1.2
低危

1970c70c5e5ed805e02907d7e08a8e3b46a125e1f4c5b81f858703a722bf0a6b

1970c70c5e5ed805e02907d7e08a8e3b46a125e1f4c5b81f858703a722bf0a6b.exe

分析耗时

197s

最近分析

363天前

文件大小

14.1MB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM SILLYP2P
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.73
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Worm:Win32/Agent.e47dd229 20190527 0.3.0.5
Avast Win32:SillyP2P-X [Wrm] 20200915 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Kingsoft None 20200915 2013.8.14.323
McAfee Artemis!4D8FD1C301FC 20200914 6.0.6.653
Tencent Trojan.Win32.Small.p 20200915 1.0.0.1
静态指标
可执行文件包含未知的 PE 段名称,可能指示打包器(可能是误报) (4 个事件)
section .text\x00U
section .data\x00U
section .rsrc\x00U
section .luczwh
行为判定
动态指标
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (2 个事件)
section {'name': '.text\\x00U', 'virtual_address': '0x00001000', 'virtual_size': '0x00005b50', 'size_of_data': '0x00006000', 'entropy': 7.716520750193899} entropy 7.716520750193899 description 发现高熵的节
entropy 0.5454545454545454 description 此PE文件的整体熵值较高
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 55 个反病毒引擎识别为恶意 (50 out of 55 个事件)
ALYac GenPack:Generic.Malware.SN!hidprn.030880FE
APEX Malicious
AVG Win32:SillyP2P-X [Wrm]
Acronis suspicious
Ad-Aware GenPack:Generic.Malware.SN!hidprn.030880FE
AhnLab-V3 Worm/Win32.SillyP2P.R3740
Alibaba Worm:Win32/Agent.e47dd229
Antiy-AVL Trojan/Win32.AGeneric
Avast Win32:SillyP2P-X [Wrm]
Avira TR/Dropper.Gen
BitDefender GenPack:Generic.Malware.SN!hidprn.030880FE
BitDefenderTheta Gen:NN.ZexaF.34242.@x3@a8xMOpG
Bkav W32.AIDetectVM.malware1
CAT-QuickHeal Trojan.GenericRI.S7343428
Comodo Worm.Win32.Agent.NIQ@8hjo1v
CrowdStrike win/malicious_confidence_100% (W)
Cybereason malicious.301fca
Cylance Unsafe
Cynet Malicious (score: 100)
Cyren W32/Xiquitir.A.gen!Eldorado
DrWeb Win32.HLLW.Xiquit
ESET-NOD32 Win32/Agent.NIQ
Elastic malicious (high confidence)
F-Secure Trojan.TR/Dropper.Gen
FireEye Generic.mg.4d8fd1c301fca56e
Fortinet W32/Agent.NIQ!worm
GData Win32.Worm.Agent.ASR
Ikarus Worm.Win32.Agent
Invincea ML/PE-A + W32/VB-FFH
Jiangmin Trojan.Generic.dztur
K7AntiVirus Trojan ( 0000da801 )
K7GW Trojan ( 0000da801 )
Kaspersky HEUR:Trojan-Dropper.Win32.Daws.pef
MAX malware (ai score=88)
Malwarebytes Trojan.Agent
MaxSecure Trojan.Malware.7164915.susgen
McAfee Artemis!4D8FD1C301FC
MicroWorld-eScan GenPack:Generic.Malware.SN!hidprn.030880FE
Microsoft Trojan:Win32/AgentP.J!rfn
NANO-Antivirus Trojan.Win32.Xiquit.fyviqi
Qihoo-360 Win32/Worm.Small.B
Rising Worm.Agent!1.9D8A (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-MSFake[All]
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos W32/VB-FFH
Symantec W32.SillyP2P
TACHYON Worm/W32.SillyP2P.Zen.E
Tencent Trojan.Win32.Small.p
VBA32 Worm.Small
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2004-05-07 07:02:15

