5.6
高危

18b982afe0070b5089320ee7efc8ed314c9eea1fa75c8826eb9fa888a0351f92

7c7785777b1849e3f13381c4735948ac.exe

分析耗时

73s

最近分析

文件大小

127.5KB
静态报毒 动态报毒 100% A9+EONFUTQI AI SCORE=85 ATTRIBUTE BFAR BSCOPE CLASSIC CONFIDENCE ELDORADO FCNC FDA@8SYC9V GENCIRC GENETIC GISNHF HIGH CONFIDENCE HIGHCONFIDENCE HYW@AMYSLBI LOYEETRO MAREMOTEDX NETWIRE NETWIRED NETWIREDRC R297546 RAZY S + TROJ SCORE STATIC AI SUSGEN SUSPICIOUS PE UNSAFE WEECNAW WIRENET ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanSpy:Win32/NetWire.04638847 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Netwire-A [Trj] 20201228 21.1.5827.0
Tencent Malware.Win32.Gencirc.10b86445 20201228 1.0.0.1
Kingsoft 20201228 2017.9.26.565
McAfee PWS-FCNC!7C7785777B18 20201228 6.0.6.653
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
Checks if process is being debugged by a debugger (1 个事件)
Time & API Arguments Status Return Repeated
1619652924.784751
IsDebuggerPresent
failed 0 0
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1619649224.478822
GlobalMemoryStatusEx
success 1 0
行为判定
动态指标
Connects to a Dynamic DNS Domain (1 个事件)
domain automan.duckdns.org
Creates executable files on the filesystem (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Install\Host.exe
Drops a binary and executes it (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Install\Host.exe
Drops an executable to the user AppData folder (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Install\Host.exe
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Installs itself for autorun at Windows startup (1 个事件)
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\NetWire reg_value C:\Users\Administrator.Oskar-PC\AppData\Roaming\Install\Host.exe
Deletes executed files from disk (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Install\Host.exe
Creates known Netwire files, registry keys and/or mutexes (1 个事件)
regkey HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\NetWire
File has been identified by 62 AntiVirus engines on VirusTotal as malicious (50 out of 62 个事件)
Bkav W32.MarEmoteDX.Trojan
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Heur.IPZ.7
CAT-QuickHeal Trojan.Generic
ALYac Gen:Heur.IPZ.7
Cylance Unsafe
Sangfor Malware
K7AntiVirus Spyware ( 0055216c1 )
Alibaba TrojanSpy:Win32/NetWire.04638847
K7GW Spyware ( 0055216c1 )
Cybereason malicious.77b184
Arcabit Trojan.IPZ.7
BitDefenderTheta Gen:NN.ZexaF.34700.hyW@amYSLBi
Cyren W32/S-05f627f5!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Netwire-A [Trj]
ClamAV Win.Malware.Razy-6703914-0
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Gen:Heur.IPZ.7
NANO-Antivirus Trojan.Win32.NetWire.gisnhf
Paloalto generic.ml
Tencent Malware.Win32.Gencirc.10b86445
Ad-Aware Gen:Heur.IPZ.7
TACHYON Backdoor/W32.NetWire.130560
Sophos Mal/Generic-S + Troj/Agent-BFAR
Comodo TrojWare.Win32.Spy.Weecnaw.FDA@8syc9v
F-Secure Trojan.TR/Spy.Gen
DrWeb BackDoor.Wirenet.540
VIPRE Trojan.Win32.Generic!BT
TrendMicro Backdoor.Win32.NETWIRED.SMK
McAfee-GW-Edition BehavesLike.Win32.Generic.ch
FireEye Generic.mg.7c7785777b1849e3
Emsisoft Gen:Heur.IPZ.7 (B)
SentinelOne Static AI - Suspicious PE
Jiangmin Trojan.NetWire.mn
Webroot W32.Trojan.Gen
Avira TR/Spy.Gen
Antiy-AVL Trojan/Win32.NetWire
Gridinsoft Trojan.Win32.Agent.vb!s1
Microsoft Trojan:Win32/NetWire.BD!MTB
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Win32.Trojan.Netwire.C
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.NetWiredRC.R297546
Acronis suspicious
McAfee PWS-FCNC!7C7785777B18
MAX malware (ai score=85)
VBA32 BScope.TrojanSpy.Loyeetro
Malwarebytes Backdoor.NetWiredRC
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2019-10-30 16:25:44

