF0h15j
7m7@j1Ag#
EWAVAf9
,,B?pN$
QHc6N
<k2]kW
Nbc;u*
FGF*3<6@_G,}Ad
`@w`:Q
A8u{4Bx
tF]V%L&
(*,`i.0
4:<?@SBm
JB?guHDs
'ZWAK}h'E$pJb
_Te=Bk}w.;9fKkn
T"zKhXv-_V
i.f}{*_ij
Yn{~2E$aiFr8
D;DfwaH;
E}Kbci;
r;T#v.M/
+Lt+0>
:GrQSZ
<DM{1BQeMm
d&Jon-\S;
pk.no!
HO_~{Yd
C'?^+zUO.2
YUYtM/I\
yw@S?.
;#(S\eO'
QorAe;o[0
&JcY/i;2X
R{[mSz
x[u';kSo
S|oBTD?B
PSR+BPgv
'J1S-c
FC9kW'zA
OwCr&6s3[
s51QhzBY=c
OglJ:p
Jl4;Gg/=V"
VcBf`5tKj
|I7f{9
?Rx|.tk*k
fqs&J_
,F$l{|r
!vZ$K}$
Mtfs3%/5e L
o-Uy!ue3
e;elPKbM
!s5c4#spsMdL6 w]b
:3&dd2LL&
/Qnectari
name pleas
ucklif
somnolo5
casshi6hBo{sm
&8_elI2M[
u3oTei
HeapAllocGetPr
LoadLibrm?aryW
ModuleHand
CO$tTh
8IditvdImageJst_Ad
ty6MaskeT
4P}tQui'mf3
D6pW2vch
Tnslk0wYzWiowEx"Regm
TextAAc{;
tivSsckpup4_pnuPEL
[xC`.rda
Kq"'Osrm%
GPGWHU
XPTPSWXaD$j
YT&!XT
30302/
/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"/"*
, 1#1#1#1#1#1#1#1#/"1#1#1#1#/"/"/"1#1#1#/"1#1#1#1#1#1#1#1#1#1#,
.!2$2$2$2$2$2$2$2$2$2$2$2$ia2$2$2$2$2$2$2$2$2$2$2$2$.!
0"4%4%4%4%4%4%4%4%2$2$3$4%pg4%4%4%4%4%4%4%4%4%4%4%4%0"
1#5&5&5&5&5&5&5&5&5&5&ri5&5&3$3$4&5&5&5&5&5&5&5&1#
3%7'7'7'7'7'7'7'7'L=
7'7'7'7'7'z7'7'7'7'7'7'7'3%
5&8(8(8(8(8(8(8(8(8(bW8(8(ul8(8(8(8(8(8(8(8(8(8(8(8(5&
7'<,<,<,<,<,<,<,<,bX<,bX<,<,7'7':+<,<,<,<,<,<,<,7'
;+B2B2B2B2B2B2B2B2B2{rB2B2
B2B2B2B2B2B2B2;+
B2G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7G7B2
I9L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;L;I9
O?nbnbnbnbnbnbnbnbnbnbmcmcmcmcmcmcmcmcmcmcmcmcmcmcmcmcmcmcmcmcO?
COMCTL32.dll
KERNEL32.DLL
USER32.dll
ExitProcess
GetProcAddress
LoadLibraryA
VirtualProtect
GetMessageA
KERNEL32.DLL
HeapAlloc
GetProcessHeap
LoadLibraryW
GetModuleHandleA
CloseHandle
GetCurrentThreadId
COMCTL32.dll
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
USER32.dll
PostQuitMessage
GetMessageA
DispatchMessageA
TranslateMessage
CreateWindowExA
RegisterClassExA
DefWindowProcA
SendMessageA
SetWindowTextA
GetActiveWindow
TrackPopupMenu
rogram is free software; you can redistribute it and/or modify it under the
erms of the GNU General Public License as published by the Free Sof
Kernel32.dll
Riched32.dll
Pane 1
Pane 2
Standard
Customize...