PE Imphash

27f21db1a40f044cb2ea9aa7f88716f6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text\x00U 0x00001000 0x00005b50 0x00006000 7.716520750193899
.rdata 0x00007000 0x000009ac 0x00001000 3.7370867281067
.data\x00U 0x00008000 0x00003478 0x00002000 3.4292108023403616
.rsrc\x00U 0x0000c000 0x00000958 0x00001000 2.492413503122149
.luczwh 0x0000d000 0x00000400 0x00001000 2.124462985678828

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000c408 0x00000128 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_ICON 0x0000c408 0x00000128 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_GROUP_ICON 0x0000c530 0x00000022 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_VERSION 0x0000c558 0x000003fc LANG_SPANISH SUBLANG_SPANISH_MODERN None

Imports

Library KERNEL32.dll:
0x407010 FindClose
0x407014 FindNextFileA
0x407018 GetModuleHandleA
0x40701c GetStringTypeW
0x407020 GetStringTypeA
0x407024 GetModuleFileNameA
0x40702c FindFirstFileA
0x407030 Sleep
0x407034 HeapFree
0x407038 HeapAlloc
0x40703c GetStartupInfoA
0x407040 GetCommandLineA
0x407044 GetVersion
0x407048 ExitProcess
0x40704c HeapDestroy
0x407050 HeapCreate
0x407054 VirtualFree
0x407058 VirtualAlloc
0x40705c HeapReAlloc
0x407060 GetLastError
0x407064 CloseHandle
0x407068 WriteFile
0x40706c ReadFile
0x407070 TerminateProcess
0x407074 GetCurrentProcess
0x407084 WideCharToMultiByte
0x407090 SetHandleCount
0x407094 GetStdHandle
0x407098 GetFileType
0x40709c RtlUnwind
0x4070a0 SetStdHandle
0x4070a4 FlushFileBuffers
0x4070a8 CreateFileA
0x4070ac SetFilePointer
0x4070b0 GetCPInfo
0x4070b4 GetACP
0x4070b8 GetOEMCP
0x4070bc GetProcAddress
0x4070c0 LoadLibraryA
0x4070c4 SetEndOfFile
0x4070c8 MultiByteToWideChar
0x4070cc LCMapStringA
0x4070d0 LCMapStringW
0x4070d4 CreateDirectoryA
Library USER32.dll:
0x4070dc MessageBoxA
Library ADVAPI32.dll:
0x407000 RegSetValueExA
0x407004 RegCloseKey
0x407008 RegOpenKeyA

