8.6
极危

a7e27cc38a39ff242da39d05e04b95ea9b656829dfe2e90e8226351da8813d7d

7e415d5a1b1235491cb698eb14817d31.exe

分析耗时

93s

最近分析

文件大小

43.0KB
静态报毒 动态报毒 100% AI SCORE=100 AIDETECT AUTO CLOUD CONFIDENCE CQW@ASUXFEC DELSHAD DLDER ELDORADO EXORCIST FILECODER GDSDA GENASOM HIGH CONFIDENCE HPDMYQ MALICIOUS PE MALWARE2 MALWARE@#15XCLASQKRCNW MALWAREX O+4OFF0H88E R + TROJ RAAS RANSOMWARE SAVE SCORE STATIC AI SUSGEN TRRT TUGMC UNSAFE ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Ransom:Win32/DelShad.4bf11a2e 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_100% (W) 20210203 1.0
Baidu 20190318 1.0.0.2
Kingsoft 20210314 2017.9.26.565
McAfee Ransomware-HAV!7E415D5A1B12 20210314 6.0.6.653
Tencent Win32.Trojan.Raas.Auto 20210314 1.0.0.1
Avast Win32:MalwareX-gen [Trj] 20210314 21.1.5827.0
静态指标
Queries for the computername (19 个事件)
Time & API Arguments Status Return Repeated
1619681603.81425
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681604.15825
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681604.17425
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681604.20525
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681604.22125
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681614.845375
GetComputerNameA
computer_name: OSKAR-PC
success 1 0
1619681614.845375
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681618.674
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681621.611125
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681624.173625
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681626.829875
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681629.533
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681632.25175
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681635.3135
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681649.14175
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681652.0015
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681654.767125
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681657.6265
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1619681678.079625
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
Checks if process is being debugged by a debugger (1 个事件)
Time & API Arguments Status Return Repeated
1619681604.09625
IsDebuggerPresent
failed 0 0
Command line console output was observed (20 个事件)
Time & API Arguments Status Return Repeated
1619681604.84625
WriteConsoleA
buffer: ERROR: Description = Initialization failure
console_handle: 0x0000000b
success 1 0
1619681610.267
WriteConsoleW
buffer: 'wbadmin' 不是内部或外部命令,也不是可运行的程序 或批处理文件。
console_handle: 0x0000000b
success 1 0
1619681611.2985
WriteConsoleW
buffer: 'wbadmin' 不是内部或外部命令,也不是可运行的程序 或批处理文件。
console_handle: 0x0000000b
success 1 0
1619681612.346
WriteConsoleW
buffer: 'bcdedit.exe' 不是内部或外部命令,也不是可运行的程序 或批处理文件。
console_handle: 0x0000000b
success 1 0
1619681613.4235
WriteConsoleW
buffer: 'bcdedit.exe' 不是内部或外部命令,也不是可运行的程序 或批处理文件。
console_handle: 0x0000000b
success 1 0
1619681614.813375
WriteConsoleW
buffer: vssadmin 1.1 - 卷影复制服务管理命令行工具 (C) 版权所有 2001-2005 Microsoft Corp.
console_handle: 0x00000007
success 1 0
1619681614.845375
WriteConsoleW
buffer: 错误: 意外故障: 没有注册类
console_handle: 0x00000007
success 1 0
1619681617.141625
WriteConsoleW
buffer: 'C:\Windows\system32\vssvc.exe' 不是内部或外部命令,也不是可运行的程序 或批处理文件。
console_handle: 0x0000000b
success 1 0
1619681618.939
WriteConsoleW
buffer: 错误: 没有找到进程 "wxServer*"。
console_handle: 0x0000000b
success 1 0
1619681621.705125
WriteConsoleW
buffer: 错误: 没有找到进程 "wxServerView*"。
console_handle: 0x0000000b
success 1 0
1619681624.251625
WriteConsoleW
buffer: 错误: 没有找到进程 "sqlmangr*"。
console_handle: 0x0000000b
success 1 0
1619681626.923875
WriteConsoleW
buffer: 错误: 没有找到进程 "RAgui*"。
console_handle: 0x0000000b
success 1 0
1619681629.627
WriteConsoleW
buffer: 错误: 没有找到进程 "supervise*"。
console_handle: 0x0000000b
success 1 0
1619681632.36075
WriteConsoleW
buffer: 错误: 没有找到进程 "Culture*"。
console_handle: 0x0000000b
success 1 0
1619681635.4385
WriteConsoleW
buffer: 错误: 没有找到进程 "Defwatch*"。
console_handle: 0x0000000b
success 1 0
1619681649.25175
WriteConsoleW
buffer: 错误: 没有找到进程 "winword*"。
console_handle: 0x0000000b
success 1 0
1619681652.0795
WriteConsoleW
buffer: 错误: 没有找到进程 "QBW32*"。
console_handle: 0x0000000b
success 1 0
1619681654.861125
WriteConsoleW
buffer: 错误: 没有找到进程 "QBDBMgr*"。
console_handle: 0x0000000b
success 1 0
1619681657.7205
WriteConsoleW
buffer: 错误: 没有找到进程 "qbupdate*"。
console_handle: 0x0000000b
success 1 0
1619681678.188625
WriteConsoleW
buffer: 错误: 没有找到进程 "axlbridge*"。
console_handle: 0x0000000b
success 1 0
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1619649229.278334
GlobalMemoryStatusEx
success 1 0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:4008508066&cup2hreq=b688628c424c020cfc6f9d8e5d946c45eb8b7511127c1aea4662d33984ab820a
Performs some HTTP requests (4 个事件)
request HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
