8.2
高危

c4d2bbc3c3b3adae600631e9ab22124ce0b92588af7fabe69183469e0644cd4b

7985fe8e502b2cf4ae79603bd030f600.exe

分析耗时

95s

最近分析

文件大小

2.5MB
静态报毒 动态报毒 AI SCORE=100 AIDETECTVM AJBX ARTEMIS ATTRIBUTE BANBRA BANKERX BEHAVIOR BSCOPE BUERAK CCNC CLOUD CONFIDENCE ENIGMA GNHPI HIGH CONFIDENCE HIGHCONFIDENCE JDXU MALWARE1 MALWARE@#3QDIC5QXJ8FOP OCCAMY POSSIBLETHREAT QVM19 R003C0WE920 SCORE SIGGEN9 SUSPICIOUS PE SYMMI THEMIDA TROJANBANKER UNSAFE WACATAC 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!7985FE8E502B 20200811 6.0.6.653
CrowdStrike win/malicious_confidence_80% (W) 20190702 1.0
Alibaba TrojanDownloader:Win32/Buerak.9b3aa2c1 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:BankerX-gen [Trj] 20200811 18.4.3895.0
Kingsoft 20200811 2013.8.14.323
Tencent Win32.Trojan-downloader.Buerak.Ajbx 20200811 1.0.0.1
静态指标
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 个事件)
section
section .themida
section .boot
One or more processes crashed (6 个事件)
Time & API Arguments Status Return Repeated
1620773331.022249
__exception__
stacktrace:
7985fe8e502b2cf4ae79603bd030f600+0x381e62 @ 0x400b1e62
7985fe8e502b2cf4ae79603bd030f600+0x2b8e4c @ 0x3ffe8e4c

registers.esp: 3603848
registers.edi: 1071071232
registers.eax: 3603848
registers.ebp: 3603928
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 2010805291
registers.ecx: 360513536
exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x778eb727
success 0 0
1620773331.100249
__exception__
stacktrace:

                
            
            
            
registers.esp: 3603968
registers.edi: 3747338
registers.eax: 1750617430
registers.ebp: 1071071232
registers.edx: 22614
registers.ebx: 0
registers.esi: 13
registers.ecx: 20
exception.instruction_r: ed e9 48 73 00 00 34 f5 dd 53 00 5d 00 e5 3b 01
exception.symbol: 7985fe8e502b2cf4ae79603bd030f600+0x3b0fb3
exception.instruction: in eax, dx
exception.module: 7985fe8e502b2cf4ae79603bd030f600.exe
exception.exception_code: 0xc0000096
exception.offset: 3870643
exception.address: 0x400e0fb3
success 0 0
1620773331.100249
__exception__
stacktrace:

                
            
            
            
registers.esp: 3603968
registers.edi: 3747338
registers.eax: 1447909480
registers.ebp: 1071071232
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
exception.instruction_r: ed e9 12 4b 02 00 c3 e9 2c 78 03 00 4a 6a 4a 40
exception.symbol: 7985fe8e502b2cf4ae79603bd030f600+0x3824c2
exception.instruction: in eax, dx
exception.module: 7985fe8e502b2cf4ae79603bd030f600.exe
exception.exception_code: 0xc0000096
exception.offset: 3679426
exception.address: 0x400b24c2
success 0 0
1620773392.647124
__exception__
stacktrace:
errorresponder+0x381e62 @ 0x3f701e62
errorresponder+0x2b8e4c @ 0x3f638e4c

registers.esp: 3079936
registers.edi: 1060913152
registers.eax: 3079936
registers.ebp: 3080016
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 2010805291
registers.ecx: 3932160000
exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x778eb727
success 0 0
1620773392.725124
__exception__
stacktrace:

                
            
            
            
registers.esp: 3080056
registers.edi: 5713385
registers.eax: 1750617430
registers.ebp: 1060913152
registers.edx: 22614
registers.ebx: 0
registers.esi: 13
registers.ecx: 20
exception.instruction_r: ed e9 48 73 00 00 34 f5 dd 53 00 5d 00 e5 3b 01
exception.symbol: errorresponder+0x3b0fb3
exception.instruction: in eax, dx
exception.module: errorResponder.exe
exception.exception_code: 0xc0000096
exception.offset: 3870643
exception.address: 0x3f730fb3
success 0 0
1620773392.725124
__exception__
stacktrace:

                
            