L!This program cannot be run in DOS mode.
/<kRkRkR
^iRYjR\gRXWR
AlRkS\RDiRTjRRichkR
.rdata
@.data
@.luczwh
KJ/Odk
HYo0Y!jV1C
?ej#dU
HAwiL-BMA
17KeCs5
??lP!V1CCCqV
L,FZG/
a"&C0'n
;=iqC:
kV73iT=
8xxd"?
~[)JdI:aC
@obuSU
Cfkc"1U
a"&C<>'n
JnC"S<]
)33Pbq?otUk
"K<g{?&Jv
"S<]y[Ut8a
6lX)77b
5m&Qjlmm`
HYw<}bwoN{
k{c"{'
[;-iqi!C
~/3Hq?o`
Ci!C_N
cA@^7)
EN~k"U
?~[O
a"&C4'n-
6K<G?/'kA:Y
yk!C]H
n7xxw>K<
~[#5Pvq?
!bxI:a
ft(o&z
~[)77@jq?
(c[X</jqSU
~[y@bq?
v[Ut^L
~-'kA:uL
g).W94ZiSU
E"C@{2
#/?kA:
?O|FF\B
*dC#d=fF
}O!j5f(G
|&Qjlmm`
ksUk8'nPC
Rg>U_+0t?
`|JNfO(cH]
Kb9Vg2
>nX!->F
C,jDDj
)?cWoCK
6lP)67j<
A0Y!x5n@(9c!T
ECkvo.B+
g|p=)0
+UH]su'
?lP!5j
g).WHA
sKw&7J777n
HI}-u:a
nC<b$/FvpC/
|??d<V
ic!CL(
}[U6@q?9w
]EU_}[U
<xxy;Jj)O
Or?xq!
j7!rB:a
>:Kk4b
r!bB:a
zK{oCo&
g""Cj?
~~@<*?!
a."C9:'n
kDqwc(+8/7
ZHC:??
aqCC9
BDG-h"
?/Mc@;@^Cwxo&w
lX.7Az7i
MMyqOo
\l3Ld@
5<jX!2_@*
C/t]lBAf~
Vrc7Q:!k"7zjy
Ny~kV7
/lF:7?
?xxqF4|u@BslXA
|NQqI{sN
=lyUVjC}j
q/mNlb6
q?x|"?2lq
k"@p[;
6PGDO*
@i[(aV
?mb|X;
_Nr)qo
KSBF=k
J"5J_:@j.)x=
gc5B[\.
}Nqoc
~JizAGf
?[A3D:iRfg
$NC76
k??Cy|
/d|BWGs~
oHPJAs
(#5GKg&.]E/
o{d74
|;$!yf@`lX)
~M~qJh7B3sn
?gRK's,z
EG~k"USwL
R$$/Ftpd
-&?qq)~wDtF:
%7JV=C
c3R?yY=|#
8ydzG=/rrG77o]
</d[~,A
Gk"WH@{O
"KlP!eNh0
C]C/'?$!8OUN
5f0VwM(W=?
l!czL6NC
tqCK{s
x;vfW#
oX+"xN
27!5pUEG
cALGI@o
pa|[52_Cawi+%
Z+@[?O\U
Rd$d4Ng\qE]]
MuCy<'ny/
?BHEpqIC
'jWdy[.
Ln\#`4
AwFPBe>
L=-7Codr
@yJwaj>
?CcA:hN(!<Cn
MKIC8wLT
ClqK9q
R"d$/F5
'7AycC
Dq-']]
COxXwUP/
yzk"U}2
G[~?[7f0
^7J?':3
zj8UVWClq
:3gsQ@:a
k"WG\L
=@Gs+"
KK~!'mG}exo+"NI
8@MG}exo+"S
,4??;#R{C
osGc2JHl*Z~15
ug/&5KL{i}-x`3
pEe7JR $
HpEe7JR $
wy@![5??
Rb6I/k
FgKvzt_
IJ}.]W
kQb7KM
2JH/l*~1
k6??_;
N9f-!V
HIwaHg'4
GC_+"S(
3_KqBvd
p_o2]|Js)?c
hq8Kv3xi,|38
/#OA>'R^r"
:UG5'UXD
:/j[5aw?C
17Kq3#V6J<0uKG|Mr+
8jA:KfC(gC
.sk>?0Y
<()lAL
6k"]S9$QHS(r
)u_+y?
0YJ)L7n6
8xgY*~,F
ZtbAq?xwF;B
?B?L_|[UV7fL
{*SxD
5J7BFruj
sWJI]WpCC[-a`
j&5B{?n
s?xwFT;d
</e?>>6Eqi!C_<
*J$C:an
W9CCo=k"?
#CDpVtt
zJ)<{n @M
K{iHAYnO|RL
r^|6{{rd
?jDBhp\6{ws
Lv|)%55i
o.75I'M5>
FM;M0F
!d>6EGbU
Ou'/@jC
/+VJxykAj}EHm
_e5~h$
/gW1J/\J
yP_<ywiLOFZS
J7j'p:Kqsx
rk"]xHqs q~
s`g!FG
eT dBj_=Gqwg
%)Vj[Uw+
c"HH[3
#2O??[
A3xs+"]+
>Ziy(w
;~k"U\L
p!)@_M
a_km'x6yK
uugO:v'+O
fk"C:??[y
;v:uJqx{+"HX[;l=&?BkV1;K_
"|S{??@
MCNCkWT
IW0_I$DONu
+s+"C6K-
c55x}IeC
6JC3BKL+cA]
Y[Ux@s3^
W??:g&k
>@Gf;#<xV5ANHG
(^F/3)xL
;wO-q?
x5f&"(}
oe?7C]
O|_2FXNCGrR;U
