4.2
中危

0ae13a39ba870f8b572d742a201f342a022e9a541eea06143996839edd8a8906

78ff2026ee9c0b0f58337836f29b8697.exe

分析耗时

80s

最近分析

文件大小

743.0KB
静态报毒 动态报毒 AGEN AI SCORE=88 AIDETECTVM ASPROTECT AZORULT CLASSIC CONFIDENCE DELPHILESS DWPL EHDJ FAREIT FPYRYR FUERBOOS GENASA GENCIRC GENERICRXHP GENETIC GZSHSLZK8YO HIGH CONFIDENCE LOKI LOKIBOT MALWARE2 MALWARE@#1ZMKAGCU0QN3B MAWG NOON QVM05 R + MAL SCORE SIGGEN2 SMDD SUSGEN UGW@AAB8QLKI UNSAFE ZELPHIF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee GenericRXHP-MB!78FF2026EE9C 20201224 6.0.6.653
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
Alibaba TrojanSpy:Win32/Lokibot.8bfb83e6 20190527 0.3.0.5
Avast Win32:Malware-gen 20201224 21.1.5827.0
Baidu 20190318 1.0.0.2
Tencent Malware.Win32.Gencirc.10b62c95 20201224 1.0.0.1
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (6 个事件)
Time & API Arguments Status Return Repeated
1619677187.324374
NtAllocateVirtualMemory
process_identifier: 912
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00360000
success 0 0
1619677199.996374
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01cf2000
success 0 0
1619677199.996374
NtAllocateVirtualMemory
process_identifier: 912
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01e00000
success 0 0
1619677220.824499
NtAllocateVirtualMemory
process_identifier: 1544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003d0000
success 0 0
1619677232.465499
NtProtectVirtualMemory
process_identifier: 1544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00642000
success 0 0
1619677232.465499
NtAllocateVirtualMemory
process_identifier: 1544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x004d0000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (1 个事件)
entropy 7.323034701315701 section {'size_of_data': '0x00024a00', 'virtual_address': '0x0009a000', 'entropy': 7.323034701315701, 'name': '.rsrc', 'virtual_size': '0x000249f4'} description A section with a high entropy has been found
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Creates an Alternate Data Stream (ADS) (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\iphone\microsoftexcel.exe:ZoneIdentifier
Deletes executed files from disk (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\iphone\microsoftexcel.exe
File has been identified by 59 AntiVirus engines on VirusTotal as malicious (50 out of 59 个事件)
Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
DrWeb Trojan.PWS.Siggen2.13817
MicroWorld-eScan Trojan.Agent.DWPL
McAfee GenericRXHP-MB!78FF2026EE9C
Malwarebytes Trojan.MalPack.DLF.Generic
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
CrowdStrike win/malicious_confidence_90% (W)
Alibaba TrojanSpy:Win32/Lokibot.8bfb83e6
K7GW Riskware ( 0040eff71 )
K7AntiVirus Riskware ( 0040eff71 )
BitDefenderTheta Gen:NN.ZelphiF.34700.UGW@aaB8qLki
Cyren W32/Injector.MAWG-9269
Symantec Infostealer.Lokibot!16
ESET-NOD32 a variant of Win32/Packed.Asprotect.NAQ
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan-Spy.Win32.Noon.gen
BitDefender Trojan.Agent.DWPL
NANO-Antivirus Trojan.Win32.Noon.fpyryr
ViRobot Trojan.Win32.Agent.756224.J
Avast Win32:Malware-gen
Rising Trojan.Injector!1.AFE3 (CLASSIC)
Ad-Aware Trojan.Agent.DWPL
Sophos Mal/Generic-R + Mal/Fareit-Q
Comodo Malware@#1zmkagcu0qn3b
F-Secure Heuristic.HEUR/AGEN.1111025
Zillya Trojan.Noon.Win32.8185
TrendMicro TrojanSpy.Win32.LOKI.SMDD.hp
McAfee-GW-Edition BehavesLike.Win32.Fareit.bh
FireEye Generic.mg.78ff2026ee9c0b0f
Emsisoft Trojan.Packed (A)
Ikarus Trojan-Spy.Azorult
GData Trojan.Agent.DWPL
eGambit Unsafe.AI_Score_87%
Avira HEUR/AGEN.1111025
MAX malware (ai score=88)
Antiy-AVL Trojan/Win32.Fuerboos
Arcabit Trojan.Agent.DWPL
AegisLab Trojan.Win32.Noon.l!c
ZoneAlarm HEUR:Trojan-Spy.Win32.Noon.gen
Microsoft Trojan:Win32/Lokibot.A!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Win-Trojan/Delphiless.Exp
Acronis suspicious
ALYac Trojan.Agent.DWPL
VBA32 TrojanSpy.Noon
Cylance Unsafe
Zoner Trojan.Win32.78051
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-05-05 21:33:47

