2.2
中危

e4f8ba6b534fe074a465bed485952ad9077ae9ec2559aa704da65a6848b926ef

779d9d18a4a6f73400a6cae453d0b3dc.exe

分析耗时

78s

最近分析

文件大小

465.3KB
静态报毒 动态报毒 AI SCORE=88 AISJ ARTEMIS CONFIDENCE GENERICKD HIGH CONFIDENCE MALICIOUS PE R002C0DGL20 SCORE SHELMA STRIKCO VIRBOX 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!779D9D18A4A6 20200904 6.0.6.653
Alibaba Trojan:Application/Shelma.4d442437 20190527 0.3.0.5
Avast Win64:Malware-gen 20200904 18.4.3895.0
Baidu 20190318 1.0.0.2
Kingsoft 20200904 2013.8.14.323
Tencent Win64.Trojan.Shelma.Aisj 20200904 1.0.0.1
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
静态指标
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (12 个事件)
Time & API Arguments Status Return Repeated
1619676836.308147
NtAllocateVirtualMemory
process_identifier: 2308
region_size: 163840
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0000000000580000
success 0 0
1619676836.308147
NtAllocateVirtualMemory
process_identifier: 2308
region_size: 188416
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00000000006d0000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 61440
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006d1000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006e0000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006ea000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006ec000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006ed000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 49152
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006ee000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006fa000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006fb000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006fc000
success 0 0
1619676836.386147
NtProtectVirtualMemory
process_identifier: 2308
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
base_address: 0x00000000006fd000
success 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 35 AntiVirus engines on VirusTotal as malicious (35 个事件)
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
McAfee Artemis!779D9D18A4A6
Malwarebytes RiskWare.Packed.Virbox
Zillya Trojan.Shelma.Win64.3090
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Trojan:Application/Shelma.4d442437
K7GW Riskware ( 0040eff71 )
Cybereason malicious.7809dd
TrendMicro TROJ_GEN.R002C0DGL20
Symantec Trojan.Gen.MBT
APEX Malicious
Kaspersky Trojan.Win64.Shelma.ewy
BitDefender Trojan.GenericKD.34198536
MicroWorld-eScan Trojan.GenericKD.34198536
Avast Win64:Malware-gen
Ad-Aware Trojan.GenericKD.34198536
Invincea Mal/Generic-S
FireEye Generic.mg.779d9d18a4a6f734
Sophos Mal/Generic-S
SentinelOne DFI - Malicious PE
GData Trojan.GenericKD.34198536
Arcabit Trojan.Generic.D209D408
ZoneAlarm Trojan.Win64.Shelma.ewy
Microsoft Trojan:Win64/Strikco.A!bit
ALYac Trojan.GenericKD.34198536
MAX malware (ai score=88)
TrendMicro-HouseCall TROJ_GEN.R002C0DGL20
Tencent Win64.Trojan.Shelma.Aisj
Ikarus Trojan.Win64.Strikco
Fortinet W64/Shelma.EWY!tr
AVG Win64:Malware-gen
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_90% (W)
Qihoo-360 Win64/Trojan.028
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-03-23 04:35:11

Imports

Library KERNEL32.dll:
0x4acb80 VirtualAlloc
0x4acb88 VirtualFree
0x4acb90 VirtualProtect
0x4acb98 MapViewOfFile
0x4acba0 UnmapViewOfFile
0x4acba8 GetModuleFileNameA
0x4acbb0 GetModuleFileNameW
0x4acbb8 GetModuleHandleA
0x4acbc0 GetProcAddress
0x4acbc8 LoadLibraryA
0x4acbd0 CreateFileA
0x4acbd8 CreateFileW
0x4acbe0 WriteFile
0x4acbe8 CloseHandle
0x4acbf0 GetLocalTime
0x4acbf8 VirtualQuery
0x4acc00 CreateFileMappingW
0x4acc20 GetCurrentProcess
0x4acc30 GetSystemInfo
0x4acc38 VirtualProtectEx
Library USER32.dll:
0x4acc58 wsprintfA
Library SHLWAPI.dll:
0x4acc48
Library KERNEL32.dll:
0x4ad392 CreateThread
Library KERNEL32.dll:
Library KERNEL32.dll:
0x4ad3b2 VirtualProtect
Library msvcrt.dll:

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.