12.2
0-day

eca9894179ef698c8568b19123c1cea81607e5523804827c91fb12d228faf34a

56a3fc2f7ecaf2d6c390bfe94ed5c310.exe

分析耗时

88s

最近分析

文件大小

448.3KB
静态报毒 动态报毒 AGEN AI SCORE=100 AIDETECTVM APOST CM1@A4PR20AI CM1@J4PR20AI CONFIDENCE DANGEROUSSIG DKUS EEIG ELDORADO FALSESIGN FAREIT FAREITVB FOESLJ GENASA GENETIC GENKRYPTIK HIGH CONFIDENCE IS+XKUD93HI KUXF MALCERT MALICIOUS PE MALWARE1 MALWARE@#QU5ECGQNE3S5 PONIK PONYSTEALER R + MAL RP09 SCORE STATIC AI SUSGEN SWUT THCBOAI UNSAFE VBKRYPT X1977 ZEVBAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Fareit-FMW!56A3FC2F7ECA 20201206 6.0.6.653
Alibaba Trojan:Win32/Injector.2a57ac95 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:DangerousSig [Trj] 20201206 20.10.5736.0
Kingsoft 20201206 2017.9.26.565
Tencent Win32.Trojan.Falsesign.Swut 20201206 1.0.0.1
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
静态指标
Command line console output was observed (12 个事件)
Time & API Arguments Status Return Repeated
1619427448.270499
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1619427448.270499
WriteConsoleW
buffer: del
console_handle: 0x00000007
success 1 0
1619427448.286499
WriteConsoleW
buffer: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat"
console_handle: 0x00000007
success 1 0
1619427448.411499
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1619427448.427499
WriteConsoleW
buffer: if
console_handle: 0x00000007
success 1 0
1619427448.427499
WriteConsoleW
buffer: exist "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat"
console_handle: 0x00000007
success 1 0
1619427448.427499
WriteConsoleW
buffer: goto
console_handle: 0x00000007
success 1 0
1619427448.427499
WriteConsoleW
buffer: ktk
console_handle: 0x00000007
success 1 0
1619427448.458499
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1619427448.458499
WriteConsoleW
buffer: del
console_handle: 0x00000007
success 1 0
1619427448.473499
WriteConsoleW
buffer: "C:\Users\ADMINI~1.OSK\AppData\Local\Temp\24128562.bat"
console_handle: 0x00000007
success 1 0
1619427448.598499
WriteConsoleW
buffer: 找不到批处理文件。
console_handle: 0x0000000b
success 1 0
This executable is signed
Tries to locate where the browsers are installed (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1619426988.532408
GlobalMemoryStatusEx
success 1 0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:1040887260&cup2hreq=13422b4d889376951d2dffc15b6bf6ed4b6785de7c48cc437136004ce74f4a10
Performs some HTTP requests (5 个事件)
request HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
request HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m&mvi=1&pl=23&shardbypass=yes
request HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=637a0209bd92ce58&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m
request GET http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=637a0209bd92ce58&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m
request POST https://update.googleapis.com/service/update2?cup2key=10:1040887260&cup2hreq=13422b4d889376951d2dffc15b6bf6ed4b6785de7c48cc437136004ce74f4a10
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:1040887260&cup2hreq=13422b4d889376951d2dffc15b6bf6ed4b6785de7c48cc437136004ce74f4a10
Resolves a suspicious Top Level Domain (TLD) (1 个事件)
domain myp0nysite.ru description Russian Federation domain TLD
Allocates read-write-execute memory (usually to unpack itself) (10 个事件)
Time & API Arguments Status Return Repeated
1619426980.016408
NtAllocateVirtualMemory
process_identifier: 2868
region_size: 28672
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x024c0000
success 0 0
1619426985.126408
NtAllocateVirtualMemory
process_identifier: 2868
region_size: 67108864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x03700000
success 0 0
1619426985.719408
NtProtectVirtualMemory
process_identifier: 2868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 876544
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d40000
success 0 0
1619427479.317626
NtAllocateVirtualMemory
process_identifier: 1424
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0000000004020000
success 0 0
1619427417.646249
NtAllocateVirtualMemory
process_identifier: 2308
region_size: 28672
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x004a0000
success 0 0
1619427422.256249
NtAllocateVirtualMemory
process_identifier: 2308
region_size: 67108864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x034c0000
success 0 0
1619427423.271249
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 876544
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d40000
success 0 0
1619427423.724001
NtAllocateVirtualMemory
process_identifier: 1688
region_size: 28672
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003d0000
success 0 0
1619427434.334001
NtAllocateVirtualMemory