Imports

Library kernel32.dll:
0x48c164 VirtualFree
0x48c168 VirtualAlloc
0x48c16c LocalFree
0x48c170 LocalAlloc
0x48c174 GetTickCount
0x48c17c GetVersion
0x48c180 GetCurrentThreadId
0x48c18c VirtualQuery
0x48c190 WideCharToMultiByte
0x48c194 MultiByteToWideChar
0x48c198 lstrlenA
0x48c19c lstrcpynA
0x48c1a0 LoadLibraryExA
0x48c1a4 GetThreadLocale
0x48c1a8 GetStartupInfoA
0x48c1ac GetProcAddress
0x48c1b0 GetModuleHandleA
0x48c1b4 GetModuleFileNameA
0x48c1b8 GetLocaleInfoA
0x48c1bc GetCommandLineA
0x48c1c0 FreeLibrary
0x48c1c4 FindFirstFileA
0x48c1c8 FindClose
0x48c1cc ExitProcess
0x48c1d0 WriteFile
0x48c1d8 RtlUnwind
0x48c1dc RaiseException
0x48c1e0 GetStdHandle
Library user32.dll:
0x48c1e8 GetKeyboardType
0x48c1ec LoadStringA
0x48c1f0 MessageBoxA
0x48c1f4 CharNextA
Library advapi32.dll:
0x48c1fc RegQueryValueExA
0x48c200 RegOpenKeyExA
0x48c204 RegCloseKey
Library oleaut32.dll:
0x48c20c SysFreeString
0x48c210 SysReAllocStringLen
0x48c214 SysAllocStringLen
Library kernel32.dll:
0x48c21c TlsSetValue
0x48c220 TlsGetValue
0x48c224 LocalAlloc
0x48c228 GetModuleHandleA
Library advapi32.dll:
0x48c230 RegQueryValueExA
0x48c234 RegOpenKeyExA
0x48c238 RegCloseKey
Library kernel32.dll:
0x48c240 lstrcpyA
0x48c244 WriteFile
0x48c248 WaitForSingleObject
0x48c24c VirtualQuery
0x48c250 VirtualProtect
0x48c254 VirtualAlloc
0x48c258 Sleep
0x48c25c SizeofResource
0x48c260 SetThreadLocale
0x48c264 SetFilePointer
0x48c268 SetEvent
0x48c26c SetErrorMode
0x48c270 SetEndOfFile
0x48c274 ResetEvent
0x48c278 ReadFile
0x48c27c MultiByteToWideChar
0x48c280 MulDiv
0x48c284 LockResource
0x48c288 LoadResource
0x48c28c LoadLibraryA
0x48c298 GlobalUnlock
0x48c29c GlobalSize
0x48c2a0 GlobalReAlloc
0x48c2a4 GlobalHandle
0x48c2a8 GlobalLock
0x48c2ac GlobalFree
0x48c2b0 GlobalFindAtomA
0x48c2b4 GlobalDeleteAtom
0x48c2b8 GlobalAlloc
0x48c2bc GlobalAddAtomA
0x48c2c0 GetVersionExA
0x48c2c4 GetVersion
0x48c2c8 GetUserDefaultLCID
0x48c2cc GetTickCount
0x48c2d0 GetThreadLocale
0x48c2d4 GetSystemInfo
0x48c2d8 GetStringTypeExA
0x48c2dc GetStdHandle
0x48c2e0 GetProcAddress
0x48c2e4 GetModuleHandleA
0x48c2e8 GetModuleFileNameA
0x48c2ec GetLocaleInfoA
0x48c2f0 GetLocalTime
0x48c2f4 GetLastError
0x48c2f8 GetFullPathNameA
0x48c2fc GetDiskFreeSpaceA
