2.6
中危

0ba018ebf46c78f699a7beffd154573e5b98a4c450ce1782b64778cabcc5a7a7

48acf272cccc52677fa23e5483e23c1a.exe

分析耗时

82s

最近分析

文件大小

1.9MB
静态报毒 动态报毒 3Z1@AITLHTDI A + MAL AGARD AI SCORE=89 AIDETECTVM ATTRIBUTE BANKI BSCOPE CERT CLASSIC CONFIDENCE DANGEROUSSIG EHLS ELDORADO ENCPK FAKESIG FALSESIGN GENETIC GRAYWARE HACKTOOL HFVB HIGH CONFIDENCE HIGHCONFIDENCE HSYRVW INJECT3 INVALIDSIG KRAP KRYPT KRYPTIK LKMC MALICIOUS PE MALWARE1 MALWARE@#WILF1V36YOXH PEQE PHZJH PINKSBOT QAKBOT QBOT R349085 RAZY S15694197 SCORE SMF1 UNSAFE VVOEMXBU7HI ZENPAK ZENPAKPMF ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee W32/PinkSbot-HA!48ACF272CCCC 20201022 6.0.6.653
Alibaba Trojan:Win32/Qakbot.09653021 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
Baidu 20190318 1.0.0.2
Avast Win32:DangerousSig [Trj] 20201022 18.4.3895.0
Kingsoft 20201022 2013.8.14.323
Tencent Win32.Trojan.Falsesign.Peqe 20201022 1.0.0.1
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1620726217.090653
NtAllocateVirtualMemory
process_identifier: 784
region_size: 212992
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x003a0000
success 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 62 AntiVirus engines on VirusTotal as malicious (50 out of 62 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Razy.743295
FireEye Generic.mg.48acf272cccc5267
CAT-QuickHeal Trojan.ZenpakPMF.S15694197
McAfee W32/PinkSbot-HA!48ACF272CCCC
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
K7AntiVirus Trojan ( 0056d5111 )
Alibaba Trojan:Win32/Qakbot.09653021
K7GW Trojan ( 0056d5111 )
CrowdStrike win/malicious_confidence_90% (W)
Arcabit Trojan.Razy.DB577F
Invincea ML/PE-A + Mal/EncPk-APV
Cyren W32/S-c7f038bc!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
Paloalto generic.ml
ClamAV Win.Packed.Razy-9635986-0
Kaspersky HEUR:Trojan.Win32.Agard.pef
BitDefender Gen:Variant.Razy.743295
NANO-Antivirus Trojan.Win32.Qbot.hsyrvw
Avast Win32:DangerousSig [Trj]
Rising Trojan.Kryptik!1.CA76 (CLASSIC)
Ad-Aware Gen:Variant.Razy.743295
Sophos Mal/EncPk-APV
Comodo Malware@#wilf1v36yoxh
F-Secure Trojan.TR/AD.Qbot.phzjh
DrWeb Trojan.Inject3.53132
TrendMicro Backdoor.Win32.QAKBOT.SMF1
McAfee-GW-Edition W32/PinkSbot-HA!48ACF272CCCC
Emsisoft Trojan.Crypt (A)
SentinelOne DFI - Malicious PE
Jiangmin Trojan.Zenpak.cwe
MaxSecure Downloader.Downloader.WIN32.Agent.gen_198790
Avira TR/AD.Qbot.phzjh
Antiy-AVL GrayWare/Win32.Kryptik.ehls
Microsoft Trojan:Win32/Qakbot.VD!Cert
AegisLab Hacktool.Win32.Krap.lKMc
ZoneAlarm HEUR:Trojan.Win32.Agard.pef
GData Gen:Variant.Razy.743295
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Banki.R349085
Acronis suspicious
BitDefenderTheta Gen:NN.ZexaF.34570.3z1@aiTLHtdi
ALYac Trojan.Agent.QakBot
MAX malware (ai score=89)
VBA32 BScope.Malware-Cryptor.SB.01798
Malwarebytes Trojan.FakeSig
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2097-10-18 04:01:18

