0.9
低危

27568770dce79dda54ba9ce39101d81cfd4237c4659cdb34de2b7db9ea04048c

27568770dce79dda54ba9ce39101d81cfd4237c4659cdb34de2b7db9ea04048c.exe

分析耗时

199s

最近分析

354天前

文件大小

13.5MB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM GENERICKD
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.87
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Worm:Win32/Small.61027488 20190527 0.3.0.5
Avast Win32:SillyP2P-X [Wrm] 20200407 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200408 2013.8.14.323
McAfee W32/Xiquitir.ow!p2p 20200408 6.0.6.653
Tencent Malware.Win32.Gencirc.10b5830a 20200408 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 58 个反病毒引擎识别为恶意 (50 out of 58 个事件)
ALYac Trojan.GenericKD.32239357
APEX Malicious
AVG Win32:SillyP2P-X [Wrm]
Acronis suspicious
Ad-Aware Trojan.GenericKD.32239357
AhnLab-V3 Worm/Win32.Small.R296137
Alibaba Worm:Win32/Small.61027488
Antiy-AVL Worm/Win32.Agent.a
Arcabit Trojan.Generic.D1EBEEFD
Avast Win32:SillyP2P-X [Wrm]
Avira TR/Dropper.Gen
BitDefender Trojan.GenericKD.32239357
Bkav W32.AIDetectVM.malware
CMC P2P-Worm.Win32.Small!O
ClamAV Win.Worm.Sillyp2p-7194313-0
Comodo Worm.Win32.Agent.NIQ@8hjo1v
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.2f5a4d
Cylance Unsafe
Cyren W32/P2P_Worm.NXSZ-6858
DrWeb Win32.HLLW.Xiquit
ESET-NOD32 a variant of Win32/Agent.NIQ
Emsisoft Trojan.GenericKD.32239357 (B)
Endgame malicious (high confidence)
F-Prot W32/SillyP2P.AP
F-Secure Trojan.TR/Dropper.Gen
FireEye Generic.mg.73fe9b92f5a4d45f
Fortinet W32/Agent.NIQ!worm
GData Trojan.GenericKD.32239357
Ikarus P2P-Worm.Win32.Small.p
Invincea heuristic
Jiangmin Worm.Small.q
K7AntiVirus EmailWorm ( 004df05b1 )
K7GW EmailWorm ( 004df05b1 )
Kaspersky P2P-Worm.Win32.Small.p
MAX malware (ai score=81)
Malwarebytes Worm.Small
MaxSecure Trojan.Malware.121218.susgen
McAfee W32/Xiquitir.ow!p2p
McAfee-GW-Edition W32/Xiquitir.ow!p2p
MicroWorld-eScan Trojan.GenericKD.32239357
Microsoft Worm:Win32/Small.P
NANO-Antivirus Trojan.Win32.Small.fsvyjs
Qihoo-360 Worm.Win32.Small.B
Rising Worm.Agent!1.9D8A (RDMK:cmRtazqRXesdCJDJ3uCRAkR4zoRx)
Sangfor Malware
SentinelOne DFI - Suspicious PE
Sophos Troj/Agent-BCMZ
TACHYON Worm/W32.SillyP2P.Zen
Tencent Malware.Win32.Gencirc.10b5830a
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2004-02-13 06:20:39

PE Imphash

27f21db1a40f044cb2ea9aa7f88716f6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00005b50 0x00006000 6.363900829399006
.rdata 0x00007000 0x000009ac 0x00001000 4.014497177343175
.data 0x00008000 0x00003438 0x00002000 3.5302228036323755
.rsrc 0x0000c000 0x00000ab0 0x00001000 0.0

