2.2
中危

8121af03ed22547d21727231c8041c9b8654fed415c670a6a3f470297255cfff

785e82c4c1d149aa170cef0e8fc7e09f.exe

分析耗时

74s

最近分析

文件大小

193.5KB
静态报毒 动态报毒 100% AI SCORE=81 AIDETECTVM ATTRIBUTE CONFIDENCE CROWTI DOWNLOAD4 DSZG ECRJT EKRC FSJZ GENCIRC GENKRYPTIK HIGH CONFIDENCE HIGHCONFIDENCE HLCTKH KCLOUD KRYPTIK MALWARE1 MALWARE@#7WNPVQECQN7J MIKEY MU2@A84EN3GJ MUCC PASSWORDSTEALER QVM10 R340243 RZHRDLJTP2J SCORE STATIC AI SUSGEN SUSPICIOUS PE TRICKBOT TROJANX UNSAFE WIEP WR+1OFFPMCS ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Trojan:Win32/Trickbot.b3c1721d 20190527 0.3.0.5
Avast Win32:TrojanX-gen [Trj] 20201210 21.1.5827.0
Tencent Malware.Win32.Gencirc.1182586c 20201211 1.0.0.1
Baidu 20190318 1.0.0.2
Kingsoft Win32.Troj.Undef.(kcloud) 20201211 2017.9.26.565
McAfee Trickbot-FSJZ!785E82C4C1D1 20201211 6.0.6.653
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
行为判定
动态指标
Foreign language identified in PE resource (1 个事件)
name RT_VERSION language LANG_CHINESE offset 0x0002e0a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000002e0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 56 AntiVirus engines on VirusTotal as malicious (50 out of 56 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
DrWeb Trojan.DownLoad4.13317
MicroWorld-eScan Gen:Variant.Mikey.112049
FireEye Generic.mg.785e82c4c1d149aa
ALYac Gen:Variant.Mikey.112049
Malwarebytes Spyware.PasswordStealer
Zillya Trojan.Inject.Win32.304070
AegisLab Trojan.Win32.Mikey.4!c
Sangfor Malware
K7AntiVirus Trojan ( 00566ed11 )
Alibaba Trojan:Win32/Trickbot.b3c1721d
K7GW Trojan ( 00566ed11 )
Cybereason malicious.c9e04c
Arcabit Trojan.Mikey.D1B5B1
BitDefenderTheta Gen:NN.ZexaF.34670.mu2@a84EN3gj
Cyren W32/Trojan.WIEP-3798
Symantec ML.Attribute.HighConfidence
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan.Win32.Inject.vho
BitDefender Gen:Variant.Mikey.112049
NANO-Antivirus Trojan.Win32.DownLoad4.hlctkh
Avast Win32:TrojanX-gen [Trj]
Tencent Malware.Win32.Gencirc.1182586c
Ad-Aware Gen:Variant.Mikey.112049
Sophos Mal/Generic-S
Comodo Malware@#7wnpvqecqn7j
F-Secure Trojan.TR/Kryptik.ecrjt
VIPRE LooksLike.Win32.Crowti.b (v)
McAfee-GW-Edition Trickbot-FSJZ!785E82C4C1D1
Emsisoft Gen:Variant.Mikey.112049 (B)
SentinelOne Static AI - Suspicious PE
Jiangmin Trojan.Mucc.azv
Avira TR/Kryptik.ecrjt
MAX malware (ai score=81)
Antiy-AVL Trojan[Downloader]/Win32.Adload
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Trojan:Win32/Trickbot.DSA!MTB
ZoneAlarm HEUR:Trojan.Win32.Inject.vho
GData Gen:Variant.Mikey.112049
Cynet Malicious (score: 85)
AhnLab-V3 Malware/Win32.RL_Generic.R340243
McAfee Trickbot-FSJZ!785E82C4C1D1
VBA32 Trojan.Trickbot
Cylance Unsafe
ESET-NOD32 a variant of Win32/GenKryptik.EKRC
Rising Downloader.Adload!8.D1 (TFE:5:RzHrDLJTp2J)
Yandex Trojan.GenKryptik!WR+1OFFpmcs
Ikarus Trojan-Downloader.Win32.VB
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-05-30 04:02:35

Imports

Library pdh.dll:
0x4221c0 PdhOpenQueryA
0x4221d0 PdhOpenQuery
Library GLU32.dll:
0x422020 gluBuild2DMipmaps
0x422024 gluNewQuadric
0x422028 gluBuild1DMipmaps
0x42202c gluBeginPolygon
0x422030 gluQuadricDrawStyle
0x422034 gluScaleImage
0x422038 gluDeleteTess
Library MPR.dll:
0x422138 WNetAddConnection3W
0x42213c WNetOpenEnumW
0x422140 WNetOpenEnumA
Library WINMM.dll:
0x42216c joyGetPos
0x422170 WOWAppExit
0x422174 mmioRenameW
0x42217c midiStreamOut
0x422180 mixerGetLineInfoA
0x422184 wid32Message
Library mscms.dll:
0x4221ac GetCMMInfo
Library RESUTILS.dll:
Library GDI32.dll:
0x422000 GdiPlayDCScript
0x422004 GetMetaFileW
0x42200c ExtEscape
0x422010 PolyDraw
0x422014 CopyMetaFileW
0x422018 EnumICMProfilesW
Library WSOCK32.dll:
0x422190 ord1117
0x422194 getservbyname
0x422198 ord1141
0x42219c select
0x4221a0 ord1104
Library KERNEL32.dll:
0x422040 HeapSize
0x422044 SetFilePointerEx
0x422048 GetStringTypeW
0x42204c HeapReAlloc
0x422050 LCMapStringW
0x422054 GetConsoleMode
0x422058 GetConsoleCP
0x42205c FlushFileBuffers
0x422060 OutputDebugStringW
0x422064 LoadLibraryExW
0x422068 RtlUnwind
0x42206c GetCPInfo
0x422070 GetOEMCP
0x422074 GetACP
0x422078 IsValidCodePage
0x42207c HeapFree
0x422088 CloseHandle
0x42208c SetStdHandle
0x422090 WriteConsoleW
0x422094 HeapAlloc
0x422098 Sleep
0x4220a0 GetCurrentProcessId
0x4220a8 GetModuleFileNameW
0x4220ac WriteFile
0x4220b0 GetModuleFileNameA
0x4220b8 VirtualProtect
0x4220bc IsDebuggerPresent
0x4220c4 GetCommandLineA
0x4220d0 SetLastError
0x4220d8 CreateFileW
0x4220dc GetCurrentProcess
0x4220e0 TerminateProcess
0x4220e4 TlsAlloc
0x4220e8 TlsGetValue
0x4220ec TlsSetValue
0x4220f0 TlsFree
0x4220f4 GetStartupInfoW
0x4220f8 GetModuleHandleW
0x4220fc GetProcAddress
0x422100 EncodePointer
0x422104 DecodePointer
0x422110 GetLastError
0x422114 GetCurrentThreadId
0x422118 ExitProcess
0x42211c GetModuleHandleExW
0x422120 MultiByteToWideChar
0x422124 WideCharToMultiByte
0x422128 GetProcessHeap
0x42212c GetStdHandle
0x422130 GetFileType

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58370 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.