0x48c300 GetDateFormatA
0x48c304 GetCurrentThreadId
0x48c308 GetCurrentProcessId
0x48c30c GetCPInfo
0x48c310 GetACP
0x48c314 FreeResource
0x48c318 InterlockedExchange
0x48c31c FreeLibrary
0x48c320 FormatMessageA
0x48c324 FindResourceA
0x48c328 EnumCalendarInfoA
0x48c334 CreateThread
0x48c338 CreateFileA
0x48c33c CreateEventA
0x48c340 CompareStringA
0x48c344 CloseHandle
Library version.dll:
0x48c34c VerQueryValueA
0x48c354 GetFileVersionInfoA
Library gdi32.dll:
0x48c35c UnrealizeObject
0x48c360 TextOutA
0x48c364 StretchBlt
0x48c368 SetWindowOrgEx
0x48c36c SetWinMetaFileBits
0x48c370 SetViewportOrgEx
0x48c374 SetTextColor
0x48c378 SetTextAlign
0x48c37c SetStretchBltMode
0x48c380 SetROP2
0x48c384 SetPixel
0x48c388 SetMapMode
0x48c38c SetEnhMetaFileBits
0x48c390 SetDIBColorTable
0x48c394 SetBrushOrgEx
0x48c398 SetBkMode
0x48c39c SetBkColor
0x48c3a0 SelectPalette
0x48c3a4 SelectObject
0x48c3a8 SelectClipRgn
0x48c3ac ScaleWindowExtEx
0x48c3b0 SaveDC
0x48c3b4 RoundRect
0x48c3b8 RestoreDC
0x48c3bc Rectangle
0x48c3c0 RectVisible
0x48c3c4 RealizePalette
0x48c3c8 Polyline
0x48c3cc Polygon
0x48c3d0 PlayEnhMetaFile
0x48c3d4 Pie
0x48c3d8 PatBlt
0x48c3dc MoveToEx
0x48c3e0 MaskBlt
0x48c3e4 LineTo
0x48c3e8 LPtoDP
0x48c3ec IntersectClipRect
0x48c3f0 GetWindowOrgEx
0x48c3f4 GetWinMetaFileBits
0x48c3f8 GetTextMetricsA
0x48c400 GetTextAlign
0x48c408 GetStockObject
0x48c40c GetPixel
0x48c410 GetPaletteEntries
0x48c414 GetObjectA
0x48c424 GetEnhMetaFileBits
0x48c428 GetDeviceCaps
0x48c42c GetDIBits
0x48c430 GetDIBColorTable
0x48c434 GetDCOrgEx
0x48c43c GetClipBox
0x48c440 GetBrushOrgEx
0x48c444 GetBkMode
0x48c448 GetBkColor
0x48c44c GetBitmapBits
0x48c450 ExtSelectClipRgn
0x48c454 ExtCreatePen
0x48c458 ExcludeClipRect
0x48c45c Ellipse
0x48c460 DeleteObject
0x48c464 DeleteEnhMetaFile
0x48c468 DeleteDC
0x48c46c CreateSolidBrush
0x48c470 CreateRectRgn
0x48c474 CreatePolygonRgn
0x48c478 CreatePenIndirect
0x48c47c CreatePen
0x48c480 CreatePalette
0x48c488 CreateFontIndirectA
0x48c48c CreateEnhMetaFileA
0x48c490 CreateDIBitmap
0x48c494 CreateDIBSection
0x48c498 CreateCompatibleDC
0x48c4a0 CreateBrushIndirect
0x48c4a4 CreateBitmap
0x48c4a8 CopyEnhMetaFileA
0x48c4ac CloseEnhMetaFile
0x48c4b0 BitBlt
0x48c4b4 Arc
Library user32.dll:
