4.0
中危

4559d6da23e5dad9af5418c00c92c155e2f0c18d5b1252faf1973a0e10c3a6d7

55eb8c0ce92db67cf3e389cc3a4ea8f1.exe

分析耗时

93s

最近分析

文件大小

250.3KB
静态报毒 动态报毒 AI SCORE=83 AIDETECTVM BJHG3WTBRD8 BSCOPE CLASSIC CONFIDENCE EHLS ENCPK EPKS GENCIRC GENETIC GENKRYPTIK GOZI GRAYWARE HFGZ HIGH CONFIDENCE HQPCBW KCLOUD KRYPTIK MALCERT MALICIOUS PE MALWARE1 MALWARE@#22YSI5Y613BOS MINT MXRESICN PJOW QBOT QVM20 R + MAL SCORE STATIC AI TROJANBANKER TROJANPWS TROJANX TRSF UNSAFE YVYXA ZAMG ZBOT 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Packed-GCB!55EB8C0CE92D 20201211 6.0.6.653
CrowdStrike win/malicious_confidence_80% (W) 20190702 1.0
Baidu 20190318 1.0.0.2
Avast Win32:TrojanX-gen [Trj] 20201210 21.1.5827.0
Alibaba TrojanBanker:Win32/Kryptik.d716a0b8 20190527 0.3.0.5
Kingsoft Win32.Troj.Banker.(kcloud) 20201211 2017.9.26.565
Tencent Malware.Win32.Gencirc.10cde558 20201211 1.0.0.1
静态指标
Queries for the computername (3 个事件)
Time & API Arguments Status Return Repeated
1620762778.10875
GetComputerNameW
computer_name:
failed 0 0
1620762778.10875
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620762778.59375
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
This executable is signed
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (3 个事件)
Time & API Arguments Status Return Repeated
1620762771.79675
NtAllocateVirtualMemory
process_identifier: 2440
region_size: 163840
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00350000
success 0 0
1620762777.18775
NtAllocateVirtualMemory
process_identifier: 2440
region_size: 159744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00380000
success 0 0
1620762777.18775
NtProtectVirtualMemory
process_identifier: 2440
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 73728
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 59 AntiVirus engines on VirusTotal as malicious (50 out of 59 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Mint.Zamg.O
FireEye Generic.mg.55eb8c0ce92db67c
CAT-QuickHeal TrojanPWS.Zbot.Y
McAfee Packed-GCB!55EB8C0CE92D
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
AegisLab Trojan.Win32.Gozi.trsf
Sangfor Malware
CrowdStrike win/malicious_confidence_80% (W)
BitDefender Trojan.Mint.Zamg.O
K7GW Trojan ( 0056b69c1 )
K7AntiVirus Trojan ( 0056b69c1 )
Cyren W32/Trojan.PJOW-0898
Symantec Packed.Generic.459
APEX Malicious
Avast Win32:TrojanX-gen [Trj]
ClamAV Win.Packed.Gozi-9379096-0
Kaspersky HEUR:Trojan-Banker.Win32.Gozi.pef
Alibaba TrojanBanker:Win32/Kryptik.d716a0b8
NANO-Antivirus Trojan.Win32.Gozi.hqpcbw
Rising Trojan.MalCert!1.C99C (CLASSIC)
Ad-Aware Trojan.Mint.Zamg.O
Sophos Mal/Generic-R + Mal/EncPk-APV
Comodo Malware@#22ysi5y613bos
F-Secure Trojan.TR/Gozi.yvyxa
DrWeb Trojan.Gozi.703
Zillya Trojan.Gozi.Win32.3046
McAfee-GW-Edition Packed-GCB!55EB8C0CE92D
Emsisoft Trojan.Mint.Zamg.O (B)
Ikarus Trojan.Win32.Crypt
Jiangmin Trojan.Banker.Gozi.bah
Avira TR/Gozi.yvyxa
MAX malware (ai score=83)
Antiy-AVL GrayWare/Win32.Kryptik.ehls
Kingsoft Win32.Troj.Banker.(kcloud)
Microsoft Trojan:Win32/Gozi.PE!MTB
Gridinsoft Trojan.Win32.Kryptik.oa
Arcabit Trojan.Mint.Zamg.O
ZoneAlarm HEUR:Trojan-Banker.Win32.Gozi.pef
GData Trojan.Mint.Zamg.O
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Kryptik.C4170640
Acronis suspicious
ALYac Trojan.Mint.Zamg.O
VBA32 BScope.Trojan-Spy.Zbot
Malwarebytes Backdoor.Qbot
Panda Trj/Genetic.gen
ESET-NOD32 a variant of Win32/Kryptik.HFGZ
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 172.217.160.78:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2000-01-27 20:48:18

