3.4
中危

6021c7a5cb5c31336bd3ae302f87ba025e644f6a6897c1670bc6718d9b8e146b

633652ba89c1d81b6b4661f45850b714.exe

分析耗时

86s

最近分析

文件大小

2.1MB
静态报毒 动态报毒
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
未检测 暂无反病毒引擎检测结果
行为判定
动态指标
Foreign language identified in PE resource (10 个事件)
name RT_CURSOR language LANG_CHINESE offset 0x00196c64 filetype Hitachi SH big-endian COFF object file, not stripped, 0 section, symbol offset=0x20000000, 1073741824 symbols, optional header size 256 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000010ac
name RT_CURSOR language LANG_CHINESE offset 0x00196c64 filetype Hitachi SH big-endian COFF object file, not stripped, 0 section, symbol offset=0x20000000, 1073741824 symbols, optional header size 256 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000010ac
name RT_ICON language LANG_CHINESE offset 0x001a0518 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x001a0518 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x001a0518 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x00267688 filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x00267688 filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_GROUP_ICON language LANG_CHINESE offset 0x0026769c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000030
name RT_MANIFEST language LANG_CHINESE offset 0x00268188 filetype XML 1.0 document, ASCII text, with CRLF line terminators sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000352
name RT_MANIFEST language LANG_CHINESE offset 0x00268188 filetype XML 1.0 document, ASCII text, with CRLF line terminators sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000352
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.766317094491493 section {'size_of_data': '0x000e9600', 'virtual_address': '0x0017f000', 'entropy': 7.766317094491493, 'name': '.rsrc', 'virtual_size': '0x000e94dc'} description A section with a high entropy has been found
entropy 0.4283092452397339 description Overall entropy of this PE file is high
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2019-05-13 14:43:12

