4.4
中危

75f2a26a6dd74c2c1d179444dfc531cfe34126b8712c531ee5fd58bd56da40fc

74d98826403ec2c2b008332f296894e7.exe

分析耗时

86s

最近分析

文件大小

7.5MB
静态报毒 动态报毒 16BZACFSQWM ADWAREX AI SCORE=84 ATTRIBUTE BSCOPE BURDEN CHINAD DRUA GENERIC PUA BB GENERIC@ML GENETIC GRAFTOR HIGH CONFIDENCE HIGHCONFIDENCE HINCTP JFPZQZMNWLF3J3VHNJPZKG POTENTIALRISK R328901 RDML SCORE SNOJAN SOFTCNAPP SUSGEN UNSAFE 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Avast Win32:AdwareX-gen [Adw] 20201202 20.10.5736.0
Alibaba AdWare:Win32/Softcnapp.a4d4ed6e 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
McAfee PUP-XLB-BE 20201202 6.0.6.653
Tencent 20201202 1.0.0.1
CrowdStrike 20190702 1.0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features GET method with no useragent header suspicious_request GET http://tjtv3.wn51.com/sj.php
Performs some HTTP requests (1 个事件)
request GET http://tjtv3.wn51.com/sj.php
Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation (1 个事件)
Time & API Arguments Status Return Repeated
1620979706.08925
GetDiskFreeSpaceExW
root_path: C:\
free_bytes_available: 19601670144
total_number_of_free_bytes: 19601670144
total_number_of_bytes: 34252779520
success 1 0
Foreign language identified in PE resource (13 个事件)
name ZIPRES language LANG_CHINESE offset 0x000e4378 filetype Zip archive data, at least v2.0 to extract sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00044eea
name ZZZZ language LANG_CHINESE offset 0x00129264 filetype 7-zip archive data, version 0.3 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x005e1150
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0076ee44 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_GROUP_ICON language LANG_CHINESE offset 0x0076f2ac filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000084
name RT_VERSION language LANG_CHINESE offset 0x0076f330 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000294
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.967594299329397 section {'size_of_data': '0x0068bc00', 'virtual_address': '0x000e4000', 'entropy': 7.967594299329397, 'name': '.rsrc', 'virtual_size': '0x0068bab4'} description A section with a high entropy has been found
entropy 0.8791396157125058 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 45 AntiVirus engines on VirusTotal as malicious (45 个事件)
Elastic malicious (high confidence)
DrWeb Adware.Softcnapp.125
MicroWorld-eScan Gen:Variant.Graftor.752410
FireEye Generic.mg.74d98826403ec2c2
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
K7AntiVirus Unwanted-Program ( 00560ccc1 )
BitDefender Gen:Variant.Graftor.752410
K7GW Unwanted-Program ( 00560ccc1 )
Cyren W32/Trojan.DRUA-3861
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:AdwareX-gen [Adw]
Kaspersky not-a-virus:HEUR:AdWare.Win32.Burden.gen
Alibaba AdWare:Win32/Softcnapp.a4d4ed6e
NANO-Antivirus Riskware.Win32.Softcnapp.hinctp
AegisLab Adware.Win32.Burden.2!c
Rising Trojan.Generic@ML.100 (RDML:JfPZqZmnwlf3J3vHnJPZKg)
Sophos Generic PUA BB (PUA)
F-Secure PotentialRisk.PUA/Softcnapp.Gen
Zillya Adware.Burden.Win32.465
McAfee-GW-Edition BehavesLike.Win32.Generic.wc
Emsisoft Gen:Variant.Graftor.752410 (B)
Jiangmin Trojan.Snojan.btm
Webroot W32.Adware.Gen
Avira PUA/Softcnapp.Gen
MAX malware (ai score=84)
Gridinsoft Adware.Softcnapp.vl!c
Microsoft PUA:Win32/Softcnapp
ZoneAlarm not-a-virus:HEUR:AdWare.Win32.Burden.gen
GData Gen:Variant.Graftor.752410
Cynet Malicious (score: 100)
AhnLab-V3 PUP/Win32.RL_Generic.R328901
McAfee PUP-XLB-BE
VBA32 BScope.Adware.Softcnapp
Malwarebytes PUP.Optional.ChinAd
Panda Trj/Genetic.gen
ESET-NOD32 a variant of Win32/Softcnapp.BG potentially unwanted
Yandex Riskware.Agent!16bZacFsqwM
Ikarus PUA.Softcnapp
eGambit Unsafe.AI_Score_99%
Fortinet Adware/Burden
AVG Win32:AdwareX-gen [Adw]
Paloalto generic.ml
MaxSecure Trojan.Malware.74846895.susgen
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-03-30 22:02:25