Imports

Library KERNEL32.dll:
0x5da208 GetModuleHandleW
0x5da20c MulDiv
0x5da218 GetCurrentThreadId
0x5da224 InterlockedExchange
0x5da230 FreeLibrary
0x5da23c Sleep
0x5da240 Beep
0x5da250 GetCommTimeouts
0x5da254 OpenEventW
0x5da258 GetCommMask
0x5da25c FindNextFileW
0x5da260 GetFileAttributesW
0x5da268 ClearCommBreak
0x5da270 CreateFiber
0x5da278 WriteConsoleW
0x5da27c GetConsoleAliasA
0x5da280 BuildCommDCBW
0x5da284 GetCalendarInfoW
0x5da294 GetVolumePathNameW
0x5da298 UnlockFile
0x5da29c CreateRemoteThread
0x5da2a0 FindNextVolumeW
0x5da2a4 SetFileApisToOEM
0x5da2ac GetCPInfoExW
0x5da2b0 GetVolumePathNameA
0x5da2b8 GetOverlappedResult
0x5da2bc GetTapeParameters
0x5da2c4 CreateDirectoryA
0x5da2c8 LocalShrink
0x5da2cc EraseTape
0x5da2d4 ExitProcess
0x5da2d8 MapViewOfFileEx
0x5da2dc _lwrite
0x5da2e0 CreateHardLinkW
0x5da2e8 LocalFree
0x5da2f0 GlobalAlloc
0x5da2f4 TerminateProcess
0x5da2f8 SetEvent
0x5da2fc ReleaseMutex
0x5da304 DeleteFileW
0x5da308 SetFilePointer
0x5da30c GetFileSize
0x5da310 SetPriorityClass
0x5da314 WriteFile
0x5da318 DeviceIoControl
0x5da324 GetFileType
0x5da32c CreateProcessW
0x5da330 GlobalLock
0x5da334 GlobalUnlock
0x5da338 GlobalFree
0x5da33c CreateMutexW
0x5da340 WaitForSingleObject
0x5da344 GetVersion
0x5da348 GetTempPathW
0x5da34c GetModuleFileNameW
0x5da350 GetSystemInfo
0x5da354 GetLongPathNameW
0x5da358 DeleteAtom
0x5da35c FindAtomW
0x5da360 AddAtomW
0x5da364 OpenThread
0x5da368 GetAtomNameW
0x5da36c GetFileSizeEx
0x5da370 SetFilePointerEx
0x5da37c GetSystemTime
0x5da380 FormatMessageW
0x5da384 OutputDebugStringW
0x5da388 lstrcmpiA
0x5da38c lstrcmpA
0x5da394 GetVersionExW
0x5da398 CompareStringA
0x5da39c CreateFileA
0x5da3a0 SetStdHandle
0x5da3a4 GetConsoleOutputCP
0x5da3a8 WriteConsoleA
0x5da3ac CreateEventW
0x5da3b4 GetStringTypeA
0x5da3b8 GetLocaleInfoA
0x5da3bc FlushFileBuffers
0x5da3c0 GetConsoleMode
0x5da3c4 GetConsoleCP
0x5da3cc GetStartupInfoA
0x5da3d0 SetHandleCount
0x5da3d4 GetCommandLineW
0x5da3e0 GetDateFormatA
0x5da3e4 GetTimeFormatA
0x5da3e8 HeapCreate
0x5da3ec GetModuleFileNameA
0x5da3f0 GetStdHandle
0x5da3f4 TlsFree
0x5da3f8 TlsSetValue
0x5da3fc TlsAlloc
0x5da400 TlsGetValue
0x5da404 IsValidCodePage
0x5da408 GetOEMCP
0x5da40c GetACP
0x5da410 LCMapStringW
0x5da414 LCMapStringA
0x5da418 GetCPInfo
0x5da41c GetStringTypeW
0x5da420 RtlUnwind
0x5da424 GetStartupInfoW
0x5da428 VirtualQuery
0x5da430 IsDebuggerPresent