process_identifier: 1688
region_size: 67108864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x02630000
success 0 0
1619427435.209001
NtProtectVirtualMemory
process_identifier: 1688
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 876544
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d40000
success 0 0
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Steals private information from local Internet browsers (1 个事件)
registry HKEY_CURRENT_USER\Software\Opera Software
Drops a binary and executes it (2 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\24128562.bat
Drops an executable to the user AppData folder (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat
A process created a hidden window (3 个事件)
Time & API Arguments Status Return Repeated
1619426989.938408
ShellExecuteExW
parameters:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.vbs
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.vbs
show_type: 0
success 1 0
1619426990.126408
ShellExecuteExW
parameters:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat
show_type: 0
success 1 0
1619427447.584001
ShellExecuteExW
parameters: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat"
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\24128562.bat
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\24128562.bat
show_type: 0
success 1 0
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) (1 个事件)
Time & API Arguments Status Return Repeated
1619426978.501408
NtProtectVirtualMemory
process_identifier: 2868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 32 (PAGE_EXECUTE_READ)
process_handle: 0xffffffff
base_address: 0x02350000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.779516147219622 section {'size_of_data': '0x0006d000', 'virtual_address': '0x00001000', 'entropy': 7.779516147219622, 'name': '.text', 'virtual_size': '0x0006c164'} description A section with a high entropy has been found
entropy 0.990909090909091 description Overall entropy of this PE file is high
Checks for the Locally Unique Identifier on the system for a suspicious privilege (20 个事件)
Time & API Arguments Status Return Repeated
1619427435.990001
LookupPrivilegeValueW
system_name:
privilege_name: SeTcbPrivilege
success 1 0
1619427435.990001
LookupPrivilegeValueW
system_name:
privilege_name: SeCreateTokenPrivilege
success 1 0
1619427436.006001
LookupPrivilegeValueW
system_name:
privilege_name: SeBackupPrivilege
success 1 0
1619427436.006001
LookupPrivilegeValueW
system_name:
privilege_name: SeRestorePrivilege
success 1 0
1619427436.006001
LookupPrivilegeValueW
system_name:
privilege_name: SeAssignPrimaryTokenPrivilege
success 1 0
1619427446.162001
LookupPrivilegeValueW
system_name:
privilege_name: SeTcbPrivilege
success 1 0
1619427446.162001
LookupPrivilegeValueW
system_name:
privilege_name: SeCreateTokenPrivilege
success 1 0
1619427446.162001
LookupPrivilegeValueW
system_name:
privilege_name: SeBackupPrivilege
success 1 0
1619427446.162001
LookupPrivilegeValueW
system_name:
privilege_name: SeRestorePrivilege
success 1 0
1619427446.162001
LookupPrivilegeValueW
system_name:
privilege_name: SeAssignPrimaryTokenPrivilege
success 1 0
1619427446.646001
LookupPrivilegeValueW
system_name:
privilege_name: SeTcbPrivilege
success 1 0
1619427446.646001
LookupPrivilegeValueW
system_name:
privilege_name: SeCreateTokenPrivilege
success 1 0
1619427446.646001
LookupPrivilegeValueW
system_name:
privilege_name: SeBackupPrivilege
success 1 0
1619427446.646001
LookupPrivilegeValueW
system_name:
privilege_name: SeRestorePrivilege
success 1 0
1619427446.646001
LookupPrivilegeValueW
system_name:
privilege_name: SeAssignPrimaryTokenPrivilege
success 1 0
1619427447.240001
LookupPrivilegeValueW
system_name:
privilege_name: SeTcbPrivilege
success 1 0
1619427447.240001
LookupPrivilegeValueW
system_name:
privilege_name: SeCreateTokenPrivilege
success 1 0
1619427447.240001
LookupPrivilegeValueW
system_name:
privilege_name: SeBackupPrivilege
success 1 0
1619427447.240001
LookupPrivilegeValueW
system_name:
privilege_name: SeRestorePrivilege
success 1 0
1619427447.240001
LookupPrivilegeValueW
system_name:
privilege_name: SeAssignPrimaryTokenPrivilege
success 1 0
Queries for potentially installed applications (36 个事件)
Time & API Arguments Status Return Repeated
1619427436.006001
RegOpenKeyExA
access: 0x02000000
base_handle: 0x80000002
key_handle: 0x0000015c
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
options: 0
success 0 0
1619427436.006001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
options: 0
success 0 0
1619427436.006001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
options: 0
success 0 0
1619427436.006001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
options: 0
success 0 0