Imports

Library KERNEL32.dll:
0x4af130 SleepEx
0x4af134 LoadLibraryA
0x4af138 GetSystemDirectoryA
0x4af140 PeekNamedPipe
0x4af148 ExitThread
0x4af150 GetDriveTypeW
0x4af158 GetFullPathNameW
0x4af15c GetDiskFreeSpaceExW
0x4af160 WinExec
0x4af164 DeleteFileW
0x4af168 GetTempPathW
0x4af16c WriteFile
0x4af170 LockResource
0x4af174 MultiByteToWideChar
0x4af178 FindResourceW
0x4af17c LoadLibraryExW
0x4af188 GetCurrentProcess
0x4af18c TerminateProcess
0x4af194 SetEvent
0x4af198 ResetEvent
0x4af1a0 CreateEventW
0x4af1a4 IsDebuggerPresent
0x4af1a8 GetStartupInfoW
0x4af1b0 GetCurrentThreadId
0x4af1b8 InitializeSListHead
0x4af1bc OutputDebugStringW
0x4af1c0 GetACP
0x4af1c4 VerSetConditionMask
0x4af1c8 GetTickCount
0x4af1d0 VerifyVersionInfoW
0x4af1d4 FreeResource
0x4af1d8 ExitProcess
0x4af1dc MulDiv
0x4af1e0 GlobalAlloc
0x4af1e4 GlobalLock
0x4af1e8 LoadLibraryW
0x4af1ec GlobalFree
0x4af1f0 SetLastError
0x4af1f4 GetFileType
0x4af1f8 SetFilePointer
0x4af1fc SetFileTime
0x4af200 DuplicateHandle
0x4af20c CreateDirectoryW
0x4af210 WideCharToMultiByte
0x4af214 GetLocalTime
0x4af220 FindClose
0x4af224 RemoveDirectoryW
0x4af228 FindFirstFileW
0x4af22c FindNextFileW
0x4af230 MoveFileExW
0x4af234 HeapAlloc
0x4af238 HeapReAlloc
0x4af23c HeapFree
0x4af240 HeapSize
0x4af244 GetProcessHeap
0x4af24c WaitForSingleObject
0x4af250 CreateProcessW
0x4af254 ReleaseMutex
0x4af258 CreateMutexW
0x4af25c AreFileApisANSI
0x4af260 GetVersionExW
0x4af268 SetErrorMode
0x4af26c GetSystemInfo
0x4af270 FormatMessageW
0x4af274 EncodePointer
0x4af278 RtlUnwind
0x4af27c TlsAlloc
0x4af280 TlsGetValue
0x4af284 TlsSetValue
0x4af288 TlsFree
0x4af28c GetModuleHandleExW
0x4af290 GetStdHandle
0x4af294 GetStringTypeW
0x4af298 CompareStringW
0x4af29c LCMapStringW
0x4af2a0 FindFirstFileExW
0x4af2a4 IsValidCodePage
0x4af2a8 GetOEMCP
0x4af2ac GetCPInfo
0x4af2b0 GetCommandLineA
0x4af2b4 GetCommandLineW
0x4af2c4 SetStdHandle
0x4af2c8 GetConsoleCP
0x4af2cc GetConsoleMode
0x4af2d4 ReadConsoleW
0x4af2d8 SetFilePointerEx
0x4af2dc FlushFileBuffers
0x4af2e0 WriteConsoleW
0x4af2e4 SetEndOfFile
0x4af2e8 lstrcmpiW
0x4af2ec SizeofResource
0x4af2f0 LoadResource
0x4af2f8 RaiseException
0x4af2fc FreeLibrary
0x4af308 DecodePointer
0x4af30c Process32NextW
0x4af310 Process32FirstW
0x4af318 QueryDosDeviceW
0x4af31c GetModuleHandleW
0x4af324 GetLastError
0x4af328 GetCurrentProcessId
0x4af32c OpenProcess
0x4af330 VirtualFree
0x4af334 VirtualAlloc
0x4af338 LocalFree
0x4af33c LocalAlloc
0x4af340 GetProcAddress
0x4af344 Sleep
0x4af358 CreateFileW
0x4af360 GetModuleFileNameW
0x4af364 lstrlenW
0x4af368 CloseHandle
0x4af36c ReadFile
0x4af370 GetFileSize
0x4af374 GlobalUnlock
0x4af378 CreateThread
Library USER32.dll:
0x4af3cc SetRect
0x4af3d0 GetDesktopWindow
0x4af3d4 OpenClipboard
0x4af3d8 CloseClipboard
0x4af3dc SetClipboardData
0x4af3e0 EmptyClipboard
0x4af3e4 CreateCaret
