5.6
高危

b2d2229ec41c9a51bc9512eb0447c1ca721cac2d460962ba0dd993b1d64f0f7e

720b1d39c69eb4ffbfcf79e69b0a8547.exe

分析耗时

94s

最近分析

文件大小

11.8MB
静态报毒 动态报毒 ARTEMIS BTCMINE CLOUD ELDORADO ERAUEJ FILEREPMETAGEN GENERIC PUA LD KEYLOGGERGER P8EO5K PATCHEDCRTD R002H07L420 SCORE UNSAFE VRBROTHERS 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!720B1D39C69E 20210422 6.0.6.653
Baidu 20190318 1.0.0.2
Avast FileRepMetagen [Adw] 20210422 21.1.5827.0
Alibaba AdWare:Win32/Generic.48fe33c4 20190527 0.3.0.5
Kingsoft 20210422 2017.9.26.565
Tencent 20210422 1.0.0.1
CrowdStrike 20210203 1.0
行为判定
动态指标
Performs some HTTP requests (2 个事件)
request GET http://soft.anjian.com/Interface/DefaultIndexSetting/?AjaxAction=Ajax_GetSetting&SettingKey=AnJian
request GET http://soft.anjian.com/Interface/SoftInstall.aspx?AjaxAction=SoftInstalling
Allocates read-write-execute memory (usually to unpack itself) (4 个事件)
Time & API Arguments Status Return Repeated
1620777444.7055
NtProtectVirtualMemory
process_identifier: 2196
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
1620777444.7055
NtProtectVirtualMemory
process_identifier: 2196
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 90112
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00401000
success 0 0
1620777444.7055
NtProtectVirtualMemory
process_identifier: 2196
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 61440
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00420000
success 0 0
1620777445.409125
NtAllocateVirtualMemory
process_identifier: 2008
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00580000
success 0 0
Creates executable files on the filesystem (2 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-OR0NP.tmp\_isetup\_shfoldr.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-OR0NP.tmp\webctrl.dll
Drops an executable to the user AppData folder (3 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-OR0NP.tmp\_isetup\_shfoldr.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-4NBDB.tmp\720b1d39c69eb4ffbfcf79e69b0a8547.tmp
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-OR0NP.tmp\webctrl.dll
Queries for potentially installed applications (2 个事件)
Time & API Arguments Status Return Repeated
1620777448.878125
RegOpenKeyExW
access: 0x00000001
base_handle: 0x80000001
key_handle: 0x00000000
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\按键精灵9_is1
regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\按键精灵9_is1
options: 0
failed 2 0
1620777448.878125
RegOpenKeyExW
access: 0x00000001
base_handle: 0x80000002
key_handle: 0x00000000
regkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\按键精灵9_is1
regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\按键精灵9_is1
options: 0
failed 2 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 23 AntiVirus engines on VirusTotal as malicious (23 个事件)
McAfee Artemis!720B1D39C69E
Cylance Unsafe
Cyren W32/Keylogger.AB.gen!Eldorado
ESET-NOD32 a variant of Win32/Adware.VrBrothers.AI potentially unwanted
Avast FileRepMetagen [Adw]
ClamAV Win.Trojan.Agent-6326929-0
Alibaba AdWare:Win32/Generic.48fe33c4
NANO-Antivirus Trojan.Win32.KeyLogger.erauej
Paloalto generic.ml
Rising Adware.VrBrothers!8.208 (CLOUD)
DrWeb Trojan.BtcMine.3151
Zillya Trojan.PatchedCRTD.Win32.10990
McAfee-GW-Edition Artemis
Sophos Generic PUA LD (PUA)
Gridinsoft Adware.Gen.vl!c
GData Win32.Trojan.Agent.P8EO5K
VBA32 Trojan.Keyloggerger
Malwarebytes Adware.VRBrothers
TrendMicro-HouseCall TROJ_GEN.R002H07L420
Ikarus Trojan.Dropper
eGambit Unsafe.AI_Score_99%
Fortinet Riskware/VrBrothers
AVG FileRepMetagen [Adw]
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 172.217.160.110:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2012-10-02 13:04:04