C:\sample.exe
C:\669a7d05b34a2be8b808f2dc446bf957e1ee88940dacecbdc19a7be6bdf471e2
C:\AaqGJRLX.exe
C:\5JjdhbXw.exe
C:\s8ZNnWVE.exe
C:\GYzHUhtX.exe
C:\WHRqxg65.exe
C:\lEbtF0R1.exe
C:\JIVixOeX.exe
C:\e6d55ca7466aa3229102780bbe7f2195a86ca61de13e94efd42cabcc040091e9
C:\789edc65c350fe28defa5823598fcfdb84c96d2a17cf4820397a3c7f1aa5faa1
C:\BE0yxWYc.exe
C:\9v_d08OC.exe
C:\K221Sk8E.exe
C:\fxS06RMh.exe
C:\8TGWxgOF.exe
C:\OXDQWcYa.exe
C:\pL7lRXYz.exe
C:\Dgl4Crtj.exe
C:\M9bZ5MZH.exe
C:\IJKBUgGS.exe
C:\5RoDJUyZ.exe
C:\KBN5otOX.exe
C:\jWHS1GvE.exe
C:\qXbBnxI7.exe
C:\3thv21\qvn32p.exe
C:\GGmOdycY.exe
C:\d07c0261f11ef00816a11bcfdbee57bea46e0101d0ecaf013bad1d3539a905c0
C:\363b03776772cc8add7ddb3d1bf6c9bd6e1a68b0a07c50bf1fc45daf3a05207e
C:\8056eeca1aeddf125e0e0a850fe952928e778864752992faaab2e72a6fbc9cb8
C:\44beba0cd23b772557b1fd49a67a891504d1c4f72f5f11e864d8df201d6de664
C:\Users\Lisa\Desktop\PsaKk3J9.exe
C:\997f7267d7d65811770fba7ae3f90ff4f6a2160af2452a3cb881ac4e77c9b5a2
C:\19b1ba552964ce2d10f1c502533bc865ecee085eb63b33424b23f1b5242d4413
C:\Users\Lisa\Desktop\gib67nMQ.exe
C:\2c0db0e579163b9a366fe869c84f742307a8162348ff412fe3f30b55d47f38a7
C:\Users\Lisa\Desktop\NShnIjvf.exe
C:\aCnQDTez.exe
C:\c3b300eb8698a0e0b19d85102e23fb97abb2751307373a4c4dd36ac54bd6b436
C:\OWq2p3iz.exe
C:\54d0788d86ecb9ae7d193278bb823dee0e807702b44efc10c3e5bdb78cd945d8
C:\f5247f78df2a482de38b30c2c18ba47405fde5c8ae8ebc3ad7ec941d13e31ad3
C:\9bceae97477ccc342e46193d022935ad5fbdc99cda5d9e4d43a20cee313cb5d5
C:\Users\Lisa\Desktop\g8hFuy0r.exe
C:\Users\Johnny Cage\Desktop\w8DP24MzFQ.exe
C:\Users\Lisa\Desktop\DBs9HulY.exe
C:\v61RejqA.exe
c:\task\693000282BFC83DA44FE7AE57A50CE6F.exe
C:\Documents and Settings\Administrator\Desktop\DQm7YxOh.exe
C:\27432316350d6c546b753c88c31b95b478d46947b1887399ba0772ac455e828a
C:\77b4cb45f1b3da320f20ea69d28794096f4f727cf350b96c846b010da361ef2d
c:\task\35279C359E97E2A14A6CC158F485BA83.exe
c:\task\8828F1692DB99D9B3A18A5F2D70CE289.exe
C:\Users\admin\Downloads\invoice.exe
C:\afe447bc80ebf1f2d5f5f34713c424951af212e7bb3e641762c88537dd87c896
C:\6158702f5c2d340811d5136e702cd6fa84aabae9d8881f5dc44b85aff69118be
C:\Users\admin\Downloads\invoice.exe
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\sample.exe
C:\Users\Petra\AppData\Local\Temp\wsace.pe32
C:\5e7acd9426fbd6b81ac822163260071a7373dc88fbfcc9be2f363b2e39330a27
C:\Er6tsd1j.exe
C:\6d71a093c0de0073a5c39b9d4ef7992eddf6782fe9e92ad4308ebd333122ab97
C:\Documents and Settings\Administrator\Desktop\qcSXnEmB.exe
C:\Users\Joe Cage\Desktop\hDmwXiN9ST.exe
C:\Users\admin\Downloads\755e4eb4839f6bcce03e5562728ae4c2.virus.exe
C:\375759c91b97a1afd25df5b040404aa31ca4c15771dece786a146906d94df981