0x4af3e8 HideCaret
0x4af3ec ShowCaret
0x4af3f0 SetCaretPos
0x4af3f4 GetCaretPos
0x4af3f8 ClientToScreen
0x4af3fc GetSysColor
0x4af400 SetWindowTextW
0x4af404 GetWindowTextW
0x4af40c MoveWindow
0x4af414 InvalidateRgn
0x4af418 DefWindowProcW
0x4af41c GetWindow
0x4af420 GetParent
0x4af424 SetWindowLongW
0x4af428 GetWindowLongW
0x4af42c PtInRect
0x4af430 IsRectEmpty
0x4af434 ScreenToClient
0x4af438 GetCursorPos
0x4af43c GetWindowRect
0x4af440 GetClientRect
0x4af444 EndPaint
0x4af448 BeginPaint
0x4af44c ReleaseDC
0x4af450 GetDC
0x4af454 KillTimer
0x4af458 FillRect
0x4af45c SetCapture
0x4af460 GetKeyState
0x4af464 GetFocus
0x4af468 SetFocus
0x4af46c IsZoomed
0x4af470 UpdateLayeredWindow
0x4af474 DestroyWindow
0x4af478 CreateWindowExW
0x4af47c SendMessageW
0x4af480 DispatchMessageW
0x4af484 TranslateMessage
0x4af488 GetMessageW
0x4af48c LoadCursorW
0x4af490 OffsetRect
0x4af494 UnionRect
0x4af498 InflateRect
0x4af49c SetCursor
0x4af4a0 DrawTextW
0x4af4a4 CharPrevW
0x4af4a8 MessageBoxW
0x4af4ac SetWindowRgn
0x4af4b0 IsIconic
0x4af4b4 GetMonitorInfoW
0x4af4b8 PostMessageW
0x4af4bc PostQuitMessage
0x4af4c0 ShowWindow
0x4af4c4 MonitorFromWindow
0x4af4c8 LoadImageW
0x4af4cc SetWindowPos
0x4af4d0 SetTimer
0x4af4d4 InvalidateRect
0x4af4d8 IsWindow
0x4af4dc SetForegroundWindow
0x4af4e0 FindWindowW
0x4af4e4 GetPropW
0x4af4e8 SetPropW
0x4af4ec GetSystemMetrics
0x4af4f0 EnableWindow
0x4af4f4 CharNextW
0x4af4f8 GetWindowRgn
0x4af4fc ReleaseCapture
0x4af500 IntersectRect
0x4af504 IsWindowVisible
0x4af508 GetClassInfoExW
0x4af50c RegisterClassExW
0x4af510 MapWindowPoints
0x4af514 RegisterClassW
0x4af518 GetUpdateRect
0x4af51c CallWindowProcW
Library ADVAPI32.dll:
0x4af000 DuplicateTokenEx
0x4af004 RegEnumKeyW
0x4af008 RegOpenKeyW
0x4af00c LookupAccountSidW
0x4af018 RegQueryInfoKeyW
0x4af01c RegEnumKeyExW
0x4af020 RegDeleteValueW
0x4af024 RegDeleteKeyW
0x4af028 RegSetValueExW
0x4af02c RegOpenKeyExW
0x4af030 RegCreateKeyExW
0x4af034 RegCloseKey
0x4af038 GetTokenInformation
0x4af03c OpenProcessToken
0x4af044 RevertToSelf
0x4af048 RegQueryValueExW
Library SHELL32.dll:
0x4af3a8 SHGetFolderPathW
0x4af3ac ShellExecuteW
0x4af3b8 SHBrowseForFolderW
Library ole32.dll:
0x4af6a4 RevokeDragDrop
0x4af6a8 RegisterDragDrop
0x4af6ac CoCreateInstance
0x4af6b0 CoTaskMemAlloc
0x4af6b4 CoTaskMemRealloc
0x4af6b8 CoTaskMemFree
0x4af6bc CoInitialize
0x4af6c0 CoUninitialize
0x4af6c4 CLSIDFromString
0x4af6c8 CLSIDFromProgID
0x4af6cc OleLockRunning
Library OLEAUT32.dll:
0x4af380 VariantInit
0x4af384 VarUI4FromStr
0x4af388 SysAllocString
0x4af38c VariantClear
0x4af390 SysFreeString
Library gdiplus.dll:
0x4af5a8 GdipCreateFont
0x4af5ac GdipMeasureString
0x4af5dc GdipGetPropertyItem
0x4af5e0 GdipDrawArcI
0x4af5e4 GdipBitmapLockBits
0x4af5ec GdipDisposeImage
0x4af5f0 GdipFree
0x4af5f4 GdipAlloc
0x4af5f8 GdiplusShutdown
0x4af5fc GdiplusStartup