Imports

Library KERNEL32.dll:
0x43b534 CreateProcessW
0x43b538 OpenMutexW
0x43b53c GetFileAttributesW
0x43b540 CreateDirectoryW
0x43b544 CreateFileW
0x43b548 WaitNamedPipeW
0x43b54c WriteFile
0x43b550 GlobalAddAtomW
0x43b554 GlobalGetAtomNameW
0x43b558 GlobalDeleteAtom
0x43b560 FindFirstFileW
0x43b564 FindClose
0x43b568 FindNextFileW
0x43b56c CreateFileMappingW
0x43b570 GetFileSizeEx
0x43b574 MapViewOfFile
0x43b578 UnmapViewOfFile
0x43b57c WideCharToMultiByte
0x43b580 GetNativeSystemInfo
0x43b58c OutputDebugStringW
0x43b590 SetLastError
0x43b594 ReleaseMutex
0x43b598 CreateMutexW
0x43b5a4 ReadConsoleW
0x43b5a8 ReadFile
0x43b5ac SetEndOfFile
0x43b5b0 SetStdHandle
0x43b5b4 SetFilePointerEx
0x43b5b8 FlushFileBuffers
0x43b5c8 GetConsoleMode
0x43b5cc GetConsoleCP
0x43b5d0 LocalFree
0x43b5d8 GetStringTypeW
0x43b5dc GetCPInfo
0x43b5e0 GetOEMCP
0x43b5e4 GetACP
0x43b5e8 IsValidCodePage
0x43b5ec GetStartupInfoW
0x43b5f0 TlsFree
0x43b5f4 TlsSetValue
0x43b5f8 TlsGetValue
0x43b5fc TlsAlloc
0x43b600 TerminateProcess
0x43b608 RtlCaptureContext
0x43b60c HeapReAlloc
0x43b610 HeapSize
0x43b614 ExitProcess
0x43b618 GetCommandLineW
0x43b61c ExitThread
0x43b624 WriteConsoleW
0x43b628 GetModuleHandleExW
0x43b62c GetFileType
0x43b630 GetStdHandle
0x43b638 IsDebuggerPresent
0x43b63c LCMapStringW
0x43b640 EncodePointer
0x43b644 DecodePointer
0x43b650 InitializeSListHead
0x43b654 GetProcessHeap
0x43b658 HeapFree
0x43b65c HeapAlloc
0x43b660 GetModuleFileNameA
0x43b664 CreateProcessA
0x43b674 LocalAlloc
0x43b67c LoadLibraryExW
0x43b680 FindResourceW
0x43b684 LoadResource
0x43b688 SizeofResource
0x43b68c MultiByteToWideChar
0x43b694 SetThreadPriority
0x43b698 CreateThread
0x43b69c CreateEventW
0x43b6a0 GetCurrentProcessId
0x43b6a4 VirtualFree
0x43b6a8 VirtualAlloc
0x43b6ac lstrcmpW
0x43b6b4 WaitForSingleObject
0x43b6b8 GetCurrentThread
0x43b6c0 GetDateFormatW
0x43b6c4 GetTimeFormatW
0x43b6c8 OpenProcess
0x43b6cc Sleep
0x43b6d0 FreeLibrary
0x43b6d4 LoadLibraryW
0x43b6d8 GetTickCount
0x43b6dc CloseHandle
0x43b6e0 ResetEvent
0x43b6e4 SetEvent
0x43b6e8 OpenEventW
0x43b6f0 GetModuleFileNameW
0x43b6f4 GetLastError
0x43b6f8 GetVersionExW
0x43b700 lstrcpyW
0x43b704 lstrcatW
0x43b708 lstrcpynW
0x43b710 CompareStringW
0x43b714 lstrcmpiW
0x43b718 GetProcAddress
0x43b71c GetModuleHandleW
0x43b720 RaiseException
0x43b724 lstrlenW
0x43b728 MulDiv
0x43b734 GetCurrentThreadId
0x43b73c GetCurrentProcess