            
            
registers.esp: 3080056
registers.edi: 5713385
registers.eax: 1447909480
registers.ebp: 1060913152
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
exception.instruction_r: ed e9 12 4b 02 00 c3 e9 2c 78 03 00 4a 6a 4a 40
exception.symbol: errorresponder+0x3824c2
exception.instruction: in eax, dx
exception.module: errorResponder.exe
exception.exception_code: 0xc0000096
exception.offset: 3679426
exception.address: 0x3f7024c2
success 0 0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (12 个事件)
Time & API Arguments Status Return Repeated
1620773331.022249
NtProtectVirtualMemory
process_identifier: 1948
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77dcf000
success 0 0
1620773331.022249
NtProtectVirtualMemory
process_identifier: 1948
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d40000
success 0 0
1620773331.132249
NtProtectVirtualMemory
process_identifier: 1948
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x3fd37000
success 0 0
1620773331.132249
NtProtectVirtualMemory
process_identifier: 1948
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x3fd37000
success 0 0
1620773331.132249
NtProtectVirtualMemory
process_identifier: 1948
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x3fd37000
success 0 0
1620773331.147249
NtProtectVirtualMemory
process_identifier: 1948
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x3fd37000
success 0 0
1620773392.647124
NtProtectVirtualMemory
process_identifier: 324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77dcf000
success 0 0
1620773392.647124
NtProtectVirtualMemory
process_identifier: 324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d40000
success 0 0
1620773392.741124
NtProtectVirtualMemory
process_identifier: 324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x3f387000
success 0 0
1620773392.741124
NtProtectVirtualMemory
process_identifier: 324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x3f387000
success 0 0
1620773392.741124
NtProtectVirtualMemory
process_identifier: 324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x3f387000
success 0 0
1620773392.772124
NtProtectVirtualMemory
process_identifier: 324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x3f387000
success 0 0
Creates executable files on the filesystem (1 个事件)
file C:\ProgramData\ErrorResponder\errorResponder.exe
Drops an executable to the user AppData folder (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\7985fe8e502b2cf4ae79603bd030f600.exe
The binary likely contains encrypted or compressed data indicative of a packer (7 个事件)
entropy 7.957099783187681 section {'size_of_data': '0x00003800', 'virtual_address': '0x00001000', 'entropy': 7.957099783187681, 'name': ' ', 'virtual_size': '0x00005f94'} description A section with a high entropy has been found
entropy 7.7156375343838475 section {'size_of_data': '0x00000800', 'virtual_address': '0x00007000', 'entropy': 7.7156375343838475, 'name': ' ', 'virtual_size': '0x00000b18'} description A section with a high entropy has been found
entropy 6.954639916407042 section {'size_of_data': '0x00000600', 'virtual_address': '0x00008000', 'entropy': 6.954639916407042, 'name': ' ', 'virtual_size': '0x000017f8'} description A section with a high entropy has been found
entropy 7.425952471957579 section {'size_of_data': '0x00000800', 'virtual_address': '0x0000a000', 'entropy': 7.425952471957579, 'name': ' ', 'virtual_size': '0x00000764'} description A section with a high entropy has been found
entropy 7.959512124800706 section {'size_of_data': '0x00005800', 'virtual_address': '0x0000b000', 'entropy': 7.959512124800706, 'name': ' ', 'virtual_size': '0x0001b592'} description A section with a high entropy has been found
entropy 7.9567261005427925 section {'size_of_data': '0x00255600', 'virtual_address': '0x0042c000', 'entropy': 7.9567261005427925, 'name': '.boot', 'virtual_size': '0x00255600'} description A section with a high entropy has been found
entropy 0.9567099567099567 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (3 个事件)
host 172.217.24.14
host 203.208.40.66
host 203.208.41.65
Checks for the presence of known windows from debuggers and forensic tools (50 out of 102 个事件)
Time & API Arguments Status Return Repeated
1620773331.069249
FindWindowA
class_name: RegmonClass
window_name:
failed 0 0
1620773331.069249
FindWindowA
class_name: RegmonClass
window_name:
failed 0 0
1620773331.069249
FindWindowA
class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620773331.069249
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620773331.100249
FindWindowA
class_name: FilemonClass
window_name:
failed 0 0
1620773331.100249
FindWindowA
class_name: FilemonClass
window_name:
failed 0 0
1620773331.100249
FindWindowA
class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620773331.100249
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620773331.100249
FindWindowA
class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
failed 0 0
1620773335.100249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773335.100249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773335.413249
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620773335.725249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773335.725249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773335.725249
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620773339.725249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773339.725249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773340.038249
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620773340.350249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773340.350249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773340.350249
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620773344.350249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773344.350249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773344.663249
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620773344.975249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773344.975249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773344.975249
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620773348.975249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773348.975249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773349.288249
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620773349.600249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773349.600249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773349.600249
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620773353.600249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773353.600249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773353.913249
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620773354.225249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773354.225249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773354.225249
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620773358.225249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773358.225249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773358.538249
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620773358.850249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773358.850249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773358.850249
FindWindowA
class_name: PROCMON_WINDOW_CLASS
window_name:
failed 0 0
1620773362.850249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773362.850249
FindWindowA
class_name: Regmonclass
window_name:
failed 0 0
1620773363.163249
FindWindowA
class_name: 18467-41
window_name:
failed 0 0
1620773363.475249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
1620773363.475249
FindWindowA
class_name: Filemonclass
window_name:
failed 0 0
Checks the version of Bios, possibly for anti-virtualization (2 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Installs itself for autorun at Windows startup (1 个事件)
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell reg_value explorer.exe, "C:\ProgramData\ErrorResponder\errorResponder.exe"
Detects Virtual Machines through their custom firmware (1 个事件)
Time & API Arguments Status Return Repeated
1620773331.100249
NtQuerySystemInformation
information_class: 76 (SystemFirmwareTableInformation)
failed 3221225507 0
Detects VMWare through the in instruction feature (1 个事件)
Time & API Arguments Status Return Repeated
1620773331.100249
__exception__
stacktrace:

                
            
            
            
registers.esp: 3603968
registers.edi: 3747338
registers.eax: 1447909480
registers.ebp: 1071071232
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
exception.instruction_r: ed e9 12 4b 02 00 c3 e9 2c 78 03 00 4a 6a 4a 40
exception.symbol: 7985fe8e502b2cf4ae79603bd030f600+0x3824c2
exception.instruction: in eax, dx
exception.module: 7985fe8e502b2cf4ae79603bd030f600.exe
exception.exception_code: 0xc0000096
exception.offset: 3679426
exception.address: 0x400b24c2
success 0 0
File has been identified by 56 AntiVirus engines on VirusTotal as malicious (50 out of 56 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Symmi.95363
FireEye Generic.mg.7985fe8e502b2cf4
Qihoo-360 Generic/HEUR/QVM19.1.13ED.Malware.Gen
McAfee Artemis!7985FE8E502B
Malwarebytes Trojan.Dropper.Enigma
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
CrowdStrike win/malicious_confidence_80% (W)
Alibaba TrojanDownloader:Win32/Buerak.9b3aa2c1
K7GW Trojan ( 005664dd1 )
K7AntiVirus Trojan ( 005664dd1 )
TrendMicro TROJ_GEN.R003C0WE920
BitDefenderTheta AI:Packer.127A001A1F
Cyren W32/Trojan.JDXU-1111
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:BankerX-gen [Trj]
GData Gen:Variant.Symmi.95363
Kaspersky Trojan-Downloader.Win32.Buerak.my
BitDefender Gen:Variant.Symmi.95363
NANO-Antivirus Virus.Win32.Gen-Crypt.ccnc
Paloalto generic.ml
AegisLab Trojan.Win32.Generic.4!c
Rising Downloader.Buerak!8.115B3 (CLOUD)
Ad-Aware Gen:Variant.Symmi.95363
Emsisoft Gen:Variant.Symmi.95363 (B)
Comodo Malware@#3qdic5qxj8fop
F-Secure Trojan.TR/AD.Behavior.gnhpi
DrWeb Trojan.Siggen9.45588
Zillya Trojan.Themida.Win32.31432
Invincea heuristic
Sophos Mal/Generic-S
SentinelOne DFI - Suspicious PE
Jiangmin TrojanDownloader.Buerak.ep
Webroot W32.Trojan.Gen
Avira TR/AD.Behavior.gnhpi
Antiy-AVL Trojan/Win32.Wacatac
Arcabit Trojan.Symmi.D17483
ViRobot Trojan.Win32.Z.Symmi.2603008
ZoneAlarm Trojan-Downloader.Win32.Buerak.my
Microsoft Trojan:Win32/Occamy.AA
Cynet Malicious (score: 85)
AhnLab-V3 Malware/Win32.Generic.C4089775
VBA32 BScope.TrojanBanker.Banbra
ALYac Gen:Variant.Symmi.95363
ESET-NOD32 a variant of Win32/Packed.Themida.HLP
TrendMicro-HouseCall TROJ_GEN.R003C0WE920
Tencent Win32.Trojan-downloader.Buerak.Ajbx
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 216.58.200.46:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-04-19 17:42:51

Imports

Library kernel32.dll:
0x40027070 GetModuleHandleA
Library ntdll.dll:
0x40027078 strncmp

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 58367 224.0.0.252 5355
192.168.56.101 61680 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51379 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.