0x48c4bc CreateWindowExA
0x48c4c0 WindowFromPoint
0x48c4c4 WinHelpA
0x48c4c8 WaitMessage
0x48c4cc ValidateRect
0x48c4d0 UpdateWindow
0x48c4d4 UnregisterClassA
0x48c4d8 UnhookWindowsHookEx
0x48c4dc TranslateMessage
0x48c4e4 TrackPopupMenu
0x48c4ec ShowWindow
0x48c4f0 ShowScrollBar
0x48c4f4 ShowOwnedPopups
0x48c4f8 ShowCursor
0x48c4fc SetWindowsHookExA
0x48c500 SetWindowPos
0x48c504 SetWindowPlacement
0x48c508 SetWindowLongA
0x48c50c SetTimer
0x48c510 SetScrollRange
0x48c514 SetScrollPos
0x48c518 SetScrollInfo
0x48c51c SetRect
0x48c520 SetPropA
0x48c524 SetParent
0x48c528 SetMenuItemInfoA
0x48c52c SetMenu
0x48c530 SetForegroundWindow
0x48c534 SetFocus
0x48c538 SetCursor
0x48c53c SetClassLongA
0x48c540 SetCapture
0x48c544 SetActiveWindow
0x48c548 SendMessageA
0x48c54c ScrollWindow
0x48c550 ScreenToClient
0x48c554 RemovePropA
0x48c558 RemoveMenu
0x48c55c ReleaseDC
0x48c560 ReleaseCapture
0x48c56c RegisterClassA
0x48c570 RedrawWindow
0x48c574 PtInRect
0x48c578 PostQuitMessage
0x48c57c PostMessageA
0x48c580 PeekMessageA
0x48c584 OffsetRect
0x48c588 OemToCharA
0x48c58c MessageBoxA
0x48c590 MapWindowPoints
0x48c594 MapVirtualKeyA
0x48c598 LoadStringA
0x48c59c LoadKeyboardLayoutA
0x48c5a0 LoadIconA
0x48c5a4 LoadCursorA
0x48c5a8 LoadBitmapA
0x48c5ac KillTimer
0x48c5b0 IsZoomed
0x48c5b4 IsWindowVisible
0x48c5b8 IsWindowEnabled
0x48c5bc IsWindow
0x48c5c0 IsRectEmpty
0x48c5c4 IsIconic
0x48c5c8 IsDialogMessageA
0x48c5cc IsChild
0x48c5d0 InvalidateRect
0x48c5d4 IntersectRect
0x48c5d8 InsertMenuItemA
0x48c5dc InsertMenuA
0x48c5e0 InflateRect
0x48c5e8 GetWindowTextA
0x48c5ec GetWindowRect
0x48c5f0 GetWindowPlacement
0x48c5f4 GetWindowLongA
0x48c5f8 GetWindowDC
0x48c5fc GetTopWindow
0x48c600 GetSystemMetrics
0x48c604 GetSystemMenu
0x48c608 GetSysColorBrush
0x48c60c GetSysColor
0x48c610 GetSubMenu
0x48c614 GetScrollRange
0x48c618 GetScrollPos
0x48c61c GetScrollInfo
0x48c620 GetPropA
0x48c624 GetParent
0x48c628 GetWindow
0x48c62c GetMessageTime
0x48c630 GetMenuStringA
0x48c634 GetMenuState
0x48c638 GetMenuItemInfoA
0x48c63c GetMenuItemID
0x48c640 GetMenuItemCount
0x48c644 GetMenu
0x48c648 GetLastActivePopup
0x48c64c GetKeyboardState
0x48c654 GetKeyboardLayout
0x48c658 GetKeyState
0x48c65c GetKeyNameTextA
0x48c660 GetIconInfo