request HEAD http://r1---sn-j5o76n7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.105&mm=28&mn=sn-j5o76n7e&ms=nvh&mt=1619652494&mv=m&mvi=1&pl=23&shardbypass=yes
request HEAD http://r4---sn-j5o76n7l.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=4&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5oe7e&req_id=25a5e3ae1a625a50&cms_redirect=yes&ipbypass=yes&mip=59.50.85.28&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1619652494&mv=m
request POST https://update.googleapis.com/service/update2?cup2key=10:4008508066&cup2hreq=b688628c424c020cfc6f9d8e5d946c45eb8b7511127c1aea4662d33984ab820a
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:4008508066&cup2hreq=b688628c424c020cfc6f9d8e5d946c45eb8b7511127c1aea4662d33984ab820a
Creates a suspicious process (4 个事件)
cmdline cmd /C wmic.exe SHADOWCOPY DELETE /nointeractive
cmdline wmic.exe SHADOWCOPY DELETE /nointeractive
cmdline cmd /C bcdedit.exe /set {default} recoveryenabled No
cmdline cmd /C bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
Executes one or more WMI queries (2 个事件)
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
wmi SELECT * FROM Win32_ShadowCopy
A process created a hidden window (19 个事件)
Time & API Arguments Status Return Repeated
1619649230.950334
CreateProcessInternalW
thread_identifier: 1164
thread_handle: 0x00000100
process_identifier: 2288
current_directory:
filepath:
track: 1
command_line: cmd /C wmic.exe SHADOWCOPY DELETE /nointeractive
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649237.919334
CreateProcessInternalW
thread_identifier: 3160
thread_handle: 0x00000100
process_identifier: 3156
current_directory:
filepath:
track: 1
command_line: cmd /C wbadmin DELETE SYSTEMSTATEBACKUP
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649238.997334
CreateProcessInternalW
thread_identifier: 3240
thread_handle: 0x00000100
process_identifier: 3236
current_directory:
filepath:
track: 1
command_line: cmd /C wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649240.059334
CreateProcessInternalW
thread_identifier: 3324
thread_handle: 0x00000100
process_identifier: 3320
current_directory:
filepath:
track: 1
command_line: cmd /C bcdedit.exe /set {default} recoveryenabled No
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649241.122334
CreateProcessInternalW
thread_identifier: 3408
thread_handle: 0x00000100
process_identifier: 3404
current_directory:
filepath:
track: 1
command_line: cmd /C bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649242.247334
CreateProcessInternalW
thread_identifier: 3492
thread_handle: 0x00000100
process_identifier: 3488
current_directory:
filepath:
track: 1
command_line: cmd /C vssadmin.exe Delete Shadows /All /Quiet
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649244.825334
CreateProcessInternalW
thread_identifier: 3672
thread_handle: 0x00000100
process_identifier: 3668
current_directory:
filepath:
track: 1
command_line: cmd /C C:\Windows\system32\vssvc.exe
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649245.872334
CreateProcessInternalW
thread_identifier: 3752
thread_handle: 0x00000100
process_identifier: 3748
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM wxServer*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649248.934334
CreateProcessInternalW
thread_identifier: 3980
thread_handle: 0x00000100
process_identifier: 3976
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM wxServerView*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649251.528334
CreateProcessInternalW
thread_identifier: 1320
thread_handle: 0x00000100
process_identifier: 1880
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM sqlmangr*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649254.184334
CreateProcessInternalW
thread_identifier: 3268
thread_handle: 0x00000100
process_identifier: 3248
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM RAgui*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649256.887334
CreateProcessInternalW
thread_identifier: 3436
thread_handle: 0x00000100
process_identifier: 3420
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM supervise*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649259.559334
CreateProcessInternalW
thread_identifier: 3492
thread_handle: 0x00000100
process_identifier: 3540
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM Culture*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649262.278334
CreateProcessInternalW
thread_identifier: 3084
thread_handle: 0x00000100
process_identifier: 4072
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM Defwatch*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649276.419334
CreateProcessInternalW
thread_identifier: 2412
thread_handle: 0x00000100
process_identifier: 3384
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM winword*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649279.309334
CreateProcessInternalW
thread_identifier: 3120
thread_handle: 0x00000100
process_identifier: 3616