Imports

Library oleaut32.dll:
0x41e350 SysFreeString
0x41e354 SysReAllocStringLen
0x41e358 SysAllocStringLen
Library advapi32.dll:
0x41e360 RegQueryValueExW
0x41e364 RegOpenKeyExW
0x41e368 RegCloseKey
Library user32.dll:
0x41e370 GetKeyboardType
0x41e374 LoadStringW
0x41e378 MessageBoxA
0x41e37c CharNextW
Library kernel32.dll:
0x41e384 GetACP
0x41e388 Sleep
0x41e38c VirtualFree
0x41e390 VirtualAlloc
0x41e394 GetSystemInfo
0x41e398 GetTickCount
0x41e3a0 GetVersion
0x41e3a4 GetCurrentThreadId
0x41e3a8 VirtualQuery
0x41e3ac WideCharToMultiByte
0x41e3b0 MultiByteToWideChar
0x41e3b4 lstrlenW
0x41e3b8 lstrcpynW
0x41e3bc LoadLibraryExW
0x41e3c0 GetThreadLocale
0x41e3c4 GetStartupInfoA
0x41e3c8 GetProcAddress
0x41e3cc GetModuleHandleW
0x41e3d0 GetModuleFileNameW
0x41e3d4 GetLocaleInfoW
0x41e3d8 GetCommandLineW
0x41e3dc FreeLibrary
0x41e3e0 FindFirstFileW
0x41e3e4 FindClose
0x41e3e8 ExitProcess
0x41e3ec WriteFile
0x41e3f4 RtlUnwind
0x41e3f8 RaiseException
0x41e3fc GetStdHandle
0x41e400 CloseHandle
Library kernel32.dll:
0x41e408 TlsSetValue
0x41e40c TlsGetValue
0x41e410 LocalAlloc
0x41e414 GetModuleHandleW
Library user32.dll:
0x41e41c CreateWindowExW
0x41e420 TranslateMessage
0x41e424 SetWindowLongW
0x41e428 PeekMessageW
0x41e430 MessageBoxW
0x41e434 LoadStringW
0x41e438 GetSystemMetrics
0x41e43c ExitWindowsEx
0x41e440 DispatchMessageW
0x41e444 DestroyWindow
0x41e448 CharUpperBuffW
0x41e44c CallWindowProcW
Library kernel32.dll:
0x41e454 WriteFile
0x41e458 WideCharToMultiByte
0x41e45c WaitForSingleObject
0x41e460 VirtualQuery
0x41e464 VirtualProtect
0x41e468 VirtualFree
0x41e46c VirtualAlloc
0x41e470 SizeofResource
0x41e474 SignalObjectAndWait
0x41e478 SetLastError
0x41e47c SetFilePointer
0x41e480 SetEvent
0x41e484 SetErrorMode
0x41e488 SetEndOfFile
0x41e48c ResetEvent
0x41e490 RemoveDirectoryW
0x41e494 ReadFile
0x41e498 MultiByteToWideChar
0x41e49c LockResource
0x41e4a0 LoadResource
0x41e4a4 LoadLibraryW
0x41e4b4 GetVersionExW
0x41e4bc GetThreadLocale
0x41e4c0 GetSystemInfo
0x41e4c4 GetStdHandle
0x41e4c8 GetProcAddress
0x41e4cc GetModuleHandleW
0x41e4d0 GetModuleFileNameW
0x41e4d4 GetLocaleInfoW
0x41e4d8 GetLocalTime
0x41e4dc GetLastError
0x41e4e0 GetFullPathNameW
0x41e4e4 GetFileSize
0x41e4e8 GetFileAttributesW
0x41e4ec GetExitCodeProcess
0x41e4f4 GetDiskFreeSpaceW
0x41e4f8 GetDateFormatW
0x41e4fc GetCurrentProcess
0x41e500 GetCommandLineW
0x41e504 GetCPInfo
0x41e508 InterlockedExchange
0x41e510 FreeLibrary
0x41e514 FormatMessageW
0x41e518 FindResourceW
0x41e51c EnumCalendarInfoW
0x41e524 DeleteFileW
0x41e52c CreateProcessW
0x41e530 CreateFileW
0x41e534 CreateEventW
0x41e538 CreateDirectoryW
0x41e53c CompareStringW
0x41e540 CloseHandle
Library advapi32.dll:
0x41e548 RegQueryValueExW
0x41e54c RegOpenKeyExW
0x41e550 RegCloseKey
0x41e554 OpenProcessToken
Library comctl32.dll:
0x41e560 InitCommonControls
Library kernel32.dll:
0x41e568 Sleep
Library advapi32.dll:
Library oleaut32.dll:
0x41e578 SafeArrayPtrOfIndex
0x41e57c SafeArrayGetUBound
0x41e580 SafeArrayGetLBound
0x41e584 SafeArrayCreate
0x41e588 VariantChangeType
0x41e58c VariantCopy
0x41e590 VariantClear
0x41e594 VariantInit

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49179 117.27.139.134 soft.anjian.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 58367 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 60384 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62912 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900

HTTP & HTTPS Requests

URI Data
http://soft.anjian.com/Interface/SoftInstall.aspx?AjaxAction=SoftInstalling
GET /Interface/SoftInstall.aspx?AjaxAction=SoftInstalling HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: soft.anjian.com

http://soft.anjian.com/Interface/DefaultIndexSetting/?AjaxAction=Ajax_GetSetting&SettingKey=AnJian
GET /Interface/DefaultIndexSetting/?AjaxAction=Ajax_GetSetting&SettingKey=AnJian HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: soft.anjian.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.