C:\Users\admin\Downloads\wsace.exe
C:\e440e36b0fb737efd0c8c44d9a7d456c6caae49987b478f252fec20a2ac9e934
C:\Users\admin\Downloads\wsace.exe
C:\86523d15b3faadb59597f3a6297551af35eaaab3ffff7522622c481e6604efc8
C:\Users\admin\Downloads\wsace.exe
C:\bf901751fea82e40b4defc5e8f8b5a3ee8901e656d1caa1147019ed73d3fd9a6
C:\Users\admin\Downloads\wsace.exe
C:\052afdac3eb78edbf55e546b1c13e1c000762ce4127681b165c5fecfe7671f89
C:\34bb3eaa1ee5f883d43376d5884a2f9a2d865febc6f6bd675fe2a3845cafbbbd
C:\b6f09ee2ef98b784acc05cfd8babe050cbe13be062fe1844ada67c1edda006ea
C:\078d77d951ae12d87d9eedf930c5a6835b6807a86dbb9bc6a9dd3dab4c4c39f9
C:\Users\Petra\AppData\Local\Temp\wsace.pe32
C:\103e26b030ffe7995b7d13831fb3ad28788b82ae6d6ff3ae7de745e9125df1d1
C:\Users\admin\Downloads\wsace.exe
C:\dfbeac4a30868d13d08b69e3b9565f1ced0a2a9ae59ed36acb94c685bc8168c2
C:\fc6b8cef33463807e3c8c69e884442087bd7d7bec108b1b56c9f40e7a7b1ec04
C:\Users\admin\Downloads\wsace.exe
C:\5efc00e892ead5fff969cded7eaea3fde342ffa18f81595a0e27e36381715a53
C:\Users\Petra\AppData\Local\Temp\wsace.pe32
C:\Users\admin\Downloads\dcce8ffd1098b775_wsace.exe
C:\95eb28514be2e028f0af0f1345b9a6cdc601ff363205cf531217fa8573941666
C:\83e351cdb677c3ae06c1528287fa73cf07082ff7658f61c3bbfe8a8d9bea7a75
C:\Users\admin\Downloads\wsace.exe
C:\b6aa3540606f5da5aa127748f6461c8389b6a13741a70b7ba06f956eefbe4e63
C:\15403cf5c6d45bace8d219a1add812aa650fa903e7bfa5d59812b406d8e9f47f
C:\Users\admin\Downloads\wsace.exe
C:\5a6055f597541db037d5ad84b170c080304f85f22535df81edc1319ea2250c18
C:\Users\admin\Downloads\wsace.exe
C:\e8e25569d8700585a3a87f9a9cac34dcde3b6baeb3f07d09a209e7f91dcedfba
C:\Users\admin\Downloads\wsace.exe
C:\70ca5804ce060b73543ba0edc212df63d2202a700104581ade2c10803dc43f62
C:\ef496f90e41876e38a3a7e980fc2a8c9f202f3c70ab9eaf0378cd3050805f072
C:\Users\admin\Downloads\wsace.exe
C:\4dbc2922ac6bbb08a1362d2dcc248f9f19dacdb459be3c2c656e45e20fa61ddd
C:\Users\admin\Downloads\4914214fa66099f9260e3cb41aff2ded.virus.exe
C:\f1f7b57893ad88b5cb8f36a2604e6692e219030cdae7271ad8da7995fdaa48de
C:\2f86309b86992f8ab40dc9daaaeb896b53ef747801dcefc9cf265b52b70bb876
C:\24df3c750c16c603581f4f511789c6f78c979e45895590df677670fd03c174ad
C:\a15fa05ebb100d704d5a46e70ddefb6ee643b3eb5774f70b3d926eca075945d8
C:\Users\Petra\AppData\Local\Temp\wsace.pe32
C:\18e88b3cf3f09dab0132a5d31e306047d89d76df5ebeac2919e2c41782ead639
C:\2ee8652d148735c6e5e0f8e723e963f089daaf0d6068c719d70e11d6cd895596
C:\1479dedf9ea211e5fb6e5f9c370b82dd8c816219902f474a15d484173bd272f7
C:\52c5fbefeb0bfb4652d9b8c69ebb0d08c325d08d814870016dd1dee2f34bd3bf
C:\1e0d64988b8bf681c88c88fa87d2440ecd663ece4e621b08b6816ffe12f030ce

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.