Imports

Library rtl120.bpl:
0x556400 @System@@New$qqripv
0x556508 @System@@Halt0$qqrv
0x5565c0 @System@@SetEq$qqrv
0x5565f0 @System@@TRUNC$qqrv
0x5565f4 @System@@ROUND$qqrv
0x5565f8 @System@Ln$qqrxg
0x5565fc @System@Exp$qqrxg
0x556600 @System@UpCase$qqrb
0x556630 @System@DebugHook
0x556644 @$xp$9IDispatch
0x556650 @System@TObject@
0x556668 @$xp$6Single
0x55666c @$xp$5Int64
0x556670 @$xp$8Cardinal
0x556674 @$xp$11System@Word
0x556678 @$xp$11System@Byte
0x55667c @$xp$7Integer
0x556680 @$xp$8AnsiChar
0x556684 @$xp$7Boolean
Library kernel32.dll:
0x55668c TlsSetValue
0x556690 TlsGetValue
0x556694 LocalAlloc
0x556698 GetModuleHandleW
Library madExcept_.bpl:
Library user32.dll:
0x5566b4 UpdateLayeredWindow
0x5566b8 UpdateWindow
0x5566bc UnhookWindowsHookEx
0x5566c4 SetWindowRgn
0x5566c8 SetWindowsHookExW
0x5566cc SetWindowPos
0x5566d0 SetWindowLongW
0x5566d4 SetTimer
0x5566d8 SetScrollInfo
0x5566dc SetRect
0x5566e0 SetPropW
0x5566e4 SetForegroundWindow
0x5566e8 SetClassLongW
0x5566ec SendMessageW
0x5566f0 RemovePropW
0x5566f4 ReleaseDC
0x5566f8 ReleaseCapture
0x556700 RedrawWindow
0x556704 PostMessageW
0x556708 OemToCharA
0x55670c MessageBoxW
0x556710 MapWindowPoints
0x556714 LockWindowUpdate
0x556718 LoadCursorW
0x55671c KillTimer
0x556720 IsWindowVisible
0x556724 IsIconic
0x556728 InvalidateRect
0x55672c InflateRect
0x556730 GetWindowRect
0x556734 GetWindowPlacement
0x556738 GetWindowLongW
0x55673c GetWindowDC
0x556740 GetSystemMetrics
0x556744 GetSysColor
0x556748 GetScrollRange
0x55674c GetScrollPos
0x556750 GetScrollInfo
0x556754 GetKeyState
0x556758 GetIconInfo
0x55675c GetDC
0x556760 GetCursorPos
0x556764 GetCursor
0x556768 GetClientRect
0x55676c GetClassNameW
0x556770 GetClassLongW
0x556774 GetCapture
0x556778 FrameRect
0x55677c FindWindowW
0x556780 FillRect
0x556784 EndPaint
0x556788 DrawTextExW
0x55678c DrawTextW
0x556790 DrawFrameControl
0x556794 DestroyWindow
0x556798 CallWindowProcW
0x55679c CallNextHookEx
0x5567a0 BeginPaint
Library msimg32.dll:
0x5567a8 TransparentBlt
0x5567ac AlphaBlend
Library gdi32.dll:
0x5567b4 StretchDIBits
0x5567b8 StretchBlt
0x5567bc SetViewportOrgEx
0x5567c0 SetTextColor
0x5567c4 SetStretchBltMode
0x5567c8 SetBkMode
0x5567cc SetBkColor
0x5567d0 SetBitmapBits
0x5567d4 SelectPalette
0x5567d8 SelectObject
0x5567dc SelectClipRgn
0x5567e0 SaveDC
0x5567e4 RestoreDC
0x5567e8 ResizePalette
0x5567ec RealizePalette
0x5567f0 IntersectClipRect
0x5567f4 GetViewportOrgEx
0x5567f8 GetTextMetricsW
0x556800 GetStockObject
0x556804 GetPaletteEntries
0x556808 GetObjectType
0x55680c GetObjectA
0x556810 GetObjectW
0x556818 GetDeviceCaps
0x55681c GetDIBits
0x556820 GetCurrentObject
0x556824 GetClipBox
0x556828 GetBitmapBits
0x55682c ExcludeClipRect
0x556830 DeleteObject
0x556834 DeleteDC
0x556838 CreateSolidBrush
0x55683c CreateRoundRectRgn
0x556840 CreateRectRgn
0x556844 CreatePalette
0x55684c CreateFontIndirectW
0x556850 CreateDIBSection
0x556854 CreateCompatibleDC
0x55685c BitBlt
Library version.dll:
0x556864 VerQueryValueW
0x55686c GetFileVersionInfoW
Library kernel32.dll:
0x556874 lstrcmpW
0x556878 WriteProcessMemory
0x556880 WinExec
0x556884 VirtualProtect
0x556888 TerminateProcess
0x55688c Sleep
0x556890 SetLastError
0x556894 ReadProcessMemory
0x556898 ReadFile
0x55689c RaiseException
0x5568a8 OutputDebugStringW
0x5568ac MulDiv
0x5568b0 MoveFileExW
0x5568b4 LoadLibraryW
0x5568bc IsBadWritePtr
0x5568c0 IsBadReadPtr
0x5568c4 IsBadCodePtr
0x5568cc HeapFree
0x5568d0 HeapDestroy
0x5568d4 HeapCreate
0x5568d8 HeapAlloc
0x5568dc GlobalUnlock
0x5568e0 GlobalLock
0x5568e4 GlobalFree
0x5568e8 GlobalFindAtomW
0x5568ec GlobalAlloc
0x5568f4 GetVersionExW
0x5568fc GetTickCount
0x556900 GetTempPathW
0x556904 GetTempFileNameW
0x556908 GetSystemInfo
0x55690c GetSystemDirectoryW
0x556918 GetShortPathNameW
0x55691c GetProcAddress
0x556924 GetModuleHandleW
0x556928 GetLocaleInfoA
0x55692c GetLocaleInfoW
0x556930 GetLastError
0x556934 GetFileSize
0x55693c GetCurrentThreadId
0x556940 GetCurrentProcess
0x556944 GetComputerNameW
0x556950 InterlockedExchange
0x55695c FreeLibrary
0x556964 FindFirstFileW
0x556968 FindClose
0x55697c CreateProcessW
0x556980 CreatePipe
0x556984 CreateMutexW
0x556988 CreateFileW
0x55698c CompareStringW
0x556990 CloseHandle
Library advapi32.dll:
0x556998 GetUserNameW
Library madBasic_.bpl:
Library madBasic_.bpl:
Library madExcept_.bpl:
Library madDisAsm_.bpl:
Library madExcept_.bpl:
Library shell32.dll:
0x556a08 ShellExecuteExW
0x556a0c ShellExecuteW
0x556a10 SHGetFileInfoW
Library shell32.dll:
Library rtl120.bpl:
0x556a20 @$xp$12IEnumVARIANT
Library ole32.dll:
0x556a2c CoCreateInstance
0x556a30 CoInitialize
Library wininet.dll:

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 62912 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 60384 224.0.0.252 5355
192.168.56.101 61680 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.