0x43b740 lstrcmpiA
0x43b744 ContinueDebugEvent
0x43b748 GetConsoleAliasW
0x43b74c ReplaceFile
0x43b750 WriteConsoleInputW
0x43b75c SetThreadLocale
0x43b760 SetTapeParameters
0x43b764 GetExitCodeProcess
0x43b76c EnumCalendarInfoExA
0x43b770 GetProfileSectionW
0x43b774 SetConsoleTitleA
0x43b77c GetCPInfoExW
0x43b780 OpenFileMappingW
0x43b784 SignalObjectAndWait
0x43b798 GetLocalTime
0x43b79c SetPriorityClass
0x43b7a0 BackupSeek
0x43b7a4 FindResourceExW
0x43b7a8 ReadFileEx
0x43b7ac ReplaceFileA
0x43b7b0 ResetWriteWatch
0x43b7b4 VirtualQuery
0x43b7b8 GetVolumePathNameA
0x43b7c8 GetConsoleTitleW
0x43b7cc GetStringTypeExW
0x43b7d0 GetCommMask
0x43b7d4 EnumDateFormatsExA
0x43b7d8 VirtualLock
0x43b7dc SetConsoleCP
0x43b7e0 GetDiskFreeSpaceW
0x43b7e4 LoadLibraryA
Library USER32.dll:
0x43b7ec TrackPopupMenu
0x43b7f0 GetForegroundWindow
0x43b7f4 DefWindowProcW
0x43b7f8 CallWindowProcW
0x43b7fc SetWindowPos
0x43b800 GetDlgItem
0x43b804 GetClientRect
0x43b808 GetWindow
0x43b80c GetWindowLongW
0x43b810 DialogBoxParamW
0x43b814 GetMenuItemInfoW
0x43b818 LoadIconW
0x43b81c PostQuitMessage
0x43b820 EnableMenuItem
0x43b824 MoveWindow
0x43b82c GetSysColorBrush
0x43b830 DrawFrameControl
0x43b834 DrawStateW
0x43b838 LoadStringW
0x43b83c DrawEdge
0x43b840 DestroyMenu
0x43b844 GetMenuDefaultItem
0x43b848 SetMenuDefaultItem
0x43b84c LoadMenuW
0x43b850 GetSubMenu
0x43b854 MonitorFromPoint
0x43b858 SetMenuItemInfoW
0x43b85c UnregisterClassW
0x43b860 RegisterClassExW
0x43b864 OpenInputDesktop
0x43b868 EnumDesktopWindows
0x43b86c CloseDesktop
0x43b870 IsIconic
0x43b874 GetPropW
0x43b878 GetLastInputInfo
0x43b87c GetMenuItemCount
0x43b880 CreateDialogParamW
0x43b884 PeekMessageW
0x43b888 GetMessageW
0x43b88c TranslateMessage
0x43b890 DispatchMessageW
0x43b898 EnumWindows
0x43b89c PostThreadMessageW
0x43b8a0 EqualRect
0x43b8a4 GetMonitorInfoW
0x43b8a8 MonitorFromRect
0x43b8ac MonitorFromWindow
0x43b8b0 GetWindowTextW
0x43b8b4 DrawTextW
0x43b8b8 GetDC
0x43b8bc ShowWindow
0x43b8c0 EnumDisplayMonitors
0x43b8c4 SetActiveWindow
0x43b8c8 SetForegroundWindow
0x43b8cc AdjustWindowRectEx
0x43b8d0 GetMenu
0x43b8d4 DrawFocusRect
0x43b8d8 GetFocus
0x43b8dc IsWindowEnabled
0x43b8e0 CharNextW
0x43b8e4 GetDlgCtrlID
0x43b8ec CreateWindowExW
0x43b8f0 LoadCursorW
0x43b8f4 SetWindowLongW
0x43b8f8 GetClassNameW
0x43b8fc GetCursorPos
0x43b900 ReleaseCapture
0x43b904 GetCapture
0x43b908 SetCapture
