6.2
高危

75f5ed5c8523ec676fc8c66ceba33266354f449cba7b3452b8eb1c270007548f

7e1c26f5bd6717e297420a18e0dd52e6.exe

分析耗时

101s

最近分析

文件大小

1.2MB
静态报毒 动态报毒 AI SCORE=100 ARTEMIS ATTRIBUTE BSCOPE CASUR CONFIDENCE DOWNLOAD4 ELDORADO FAKEIE FLYSTUDIO GDSDA GENERIC PUA JB GENERICKD GRAYWARE HIGH CONFIDENCE HIGHCONFIDENCE MALICIOUS PE PNKFA01AVKJH SCORE UNSAFE ZEXAF ZUSY 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Malware-gen 20200925 18.4.3895.0
Tencent 20200925 1.0.0.1
Kingsoft 20200925 2013.8.14.323
McAfee Artemis!7E1C26F5BD67 20200924 6.0.6.653
CrowdStrike win/malicious_confidence_70% (W) 20190702 1.0
静态指标
The executable uses a known packer (1 个事件)
packer UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
The file contains an unknown PE resource name possibly indicative of a packer (2 个事件)
resource name TEXTINCLUDE
resource name WAVE
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Performs some HTTP requests (1 个事件)
request GET http://sell.fqapps.com/Public/soft/update.php?soft=hltaoke
Allocates read-write-execute memory (usually to unpack itself) (2 个事件)
Time & API Arguments Status Return Repeated
1620946616.8445
NtAllocateVirtualMemory
process_identifier: 360
region_size: 45056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x10000000
success 0 0
1620946616.8595
NtProtectVirtualMemory
process_identifier: 360
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x10000000
success 0 0
Foreign language identified in PE resource (50 out of 55 个事件)
name TEXTINCLUDE language LANG_CHINESE offset 0x005f3fac filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000151
name TEXTINCLUDE language LANG_CHINESE offset 0x005f3fac filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000151
name TEXTINCLUDE language LANG_CHINESE offset 0x005f3fac filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000151
name WAVE language LANG_CHINESE offset 0x005f4100 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00001448
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x005f8760 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_MENU language LANG_CHINESE offset 0x005f9658 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000284
name RT_MENU language LANG_CHINESE offset 0x005f9658 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000284
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_DIALOG language LANG_CHINESE offset 0x005fa8a0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000018c
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_STRING language LANG_CHINESE offset 0x005fb2e8 filetype SysEx File - sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000024
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x005fb398 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000022
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x005fb398 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000022
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x005fb398 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000022
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x005fb398 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000022
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x005fb398 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000022
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x005fb398 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000022
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x005fb398 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000022
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.929635575603319 section {'size_of_data': '0x0013d000', 'virtual_address': '0x004c3000', 'entropy': 7.929635575603319, 'name': 'UPX1', 'virtual_size': '0x0013d000'} description A section with a high entropy has been found
entropy 0.9929522317932654 description Overall entropy of this PE file is high
Repeatedly searches for a not-found process, you may want to run a web browser during analysis (30 个事件)
Time & API Arguments Status Return Repeated
1620946620.3595
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x000001b8
process_identifier: 360
failed 0 0
1620946620.3915
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x000001bc
process_identifier: 360
failed 0 0
1620946620.4065
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x000001cc
process_identifier: 360
failed 0 0
1620946620.4225
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000240
process_identifier: 360
failed 0 0
1620946620.4535
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000204
process_identifier: 360
failed 0 0
1620946620.4695
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000258
process_identifier: 360
failed 0 0
1620946620.5315
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x0000025c
process_identifier: 360
failed 0 0
1620946620.5475
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000260
process_identifier: 360
failed 0 0
1620946620.5625
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000264
process_identifier: 360
failed 0 0
1620946620.5945
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000268
process_identifier: 360
failed 0 0
1620946620.6255
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x0000026c
process_identifier: 360
failed 0 0
1620946620.6415
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000270
process_identifier: 360
failed 0 0
1620946620.6725
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000274
process_identifier: 360
failed 0 0
1620946620.7035
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x00000278
process_identifier: 360
failed 0 0
1620946620.7345
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x0000027c
process_identifier: 360
failed 0 0
1620946620.7505
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x00000280
process_identifier: 360
failed 0 0
1620946620.7815
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x00000284
process_identifier: 360
failed 0 0
1620946620.8125
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x00000288
process_identifier: 360
failed 0 0
1620946620.8125
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x0000028c
process_identifier: 360
failed 0 0
1620946620.8445
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x00000290
process_identifier: 360
failed 0 0
1620946620.8915
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x00000294
process_identifier: 360
failed 0 0
1620946620.9375
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x00000298
process_identifier: 360
failed 0 0
1620946621.0005
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x0000029c
process_identifier: 360
failed 0 0
1620946621.0315
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x000002a0
process_identifier: 360
failed 0 0
1620946621.0625
Process32NextW
process_name: 7e1c26f5bd6717e29742矕괛矺
snapshot_handle: 0x000002a4
process_identifier: 360
failed 0 0
1620946621.0945
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x000002a8
process_identifier: 360
failed 0 0
1620946621.1255
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x000002ac
process_identifier: 360
failed 0 0
1620946621.2035
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x000002b0
process_identifier: 360
failed 0 0
1620946621.2815
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x000002b4
process_identifier: 360
failed 0 0
1620946621.2975
Process32NextW
process_name: 7e1c26f5bd6717e297420a18e0dd52e6.exe
snapshot_handle: 0x000002b8
process_identifier: 360
failed 0 0
The executable is compressed using UPX (2 个事件)
section UPX0 description Section name indicates UPX
section UPX1 description Section name indicates UPX
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 39 AntiVirus engines on VirusTotal as malicious (39 个事件)
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.32738755
FireEye Generic.mg.7e1c26f5bd6717e2
ALYac Trojan.GenericKD.32738755
Cylance Unsafe
Sangfor Malware
Cybereason malicious.bbd6fd
Arcabit Trojan.Generic.D1F38DC3
Invincea Generic PUA JB (PUA)
Cyren W32/Trojan.CLL.gen!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Malware-gen
ClamAV Win.Malware.Zusy-6840460-0
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Trojan.GenericKD.32738755
Paloalto generic.ml
Ad-Aware Trojan.GenericKD.32738755
Sophos Generic PUA JB (PUA)
DrWeb Trojan.DownLoad4.13464
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition BehavesLike.Win32.Generic.tc
Emsisoft Trojan.GenericKD.32738755 (B)
SentinelOne DFI - Malicious PE
Antiy-AVL GrayWare/Win32.FlyStudio.a
Microsoft TrojanDownloader:Win32/FakeIE.B
AegisLab Trojan.Win32.Generic.4!c
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Trojan.GenericKD.32738755
McAfee Artemis!7E1C26F5BD67
MAX malware (ai score=100)
VBA32 BScope.Trojan.Casur
ESET-NOD32 a variant of Win32/Packed.FlyStudio.AA potentially unwanted
eGambit Unsafe.AI_Score_99%
Fortinet W32/Agent.65CA!tr
BitDefenderTheta Gen:NN.ZexaF.34254.pnKfa01AvkjH
AVG Win32:Malware-gen
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_70% (W)
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 216.58.200.238:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2017-09-16 20:11:51