1619427436.006001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
options: 0
success 0 0
1619427436.021001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
options: 0
success 0 0
1619427436.021001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
options: 0
success 0 0
1619427436.021001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
options: 0
success 0 0
1619427436.021001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
options: 0
success 0 0
1619427436.021001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
options: 0
success 0 0
1619427436.021001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
options: 0
success 0 0
1619427436.021001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
options: 0
success 0 0
1619427436.021001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
options: 0
success 0 0
1619427436.037001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
options: 0
success 0 0
1619427436.053001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
options: 0
success 0 0
1619427436.053001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
options: 0
success 0 0
1619427436.053001
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
options: 0
success 0 0
1619427436.053001
RegOpenKeyExA
access: 0x00020219
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
options: 0
success 0 0
1619427436.053001
RegOpenKeyExA
access: 0x00020119
base_handle: 0x80000002
key_handle: 0x00000160
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
options: 0
success 0 0
Uses Windows utilities for basic Windows functionality (1 个事件)
cmdline C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\24128562.bat "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat"
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Installs itself for autorun at Windows startup (1 个事件)
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Registry Key Name reg_value C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.vbs -ax
Deletes executed files from disk (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\subfolder\filename.bat
Harvests credentials from local FTP client softwares (50 out of 56 个事件)
registry HKEY_CURRENT_USER\Software\Far Manager\Plugins\FTP\Hosts
registry HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
registry HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
registry HKEY_CURRENT_USER\Software\Far\SavedDialogHistory\FTPHost
registry HKEY_CURRENT_USER\Software\Far2\SavedDialogHistory\FTPHost
registry HKEY_CURRENT_USER\Software\Far Manager\SavedDialogHistory\FTPHost
registry HKEY_LOCAL_MACHINE\SOFTWARE\Robo-FTP 3.7\FTPServers
registry HKEY_CURRENT_USER\SOFTWARE\Robo-FTP 3.7\FTPServers
registry HKEY_LOCAL_MACHINE\Software\Ghisler\Windows Commander
registry HKEY_CURRENT_USER\Software\Ghisler\Windows Commander
registry HKEY_CURRENT_USER\Software\Ghisler\Total Commander
registry HKEY_LOCAL_MACHINE\Software\Ghisler\Total Commander
registry HKEY_CURRENT_USER\Software\BPFTP\Bullet Proof FTP\Options
registry HKEY_CURRENT_USER\Software\BPFTP\Bullet Proof FTP\Main
registry HKEY_CURRENT_USER\Software\BulletProof Software\BulletProof FTP Client\Options
registry HKEY_CURRENT_USER\Software\BulletProof Software\BulletProof FTP Client\Main
registry HKEY_CURRENT_USER\Software\FTP Explorer\Profiles
registry HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
registry HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
registry HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
registry HKEY_CURRENT_USER\Software\VanDyke\SecureFX
registry HKEY_CURRENT_USER\Software\South River Technologies\WebDrive\Connections
registry HKEY_LOCAL_MACHINE\Software\South River Technologies\WebDrive\Connections
registry HKEY_CURRENT_USER\Software\LinasFTP\Site Manager
registry HKEY_LOCAL_MACHINE\Software\SoftX.org\FTPClient\Sites
registry HKEY_CURRENT_USER\Software\SoftX.org\FTPClient\Sites
registry HKEY_CURRENT_USER\Software\Sota\FFFTP\Options
registry HKEY_CURRENT_USER\Software\Sota\FFFTP
registry HKEY_CURRENT_USER\Software\LeechFTP
registry HKEY_CURRENT_USER\Software\CoffeeCup Software\Internet\Profiles
registry HKEY_CURRENT_USER\Software\CoffeeCup Software
registry HKEY_LOCAL_MACHINE\Software\CoffeeCup Software
registry HKEY_LOCAL_MACHINE\Software\FlashFXP\3
registry HKEY_LOCAL_MACHINE\Software\FlashFXP\4
registry HKEY_CURRENT_USER\Software\FlashFXP
registry HKEY_CURRENT_USER\Software\FlashFXP\3
registry HKEY_CURRENT_USER\Software\FlashFXP\4
registry HKEY_LOCAL_MACHINE\Software\FlashFXP
registry HKEY_CURRENT_USER\Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
registry HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
registry HKEY_LOCAL_MACHINE\SOFTWARE\LeapWare
registry HKEY_CURRENT_USER\SOFTWARE\LeapWare