0x43b90c SetCursor
0x43b910 PtInRect
0x43b914 EndPaint
0x43b918 BeginPaint
0x43b91c DestroyWindow
0x43b920 IsWindow
0x43b924 GetSystemMetrics
0x43b928 GetDesktopWindow
0x43b92c GetWindowDC
0x43b934 LoadAcceleratorsW
0x43b93c SetTimer
0x43b940 KillTimer
0x43b944 EndDialog
0x43b948 DestroyIcon
0x43b94c SetWindowTextW
0x43b950 SetRectEmpty
0x43b954 GetSysColor
0x43b958 LoadBitmapW
0x43b95c DrawIconEx
0x43b960 SetFocus
0x43b964 UpdateWindow
0x43b968 ReleaseDC
0x43b970 FindWindowW
0x43b974 GetWindowRect
0x43b978 AdjustWindowRect
0x43b97c SetRect
0x43b980 IsDialogMessageW
0x43b984 PostMessageW
0x43b988 EnableWindow
0x43b98c IsWindowVisible
0x43b990 wsprintfW
0x43b994 ScreenToClient
0x43b998 ClientToScreen
0x43b99c GetParent
0x43b9a0 OffsetRect
0x43b9a4 CopyRect
0x43b9a8 SendMessageW
0x43b9ac GetIconInfo
0x43b9b0 FillRect
0x43b9b4 LoadImageW
0x43b9b8 InvalidateRect
0x43b9bc GetDoubleClickTime
0x43b9c0 AnyPopup
0x43b9c4 GetCaretBlinkTime
0x43b9c8 CreatePopupMenu
0x43b9cc GetKeyState
0x43b9d0 CloseClipboard
0x43b9d4 GetInputState
0x43b9d8 CreateMenu
0x43b9dc GetDialogBaseUnits
0x43b9e0 EndMenu
0x43b9e4 GetAsyncKeyState
0x43b9e8 GetCursor
0x43b9f0 GetKBCodePage
0x43b9f4 CharLowerW
0x43b9fc GetClipboardData
0x43ba00 GetActiveWindow
0x43ba04 GetListBoxInfo
0x43ba08 GetClipboardOwner
0x43ba0c CopyIcon
0x43ba10 DestroyCursor
0x43ba18 InSendMessage
0x43ba28 GetKeyboardType
0x43ba2c GetKeyboardLayout
0x43ba30 GetMessageTime
0x43ba34 GetLastActivePopup
0x43ba38 CharLowerA
0x43ba3c GetMessagePos
0x43ba40 CharUpperA
0x43ba44 CharUpperW
Library GDI32.dll:
0x43ba4c DeleteDC
0x43ba50 RestoreDC
0x43ba54 CreateRectRgn
0x43ba58 CombineRgn
0x43ba5c CreatePen
0x43ba60 SaveDC
0x43ba64 GetCurrentObject
0x43ba68 ExcludeClipRect
0x43ba6c Rectangle
0x43ba70 GetRegionData
0x43ba74 GetDeviceCaps
0x43ba7c GetTextColor
0x43ba80 CreateFontIndirectW
0x43ba84 SetViewportOrgEx
0x43ba88 CreateFontW
0x43ba8c ExtTextOutW
0x43ba90 SetBkColor
0x43ba94 SetTextColor
0x43ba98 SetBkMode
0x43ba9c GetBkMode
0x43baa0 CreateSolidBrush
0x43baa4 DeleteObject
0x43baa8 GetStockObject
0x43baac GetObjectW
0x43bab0 BitBlt
0x43bab4 CreateCompatibleDC
0x43babc SelectObject
0x43bac0 StretchBlt
0x43bac8 SelectClipRgn
0x43bad0 Polygon
0x43bad4 ExtFloodFill
0x43bad8 Pie
0x43badc GetFontAssocStatus
0x43bae0 GdiIsPlayMetafileDC
0x43bae4 GdiValidateHandle
0x43bae8 EngStrokePath
0x43baec FloodFill
0x43baf0 GdiEntry9
0x43baf4 GetKerningPairsA