k?yyAFI
bCkU>U
&JYT~%NO
*T=#)-@q?
agTU(?
Kb9Vg'
7&HMcol@:aJE
/7:N+q
??dyst
?f{XAoC
CU'r@:a
fy({[<
vd^?xxL_{+"S9o<o
3xk+"u
>SmWO)
o*f[|[
o!t_l[z
_??gM4
KK}!'mG}exo
qGb3HHn+B|0)
te/.7KM{hu/yd7
9!cY??l~Ss
3da?c@6
HH+n+|0
hDj/UG&
0>b7JR $
=Dg@Gs+"
#[|V?:5
FvCKxqH_
slSe5j!apN+
H@]|3-
ywUi$e
>cCUN;
07=<X
w@V66B
~?lU7H
?<F{m"
[=Cl=F
<zf~aO
 Kxw)wm7AI
?~RzZa6~?s
iW<B<L6dy
g!03@]tzMH
E7xmiH!A
c7n6AeC"
M?'nF:O(R
xxO&[|
FGIDqGo
<Ag!?^_K
>k"iHAsYfx[
*eJ?xz
"+Mhf;Pr
7HP[+l
Vm+W*KH[
(k4'!NgUp
vW!?ky
d[5)?k"?p A
pG6Tc6x
Cvx>P;
-$'*k"1
b?>yo)
!^r!CO
mVlrp@:ac
rq??#K
+y?'rpC:a$'U2B<Z/i
R?aKq8
cA.}.&
*cz}|6
'?==1C
&,"=u\
BwS8vor?x=
YL+"!jw??F1
:~t!/c
d5OENUU+<
"fmdVHxZ']1
<AlztlA\
]5:77E
/[Jzf~adG)
nz+"\+2
\rc)?NC7O
X/X5DYf|
5LsB) A:
1L<KcAd
lF45)&Co
U(C@s~-:.C
zz{xFPq
dk"qAU~
|??lqStjI
!yc&SZCgX<yk/kf^n
dXU|Zx
v0WCzj!
CMyO6<Z
x#|=be
WCzZ,W
UV<7xw
~Vd~\UX_
g1J'\)Ws
,A'J:[qO
{"j!0~
*5z[,i
zuHDqf
U|:Sqst
H@[;bS\4KK~
CCOx
BwA:F?D:
G{[f\~[47b7
WTLtf~Vf
`h````
ppxxxx
(null)
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
abnormal program termination
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
KERNEL32.dll
MessageBoxA
USER32.dll
RegCloseKey
RegSetValueExA
RegOpenKeyA
ADVAPI32.dll
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetLastError
CloseHandle
WriteFile
ReadFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
SetStdHandle
FlushFileBuffers
CreateFileA
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateDirectoryA
Winamp 5.0 (full version).exe
Winamp 3 (full version).exe
Winamp 3.5 (full version).exe
Update Photoshop 7.0 to Photoshop 9.16 (Its Work!).exe
Update Photoshop 8.0 to Photoshop 9.5 (Its Work!).exe
WinAce 3.85 (with Serial).exe
Download Accelerator Plus (DAP) (full version with serial).exe
RealOne Player (Full version).exe
BsPlayer v3.exe
WinRar v6.11 (with crack).exe
WinRar 4 (with crack).exe
ContaWin 2000 (full version).exe
WinZip 9.exe
DivX 7.2 freeware.exe
3D Studio R8 (It's Work!!).exe
VirtualDub 2.1.4.exe
MSN messenger 6.3.exe
Hacha Profesional Edition.exe
Simpsons pack guiones (Temporada 2004).exe
Mazinkaiser pack fondos de escritorio.exe
Mazinkaiser comics pack.exe
Juegos JAVA para NOKIA.exe
Capitulos ineditos de DragonBall Z jamas emitidos.exe
Pack Tonos y Logos para Nokia.exe
Nero 7.5.1.0 (cracked!).exe
Pack Photoshop CS 8 plugins.exe
3D Movie Maker.exe
Silent Hill.exe