0x5da438 ExitThread
0x5da43c lstrlenA
0x5da440 VirtualAlloc
0x5da444 VirtualFree
0x5da44c GetProcessHeap
0x5da450 HeapSize
0x5da454 HeapReAlloc
0x5da458 HeapFree
0x5da45c HeapAlloc
0x5da460 HeapDestroy
0x5da464 LoadLibraryA
0x5da468 LoadLibraryExW
0x5da46c lstrcmpiW
0x5da470 VirtualAllocEx
0x5da474 GetLastError
Library USER32.dll:
0x5da47c UnregisterClassA
0x5da480 InvertRect
0x5da484 TileChildWindows
0x5da488 UnhookWindowsHookEx
0x5da48c CharUpperW
0x5da494 SetWindowWord
0x5da498 PostQuitMessage
0x5da49c PostThreadMessageA
0x5da4a0 GetDCEx
0x5da4a4 GetClassNameW
0x5da4a8 EnumDesktopsW
0x5da4ac FindWindowExA
0x5da4b0 CharNextW
0x5da4b8 SetCursor
0x5da4bc SetWindowTextA
0x5da4c0 GetClipboardData
0x5da4c4 SwitchToThisWindow
0x5da4c8 GetTitleBarInfo
0x5da4cc wvsprintfW
0x5da4d0 GetCursorPos
0x5da4d4 CreateWindowExA
0x5da4d8 ShowOwnedPopups
0x5da4dc DeleteMenu
0x5da4e0 DlgDirSelectExW
0x5da4e4 GetMonitorInfoW
0x5da4e8 SetCursorPos
0x5da4ec DlgDirListComboBoxA
0x5da4f0 LoadIconA
0x5da4f4 LoadCursorW
Library GDI32.dll:
0x5da4fc PtInRegion
0x5da500 SetMetaFileBitsEx
0x5da50c EngStrokePath
0x5da510 Chord
0x5da514 GdiAddGlsBounds
0x5da518 EqualRgn
0x5da524 SetPaletteEntries
0x5da52c StartDocA
0x5da530 AddFontResourceW
0x5da534 SetDeviceGammaRamp
0x5da538 GdiConvertFont
0x5da53c GdiEndPageEMF
0x5da540 GdiFixUpHandle
0x5da544 EnumEnhMetaFile
0x5da54c GetPolyFillMode
0x5da550 EngFindResource
0x5da554 EndDoc
0x5da558 GetClipBox
0x5da55c GetSystemPaletteUse
0x5da560 GetObjectA
0x5da564 CreateFontW
0x5da568 SetTextColor
0x5da56c SetBkColor
0x5da570 SetViewportOrgEx
0x5da574 GetTextMetricsW
0x5da578 CreateSolidBrush
0x5da57c CreateCompatibleDC
0x5da584 DeleteObject
0x5da588 BitBlt
0x5da58c DeleteDC
0x5da590 GetStockObject
0x5da594 GetObjectW
0x5da598 GetDeviceCaps
0x5da5a0 SelectObject
0x5da5a4 GetEnhMetaFileBits
Library ADVAPI32.dll:
0x5da5ac RegOpenKeyW
0x5da5b0 RegQueryValueExA
0x5da5b4 GetUserNameA
Library SHELL32.dll:
0x5da5bc ShellExecuteW
0x5da5c4 SHBindToParent
0x5da5c8 SHGetFolderLocation
0x5da5cc DragQueryFileAorW
0x5da5d4 SHBrowseForFolder
0x5da5d8 ExtractIconExW
0x5da5dc SHGetDesktopFolder
0x5da5e4 SHFileOperationW
0x5da5e8 DragFinish
0x5da5ec DragQueryFile
Library SHLWAPI.dll:
0x5da5f4 StrRChrIW
0x5da5f8 StrCmpNIW
Library COMCTL32.dll:
0x5da604 _TrackMouseEvent

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51811 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.