0x43baf8 CreateDCA
0x43bafc GetTextFaceW
0x43bb00 GdiConvertPalette
0x43bb04 GdiEntry12
0x43bb08 EndPage
0x43bb0c CreateMetaFileW
0x43bb10 CreatePolygonRgn
0x43bb14 GetLogColorSpaceW
0x43bb18 STROBJ_vEnumStart
0x43bb1c CreateBitmap
0x43bb20 GetBoundsRect
0x43bb24 FrameRgn
0x43bb28 GetMapMode
0x43bb2c EngCreateSemaphore
0x43bb30 GdiProcessSetup
0x43bb34 GetRgnBox
0x43bb38 SetICMProfileW
0x43bb3c SetPixelFormat
0x43bb40 GetTextFaceA
0x43bb44 GdiIsMetaPrintDC
0x43bb48 ColorMatchToTarget
0x43bb4c SwapBuffers
0x43bb50 GetMetaFileA
0x43bb54 EngAcquireSemaphore
0x43bb58 GdiGradientFill
0x43bb5c SetDCPenColor
0x43bb68 GetHFONT
0x43bb6c WidenPath
0x43bb70 UpdateColors
0x43bb74 StrokePath
0x43bb78 SetMetaRgn
0x43bb7c GetEnhMetaFileA
Library ADVAPI32.dll:
0x43bb84 RegQueryInfoKeyW
0x43bb88 RegQueryValueExW
0x43bb8c RegOpenKeyExW
0x43bb90 RegCloseKey
0x43bb94 RegEnumValueW
0x43bb98 RegDeleteValueW
0x43bb9c RegSetValueExW
0x43bba0 RegDeleteKeyW
0x43bba4 RegCreateKeyExW
0x43bba8 RegEnumKeyExW
0x43bbb8 RegOpenKeyA
Library SHELL32.dll:
0x43bbc0 SHGetFileInfoW
0x43bbc4 ShellExecuteW
0x43bbc8 SHAppBarMessage
0x43bbcc Shell_NotifyIconW
0x43bbd0 SHGetFolderPathW
0x43bbd4 CommandLineToArgvW
0x43bbd8 ExtractIconExW
0x43bbdc SHGetFolderPathA
0x43bbe0 SHGetSettings
0x43bbe4 DragQueryFileA
0x43bbe8 SHFormatDrive
0x43bbf0 SHAddToRecentDocs
0x43bbf4 SHBrowseForFolder
0x43bbf8 SHGetPathFromIDList
0x43bc00 SHGetFileInfo
0x43bc08 ShellAboutW
0x43bc0c WOWShellExecute
0x43bc10 ExtractIconA
0x43bc14 SHLoadInProc
Library ole32.dll:
0x43bc1c CoTaskMemAlloc
0x43bc20 CoTaskMemRealloc
0x43bc24 CoInitializeEx
0x43bc2c CoUninitialize
0x43bc30 CoCreateInstance
0x43bc34 CoInitialize
0x43bc38 CoTaskMemFree
Library SHLWAPI.dll:
0x43bc40 PathAppendW
0x43bc44 PathRemoveFileSpecW
0x43bc48 PathAddBackslashW
0x43bc4c PathFileExistsW
0x43bc54 PathFindOnPathW
0x43bc58 PathIsRelativeW
0x43bc5c PathFindExtensionW
0x43bc60 PathRemoveArgsW
0x43bc64 PathGetArgsW
0x43bc68 StrRStrIA
0x43bc6c StrRChrIA
0x43bc70 StrRChrIW
0x43bc74 StrStrIA
Library COMCTL32.dll:
0x43bc7c ImageList_Destroy
0x43bc80 ImageList_Create
0x43bc84 ImageList_GetIcon
0x43bc88 ImageList_Merge
0x43bc90 ImageList_Draw
0x43bc98 ImageList_Remove
0x43bca4 _TrackMouseEvent

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 61680 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51379 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.