PSEmu.exe
RM2GBA.exe
WAV2MP3.exe
GBAEmu.exe
GameCube Emulator.exe
Pack 50 Juegos PS2.exe
Pack 25 Juegos GameCube.exe
Resident Evil for GameCube.exe
Visual Basic 6.exe
Visual C.exe
Visual Studio (full).exe
mugen (full).exe
Fuck my fat ass.avi.exe
German extreme violation.mpg.exe
Sexo con una menor.exe
Pedofilia pack 37 pics.exe
Follada brutal coo roto.exe
Lolita Pack 20 Pics.exe
Puta come mierda.exe
Solo para Maricas.exe
No lo Descargues.exe
Dont Download.exe
humor.exe
Dont Touch.exe
Hentai.exe
Matrix Wallpapers.exe
Terminator 3 Wallpapers.exe
Hentai Evangelion Poker.exe
Shinchan screen saver.scr
Hentai Shizuka clit.exe
a pelo.exe
Chenoa en cueros.exe
WinAmp skings and plugins.exe
FlashGet Max acceleration (Experimental).exe
VMIntel386.exe
C:\Gusanillo QueBonito@Compartir.es
Hola tio! soy el gusanillo
como va eso?
Error in zip file
El archivo tiene un formato desconocido o est daado
Zip message
El archivo zip no ha podido ser abierto
probablemente este daado
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
256mb 32bit
VMIntel386
/Intelx386
/VMIntel386.exe
Pack sex very hot nude young girl porn erotic private pussy rape clitoris suck chicas fotos culos tetas coos mamadas corridas sister hermana amigas friends lesbianas mujeres desnudas putas guarras hentai.exe
EMULE.EXE
config/shareddir.dat
012345: :
SOFTWARE\Kazaa\LocalContent
012345:%s
DisableSharing
SOFTWARE\Kazaa\UserDetails
QueBonito@Compartir.es
012345: :
SOFTWARE\IMesh\Client\LocalContent
012345:%s
DisableSharing
SOFTWARE\IMesh\Client\UserDetails
QueBonito@Compartir.es
33333330
{{{{{{{3
{{{{{{{33
{{{{{{{330
{{{{{{{330
{{{{{{{330
3333333
33?030
33333333
wwwwwwwwwww
DDDDDD@
DDDDDDGpw
DDDDDDGpw
DDDDDDDDDDD
wwwwwwwwwww
DDDpp@
KJ/Odk
HYo0Y!jV1C
?ej#dU
HAwiL-BMA
17KeCs5
??lP!V1CCCqV
L,FZG/
KJIOk@
KIhR'@
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUk
(null)
((((( H
VS_VERSION_INFO
StringFileInfo
0c0a04b0
Comments
Microsoft
CompanyName
Microsoft
FileDescription
Microsoft
FileVersion
1, 0, 0, 1
InternalName
Microsoft
LegalCopyright
Copyright
LegalTrademarks
Debido a que es un Gusano, no creo oportuno rellenar este cuadro. jejeje
OriginalFilename
Microsoft
PrivateBuild
Microsoft
ProductName
Microsoft
ProductVersion
1, 0, 0, 1
SpecialBuild
Microsoft
VarFileInfo
Translation

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.