Imports

Library KERNEL32.dll:
0x407010 FindClose
0x407014 FindNextFileA
0x407018 GetModuleHandleA
0x40701c GetStringTypeW
0x407020 GetStringTypeA
0x407024 GetModuleFileNameA
0x40702c FindFirstFileA
0x407030 Sleep
0x407034 HeapFree
0x407038 HeapAlloc
0x40703c GetStartupInfoA
0x407040 GetCommandLineA
0x407044 GetVersion
0x407048 ExitProcess
0x40704c HeapDestroy
0x407050 HeapCreate
0x407054 VirtualFree
0x407058 VirtualAlloc
0x40705c HeapReAlloc
0x407060 GetLastError
0x407064 CloseHandle
0x407068 WriteFile
0x40706c ReadFile
0x407070 TerminateProcess
0x407074 GetCurrentProcess
0x407084 WideCharToMultiByte
0x407090 SetHandleCount
0x407094 GetStdHandle
0x407098 GetFileType
0x40709c RtlUnwind
0x4070a0 SetStdHandle
0x4070a4 FlushFileBuffers
0x4070a8 CreateFileA
0x4070ac SetFilePointer
0x4070b0 GetCPInfo
0x4070b4 GetACP
0x4070b8 GetOEMCP
0x4070bc GetProcAddress
0x4070c0 LoadLibraryA
0x4070c4 SetEndOfFile
0x4070c8 MultiByteToWideChar
0x4070cc LCMapStringA
0x4070d0 LCMapStringW
0x4070d4 CreateDirectoryA
Library USER32.dll:
0x4070dc MessageBoxA
Library ADVAPI32.dll:
0x407000 RegSetValueExA
0x407004 RegCloseKey
0x407008 RegOpenKeyA