0x4af608 GdipFillRectangleI
0x4af60c GdipDrawPath
0x4af610 GdipDrawRectangleI
0x4af62c GdipGetImageHeight
0x4af630 GdipGetImageWidth
0x4af638 GdipSetPenMode
0x4af63c GdipDeletePen
0x4af640 GdipCreatePen1
0x4af644 GdipCreateSolidFill
0x4af648 GdipAddPathArcI
0x4af64c GdipAddPathLineI
0x4af650 GdipDeletePath
0x4af654 GdipCreatePath
0x4af668 GdipDrawString
0x4af66c GdipDeleteFont
0x4af680 GdipDeleteBrush
0x4af684 GdipCloneBrush
0x4af688 GdipDrawImageRectI
0x4af68c GdipDeleteGraphics
0x4af690 GdipCreateFromHDC
0x4af69c GdipCloneImage
Library PSAPI.DLL:
0x4af398 EnumProcessModules
Library CRYPT32.dll:
0x4af05c CryptMsgClose
0x4af060 CertCloseStore
0x4af06c CertGetNameStringW
0x4af070 CryptQueryObject
0x4af074 CryptMsgGetParam
Library SHLWAPI.dll:
0x4af3c0
0x4af3c4 PathFileExistsW
Library COMCTL32.dll:
0x4af050
0x4af054 _TrackMouseEvent
Library GDI32.dll:
0x4af07c StretchBlt
0x4af080 SetStretchBltMode
0x4af088 SetBkMode
0x4af090 CreatePenIndirect
0x4af094 SetTextColor
0x4af098 MoveToEx
0x4af09c SetBkColor
0x4af0a0 ExtSelectClipRgn
0x4af0a4 SelectClipRgn
0x4af0a8 LineTo
0x4af0b0 GetClipBox
0x4af0b4 CreateSolidBrush
0x4af0b8 GetCharABCWidthsW
0x4af0bc TextOutW
0x4af0c0 CombineRgn
0x4af0c4 PtInRegion
0x4af0c8 CreateRectRgn
0x4af0cc GetDeviceCaps
0x4af0d0 GetObjectA
0x4af0d4 GetDIBits
0x4af0d8 CreateDCW
0x4af0dc CreateRoundRectRgn
0x4af0e0 SetWindowOrgEx
0x4af0e4 GetObjectW
0x4af0e8 CreateDIBSection
0x4af0ec GetTextMetricsW
0x4af0f0 SelectObject
0x4af0f4 SaveDC
0x4af0f8 RestoreDC
0x4af0fc Rectangle
0x4af100 GetStockObject
0x4af104 DeleteObject
0x4af108 DeleteDC
0x4af10c CreatePen
0x4af110 CreateFontIndirectW
0x4af114 CreateCompatibleDC
0x4af118 BitBlt
Library IMM32.dll:
0x4af120 ImmReleaseContext
0x4af128 ImmGetContext
Library WS2_32.dll:
0x4af524 getservbyname
0x4af528 getservbyport
0x4af52c gethostbyname
0x4af530 gethostbyaddr
0x4af534 inet_ntoa
0x4af538 inet_addr
0x4af53c htonl
0x4af540 WSASetLastError
0x4af544 setsockopt
0x4af548 ntohs
0x4af54c htons
0x4af550 __WSAFDIsSet
0x4af554 getsockname
0x4af558 getpeername
0x4af55c connect
0x4af560 bind
0x4af564 send
0x4af568 recv
0x4af56c WSAGetLastError
0x4af570 socket
0x4af574 closesocket
0x4af578 WSACleanup
0x4af57c WSAStartup
0x4af580 select
0x4af584 recvfrom
0x4af588 accept
0x4af58c sendto
0x4af590 listen
0x4af594 getsockopt
0x4af598 gethostname
0x4af59c ioctlsocket

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49175 117.50.93.3 tjtv3.wn51.com 80
192.168.56.101 49177 117.50.93.3 tjtv3.wn51.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 61680 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 50568 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900

HTTP & HTTPS Requests

URI Data
http://tjtv3.wn51.com/sj.php
GET /sj.php HTTP/1.1
Host: tjtv3.wn51.com
Accept: */*

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.