registry HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions
registry HKEY_LOCAL_MACHINE\Software\SimonTatham\PuTTY\Sessions
registry HKEY_CURRENT_USER\Software\Cryer\WebSitePublisher
registry HKEY_CURRENT_USER\Software\ExpanDrive\Sessions
registry HKEY_CURRENT_USER\Software\ExpanDrive
registry HKEY_CURRENT_USER\Software\Martin Prikryl
registry HKEY_LOCAL_MACHINE\Software\Martin Prikryl
registry HKEY_CURRENT_USER\Software\AceBIT
Collects information about installed applications (1 个事件)
Time & API Arguments Status Return Repeated
1619427436.037001
RegQueryValueExA
key_handle: 0x00000160
value: Google Chrome
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
success 0 0
Harvests credentials from local email clients (7 个事件)
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts
registry HKEY_CURRENT_USER\Software\Microsoft\Windows Mail\Salt
registry HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
registry HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
registry HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
registry HKEY_LOCAL_MACHINE\Software\RimArts\B2\Settings
registry HKEY_CURRENT_USER\Software\Poco Systems Inc
The process wscript.exe wrote an executable file to disk (1 个事件)
file C:\Windows\SysWOW64\wscript.exe
File has been identified by 58 AntiVirus engines on VirusTotal as malicious (50 out of 58 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
ClamAV Win.Dropper.Kuxf-6900133-0
McAfee Fareit-FMW!56A3FC2F7ECA
Cylance Unsafe
Zillya Trojan.APosT.Win32.621
Sangfor Malware
K7AntiVirus Trojan ( 0054a1251 )
Alibaba Trojan:Win32/Injector.2a57ac95
K7GW Trojan ( 0054a1251 )
Cybereason malicious.f7ecaf
Cyren W32/VBInject.TK.gen!Eldorado
Symantec Downloader.Ponik
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 90)
Kaspersky Trojan.Win32.APosT.fkz
BitDefender Gen:Heur.PonyStealer.Cm1@j4pr20ai
NANO-Antivirus Trojan.Win32.APosT.foeslj
MicroWorld-eScan Gen:Heur.PonyStealer.Cm1@j4pr20ai
Avast Win32:DangerousSig [Trj]
Ad-Aware Gen:Heur.PonyStealer.Cm1@j4pr20ai
Emsisoft Gen:Heur.PonyStealer.Cm1@j4pr20ai (B)
Comodo Malware@#qu5ecgqne3s5
F-Secure Heuristic.HEUR/AGEN.1119971
DrWeb Trojan.PWS.Stealer.1932
VIPRE Trojan.Win32.Generic!BT
TrendMicro TrojanSpy.Win32.FAREIT.THCBOAI
McAfee-GW-Edition Fareit-FMW!56A3FC2F7ECA
FireEye Generic.mg.56a3fc2f7ecaf2d6
Sophos Mal/Generic-R + Mal/FareitVB-V
Ikarus Trojan.Crypt.Malcert
GData Gen:Heur.PonyStealer.Cm1@j4pr20ai
Jiangmin Trojan.APosT.aji
MaxSecure Trojan.Malware.74225732.susgen
Avira HEUR/AGEN.1119971
Antiy-AVL Trojan/Win32.APosT
Arcabit Trojan.PonyStealer.EA107F
AegisLab Trojan.Win32.APosT.4!c
ZoneAlarm Trojan.Win32.APosT.fkz
Microsoft VirTool:Win32/VBInject.ADB!bit
AhnLab-V3 Win-Trojan/VBKrypt.RP09.X1977
BitDefenderTheta Gen:NN.ZevbaF.34670.Cm1@a4pr20ai
ALYac Gen:Heur.PonyStealer.Cm1@j4pr20ai
MAX malware (ai score=100)
Malwarebytes Trojan.MalPack.VB.Generic
ESET-NOD32 a variant of Win32/Injector.EEIG
TrendMicro-HouseCall TrojanSpy.Win32.FAREIT.THCBOAI
Tencent Win32.Trojan.Falsesign.Swut
Yandex Trojan.GenAsa!IS+XKud93hI
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2010-10-21 20:40:26

Imports

Library MSVBVM60.DLL:
0x401000
0x401004 MethCallEngine
0x401008
0x40100c
0x401010 EVENT_SINK_AddRef
0x401014
0x401018
0x40101c EVENT_SINK_Release
0x401024 __vbaExceptHandler
0x401028
0x40102c
0x401030
0x401034

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
113.108.239.196 80 192.168.56.101 49191
192.168.56.101 49190 113.108.239.194 r1---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49189 203.208.41.65 redirector.gvt1.com 80
192.168.56.101 49188 203.208.41.98 update.googleapis.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702

HTTP & HTTPS Requests

URI Data
http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: redirector.gvt1.com

http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m&mvi=1&pl=23&shardbypass=yes
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m&mvi=1&pl=23&shardbypass=yes HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r1---sn-j5o7dn7e.gvt1.com

http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=637a0209bd92ce58&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m
GET /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=637a0209bd92ce58&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Tue, 13 Apr 2021 03:03:58 GMT
Range: bytes=0-6733
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r3---sn-j5o7dn7e.gvt1.com

http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=637a0209bd92ce58&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=637a0209bd92ce58&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619398336&mv=m HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r3---sn-j5o7dn7e.gvt1.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.