Imports

Library ADVAPI32.DLL:
0x427344 CryptCreateHash
0x427348 CryptDestroyHash
0x42734c CryptGetHashParam
0x427350 CryptHashData
0x427354 CryptReleaseContext
0x427358 RegCloseKey
0x42735c RegCreateKeyExA
0x427360 RegDeleteKeyA
0x427364 RegDeleteValueA
0x427368 RegEnumKeyExA
0x42736c RegEnumValueA
0x427370 RegOpenKeyExA
0x427374 RegQueryValueExA
0x427378 RegSetValueExA
Library CRYPT32.DLL:
0x427380 CryptUnprotectData
Library GDI32.dll:
0x427388 BitBlt
0x427390 CreateCompatibleDC
0x427394 DeleteDC
0x427398 DeleteObject
0x42739c GetDIBits
0x4273a0 SelectObject
Library KERNEL32.dll:
0x4273a8 CloseHandle
0x4273ac CreateDirectoryA
0x4273b0 CreateFileA
0x4273b4 CreateMutexA
0x4273b8 CreatePipe
0x4273bc CreateProcessA
0x4273c4 DeleteFileA
0x4273cc ExitProcess
0x4273d4 FindClose
0x4273d8 FindFirstFileA
0x4273dc FindNextFileA
0x4273e0 FreeLibrary
0x4273e4 GetCommandLineA
0x4273e8 GetComputerNameA
0x4273ec GetCurrentProcessId
0x4273f0 GetCurrentThreadId
0x4273f4 GetDiskFreeSpaceExA
0x4273f8 GetDriveTypeA
0x4273fc GetFileAttributesA
0x427404 GetLastError
0x427408 GetLocalTime
0x427410 GetModuleFileNameA
0x427414 GetProcAddress
0x427418 GetProcessTimes
0x42741c GetStartupInfoA
0x427420 GetSystemInfo
0x427424 GetSystemTime
0x427428 GetTickCount
0x42742c GetVersionExA
0x42743c LoadLibraryA
0x427440 LocalFree
0x427444 MoveFileA
0x427448 OpenProcess
0x42744c PeekNamedPipe
0x427450 Process32First
0x427454 Process32Next
0x427458 ReadFile
0x42745c ReleaseMutex
0x427460 ResumeThread
0x427464 SetErrorMode
0x427468 SetFileAttributesA
0x42746c SetFilePointer
0x427470 Sleep
0x427474 TerminateProcess
0x427478 WideCharToMultiByte
0x42747c WriteFile
Library msvcrt.dll:
0x427484 _beginthreadex
0x427488 _filelengthi64
0x42748c _vscprintf
0x427490 _vsnprintf
0x427494 calloc
0x427498 fclose
0x42749c fflush
0x4274a0 fgetpos
0x4274a4 fgets
0x4274a8 fopen
0x4274ac fread
0x4274b0 free
0x4274b4 fsetpos
0x4274b8 fwrite
0x4274bc getenv
0x4274c0 malloc
0x4274c4 memcpy
0x4274c8 memset
0x4274cc realloc
0x4274d0 sprintf
0x4274d4 strchr
0x4274d8 strlen
Library NETAPI32.DLL:
0x4274e0 NetApiBufferFree
0x4274e4 NetWkstaGetInfo
Library SHELL32.DLL:
0x4274ec SHFileOperationA
0x4274f0 ShellExecuteA
Library USER32.dll:
0x4274f8 CreateWindowExA
0x4274fc DefWindowProcA
0x427500 DispatchMessageA
0x427504 EnumWindows
0x427508 GetDC
0x42750c GetDesktopWindow
0x427510 GetForegroundWindow
0x427514 GetKeyNameTextA
0x427518 GetKeyState
0x42751c GetKeyboardState
0x427520 GetLastInputInfo
0x427524 GetMessageA
0x427528 GetSystemMetrics
0x42752c GetWindowTextA
0x427530 IsWindowVisible
0x427534 MapVirtualKeyA
0x427538 PostQuitMessage
0x42753c RegisterClassExA
0x427540 ReleaseDC
0x427544 SendMessageA
0x427548 SetCursorPos
0x42754c SetWindowTextA
0x427550 ShowWindow
0x427554 ToAscii
0x427558 TranslateMessage
0x42755c keybd_event
0x427560 mouse_event
Library WS2_32.dll:
0x427568 WSACleanup
0x42756c WSAGetLastError
0x427570 WSAIoctl
0x427574 WSAStartup
0x427578 __WSAFDIsSet
0x42757c closesocket
0x427580 connect
0x427584 gethostbyname
0x427588 gethostname
0x42758c htons
0x427590 inet_ntoa
0x427594 ioctlsocket
0x427598 ntohs
0x42759c recv
0x4275a0 select
0x4275a4 send
0x4275a8 setsockopt
0x4275ac shutdown
0x4275b0 socket

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49176 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49177 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49179 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49180 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49181 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49182 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49183 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49184 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49185 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49186 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49187 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49189 192.169.69.26 automan.duckdns.org 3382
192.168.56.101 49191 192.169.69.26 automan.duckdns.org 3382

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51809 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.