0x48c664 GetForegroundWindow
0x48c668 GetFocus
0x48c66c GetDlgItem
0x48c670 GetDesktopWindow
0x48c674 GetDCEx
0x48c678 GetDC
0x48c67c GetCursorPos
0x48c680 GetCursor
0x48c684 GetClipboardData
0x48c688 GetClientRect
0x48c68c GetClassNameA
0x48c690 GetClassInfoA
0x48c694 GetCapture
0x48c698 GetActiveWindow
0x48c69c FrameRect
0x48c6a0 FindWindowA
0x48c6a4 FillRect
0x48c6a8 EqualRect
0x48c6ac EnumWindows
0x48c6b0 EnumThreadWindows
0x48c6b4 EndPaint
0x48c6b8 EnableWindow
0x48c6bc EnableScrollBar
0x48c6c0 EnableMenuItem
0x48c6c4 DrawTextA
0x48c6c8 DrawMenuBar
0x48c6cc DrawIconEx
0x48c6d0 DrawIcon
0x48c6d4 DrawFrameControl
0x48c6d8 DrawFocusRect
0x48c6dc DrawEdge
0x48c6e0 DispatchMessageA
0x48c6e4 DestroyWindow
0x48c6e8 DestroyMenu
0x48c6ec DestroyIcon
0x48c6f0 DestroyCursor
0x48c6f4 DeleteMenu
0x48c6f8 DefWindowProcA
0x48c6fc DefMDIChildProcA
0x48c700 DefFrameProcA
0x48c704 CreatePopupMenu
0x48c708 CreateMenu
0x48c70c CreateIcon
0x48c710 ClientToScreen
0x48c714 CheckMenuItem
0x48c718 CallWindowProcA
0x48c71c CallNextHookEx
0x48c720 BeginPaint
0x48c724 CharNextA
0x48c728 CharLowerBuffA
0x48c72c CharLowerA
0x48c730 CharUpperBuffA
0x48c734 CharToOemA
0x48c738 AdjustWindowRectEx
Library kernel32.dll:
0x48c744 Sleep
Library oleaut32.dll:
0x48c74c SafeArrayPtrOfIndex
0x48c750 SafeArrayGetUBound
0x48c754 SafeArrayGetLBound
0x48c758 SafeArrayCreate
0x48c75c VariantChangeType
0x48c760 VariantCopy
0x48c764 VariantClear
0x48c768 VariantInit
Library ole32.dll:
0x48c774 IsAccelerator
0x48c778 OleDraw
0x48c780 CoCreateInstance
0x48c784 CoGetClassObject
0x48c788 CoUninitialize
0x48c78c CoInitialize
0x48c790 IsEqualGUID
Library oleaut32.dll:
0x48c798 GetErrorInfo
0x48c79c SysFreeString
Library comctl32.dll:
0x48c7ac ImageList_Write
0x48c7b0 ImageList_Read
0x48c7c0 ImageList_DragMove
0x48c7c4 ImageList_DragLeave
0x48c7c8 ImageList_DragEnter
0x48c7cc ImageList_EndDrag
0x48c7d0 ImageList_BeginDrag
0x48c7d4 ImageList_Remove
0x48c7d8 ImageList_DrawEx
0x48c7dc ImageList_Replace
0x48c7e0 ImageList_Draw
0x48c7f0 ImageList_Add
0x48c7f8 ImageList_Destroy
0x48c7fc ImageList_Create
0x48c800 InitCommonControls
Library comdlg32.dll:
0x48c808 GetSaveFileNameA
0x48c80c GetOpenFileNameA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.