L!This program cannot be run in DOS mode.
/<kRkRkR
^iRYjR\gRXWR
AlRkS\RDiRTjRRichkR
`.rdata
@.data
UQEPh@
MU+U9U}wE
tAt2t$
YYUQSVW}
+;r>})E
UQSVW}
t6t7)E
Yu3Vt$
PUSVWu
_^H[]Ujhp@
j?UIZ;
r;]uy;
;uY;]s
pD#U#ue
j #M_|
]#\D\D
VW3;u0DP
_^[SUVW|$
_^][Vt$
3^SVt$
>+~&WPv
YSVW33395@
_^[UQQSV5d@
rt`+tE
rbtHHt.
u@u;@S9]u.E
SUV333;W~]
;|?4$j
_^][USVu
_^[UWVu
DDDDDDDDDDDDDD
It.ht lt
HHtpHHtl
YAE t!E@E
t;ERPWVEUe
~;E]xf
YY~2MQu
E_^[S?@
KVW~&|$
X_[^3^
YtF>"u
< v^S39
PY;5,@
8t9UW
YE?=t"Uq;Y
EYW6tY
8u]5@
[UQQS39
EPEPSSWM
YEPEPE
@"t)t%
F8"uF@C
@C8"u,
VW333;u3
SS@SSPVSSD$4
;t2U>;YD$
t#SSUPt$$VSS
;t<8t
u+@UY;u
3_^][YY
DSUVWh
_^][DUSVWUj
t.;t$$t(4v
VC20XC00U
]_^[]UL$
PYY\WP\@Y<v)\P\;j
P5`WP8`h
P6VYP6j
DDDDDDDDDDDDDD
<1u6=d@
t78t2=d@
|^k=D@
^#+t-Ht!Ht
5t.;t*;t
VuEPuuu
90tr0B=@
@j@3Y@
@;vAA9
Wj@Y3@
t7SWU
BBBu_[j
VPVPV5
@AA;rI3
VWuBht@
;tg5p@
tPhlt@
_^[3L$
GIt%t)
Gt/KuD$
GKu[^D$
[^_SVt$
S>Yu+Vj
_^[3VWj
YY@}>j
8YUjht@
SVWe39=@
"WWSht@
M]9}tfSuu
tMWWSuu
Mu;tVSuuu
3;u>EPj
EPVht@
E;tc]<
euWSV[
e33M;t)uVu
PKY3UQ@
;t8WY;YEt*j
|)|||W|;)|Y5|B$|=
|+|C|*|(|w
|P||+.|
`h````
ppxxxx
(null)
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
abnormal program termination
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
KERNEL32.dll
MessageBoxA
USER32.dll
RegCloseKey
RegSetValueExA
RegOpenKeyA
ADVAPI32.dll
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetLastError
CloseHandle
WriteFile
ReadFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
SetStdHandle
FlushFileBuffers
CreateFileA
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateDirectoryA
Winamp 5.0 (full version).exe
Winamp 3 (full version).exe
Winamp 3.5 (full version).exe
Update Photoshop 7.0 to Photoshop 9.16 (Its Work!).exe
Update Photoshop 8.0 to Photoshop 9.5 (Its Work!).exe
WinAce 3.85 (with Serial).exe
Download Accelerator Plus (DAP) (full version with serial).exe
RealOne Player (Full version).exe
BsPlayer v3.exe
WinRar v6.11 (with crack).exe
WinRar 4 (with crack).exe
ContaWin 2000 (full version).exe
WinZip 9.exe
DivX 7.2 freeware.exe
3D Studio R8 (It's Work!!).exe
VirtualDub 2.1.4.exe
MSN messenger 6.3.exe
Hacha Profesional Edition.exe
Simpsons pack guiones (Temporada 2004).exe
Mazinkaiser pack fondos de escritorio.exe
Mazinkaiser comics pack.exe
Juegos JAVA para NOKIA.exe
Capitulos ineditos de DragonBall Z jamas emitidos.exe
Pack Tonos y Logos para Nokia.exe
Nero 7.5.1.0 (cracked!).exe
3D Movie Maker.exe
Silent Hill.exe
PSEmu.exe
RM2GBA.exe
WAV2MP3.exe
GBAEmu.exe
GameCube Emulator.exe
Pack 50 Juegos PS2.exe
Pack 25 Juegos GameCube.exe
Resident Evil for GameCube.exe
Visual Basic 6.exe
Visual C.exe
Visual Studio (full).exe
mugen (full).exe
Fuck my fat ass.avi.exe
German extreme violation.mpg.exe
Sexo con una menor.exe
Pedofilia pack 37 pics.exe
Follada brutal coo roto.exe
Lolita Pack 20 Pics.exe
Puta come mierda.exe
Solo para Maricas.exe
No lo Descargues.exe
Dont Download.exe
humor.exe
Dont Touch.exe
Hentai.exe
Matrix Wallpapers.exe
Terminator 3 Wallpapers.exe
Hentai Evangelion Poker.exe
Shinchan screen saver.scr
Hentai Shizuka clit.exe
a pelo.exe
Chenoa en cueros.exe
WinAmp skings and plugins.exe
FlashGet Max acceleration (Experimental).exe
VMIntel386.exe
C:\Gusanillo QueBonito@Compartir.es
Hola tio! soy el gusanillo
como va eso?
Error in zip file
El archivo tiene un formato desconocido o est daado
Zip message
El archivo zip no ha podido ser abierto
probablemente este daado
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
256mb 32bit
VMIntel386
/Intelx386
/VMIntel386.exe
Pack sex very hot nude young girl porn erotic private pussy rape clitoris suck chicas fotos culos tetas coos mamadas corridas sister hermana amigas friends lesbianas mujeres desnudas putas guarras hentai.exe
EMULE.EXE
config/shareddir.dat
012345: :
SOFTWARE\Kazaa\LocalContent
012345:%s
DisableSharing
SOFTWARE\Kazaa\UserDetails
QueBonito@Compartir.es
012345: :
SOFTWARE\IMesh\Client\LocalContent
012345:%s
DisableSharing
SOFTWARE\IMesh\Client\UserDetails
QueBonito@Compartir.es
C:\WINDOWS\system32\d64f3b0d79593de8733ad42a9539b1e947a6fed34ad5692fec1b973c296849bc.exe
(null)
((((( H

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.