Imports

Library KERNEL32.DLL:
0xa01fc4 LoadLibraryA
0xa01fc8 GetProcAddress
0xa01fcc VirtualProtect
0xa01fd0 VirtualAlloc
0xa01fd4 VirtualFree
0xa01fd8 ExitProcess
Library ADVAPI32.dll:
0xa01fe0 RegCloseKey
Library AVIFIL32.dll:
0xa01fe8 AVIStreamInfoA
Library COMCTL32.dll:
0xa01ff0
Library comdlg32.dll:
0xa01ff8 ChooseFontA
Library GDI32.dll:
0xa02000 PatBlt
Library MSIMG32.dll:
0xa02008 GradientFill
Library MSVFW32.dll:
0xa02010 DrawDibDraw
Library ole32.dll:
0xa02018 OleRun
Library OLEAUT32.dll:
Library oledlg.dll:
0xa02028
Library SHELL32.dll:
0xa02030 ShellExecuteA
Library USER32.dll:
0xa02038 GetDC
Library WINMM.dll:
0xa02040 PlaySoundA
Library WINSPOOL.DRV:
0xa02048 ClosePrinter
Library WLDAP32.dll:
0xa02050
Library WS2_32.dll:
0xa02058 recvfrom

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49175 120.77.89.88 sell.fqapps.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 61680 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 53380 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 58367 224.0.0.252 5355
192.168.56.101 60384 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355

HTTP & HTTPS Requests

URI Data
http://sell.fqapps.com/Public/soft/update.php?soft=hltaoke
GET /Public/soft/update.php?soft=hltaoke HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Language: zh-cn
Referer: http://sell.fqapps.com/Public/soft/update.php?soft=hltaoke
User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Host: sell.fqapps.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.