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM QBW32*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649282.044334
CreateProcessInternalW
thread_identifier: 3744
thread_handle: 0x00000100
process_identifier: 2956
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM QBDBMgr*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649284.872334
CreateProcessInternalW
thread_identifier: 1752
thread_handle: 0x00000100
process_identifier: 3208
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM qbupdate*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619649305.372334
CreateProcessInternalW
thread_identifier: 3964
thread_handle: 0x00000100
process_identifier: 3452
current_directory:
filepath:
track: 1
command_line: cmd /C taskkill /F /T /IM axlbridge*
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
Checks for the Locally Unique Identifier on the system for a suspicious privilege (13 个事件)
Time & API Arguments Status Return Repeated
1619681614.798375
LookupPrivilegeValueW
system_name:
privilege_name: SeBackupPrivilege
success 1 0
1619681618.658
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681621.596125
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681624.157625
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681626.813875
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681629.533
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681632.23575
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681635.2985
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681649.12675
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681651.9855
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681654.752125
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681657.6105
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1619681678.063625
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
Uses Windows utilities for basic Windows functionality (26 个事件)
cmdline cmd /C taskkill /F /T /IM axlbridge*
cmdline cmd /C taskkill /F /T /IM wxServerView*
cmdline cmd /C wmic.exe SHADOWCOPY DELETE /nointeractive
cmdline taskkill /F /T /IM qbupdate*
cmdline taskkill /F /T /IM Defwatch*
cmdline wmic.exe SHADOWCOPY DELETE /nointeractive
cmdline taskkill /F /T /IM axlbridge*
cmdline cmd /C taskkill /F /T /IM QBW32*
cmdline taskkill /F /T /IM Culture*
cmdline taskkill /F /T /IM wxServer*
cmdline taskkill /F /T /IM RAgui*
cmdline cmd /C taskkill /F /T /IM QBDBMgr*
cmdline cmd /C taskkill /F /T /IM qbupdate*
cmdline cmd /C taskkill /F /T /IM sqlmangr*
cmdline cmd /C taskkill /F /T /IM wxServer*
cmdline cmd /C taskkill /F /T /IM Culture*
cmdline taskkill /F /T /IM winword*
cmdline cmd /C taskkill /F /T /IM supervise*
cmdline cmd /C taskkill /F /T /IM Defwatch*
cmdline taskkill /F /T /IM supervise*
cmdline cmd /C taskkill /F /T /IM winword*
cmdline taskkill /F /T /IM sqlmangr*
cmdline taskkill /F /T /IM wxServerView*
cmdline cmd /C taskkill /F /T /IM RAgui*
cmdline taskkill /F /T /IM QBDBMgr*
cmdline taskkill /F /T /IM QBW32*
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Modifies boot configuration settings (2 个事件)
command cmd /c bcdedit.exe /set {default} recoveryenabled no
command cmd /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
Removes the Shadow Copy to avoid recovery of the system (2 个事件)
cmdline wmic.exe SHADOWCOPY DELETE /nointeractive
cmdline vssadmin.exe Delete Shadows /All /Quiet
Uses suspicious command line tools or Windows utilities (2 个事件)
cmdline cmd /C vssadmin.exe Delete Shadows /All /Quiet
cmdline vssadmin.exe Delete Shadows /All /Quiet
Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) (1 个事件)
dead_host 172.217.160.110:443
File has been identified by 54 AntiVirus engines on VirusTotal as malicious (50 out of 54 个事件)
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
DrWeb Trojan.Encoder.32183
MicroWorld-eScan Generic.Malware.FP!dld!2.E486CE52
CAT-QuickHeal Ransom.Exorcist.A4
ALYac Trojan.Ransom.Exorcist
Cylance Unsafe
Zillya Trojan.DelShad.Win32.588
AegisLab Trojan.Win32.DelShad.trrT
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0056b1d01 )
Alibaba Ransom:Win32/DelShad.4bf11a2e
K7GW Trojan ( 0056b1d01 )
CrowdStrike win/malicious_confidence_100% (W)
BitDefenderTheta Gen:NN.ZexaF.34608.cqW@aSUXFEc
Cyren W32/Exorcist.A.gen!Eldorado
ESET-NOD32 a variant of Win32/Filecoder.Exorcist.A
Paloalto generic.ml
Kaspersky HEUR:Trojan.Win32.DelShad.vho
BitDefender Generic.Malware.FP!dld!2.E486CE52
NANO-Antivirus Trojan.Win32.DelShad.hpdmyq
Rising Ransom.Agent!1.C2C9 (CLOUD)
Ad-Aware Generic.Malware.FP!dld!2.E486CE52
Emsisoft Generic.Malware.FP!dld!2.E486CE52 (B)
Comodo Malware@#15xclasqkrcnw
VIPRE Trojan.Win32.Generic!BT
TrendMicro Ransom.Win32.Exorcist.A
McAfee-GW-Edition BehavesLike.Win32.Generic.pm
FireEye Generic.mg.7e415d5a1b123549
Sophos Mal/Generic-R + Troj/Ransom-GBP
Ikarus Trojan-Ransom.Exorcist
GData Win32.Trojan-Ransom.Exorcist.A
Avira TR/Genasom.tugmc
Arcabit Generic.Malware.FP!dld!2.E486CE52
Microsoft Ransom:Win32/Genasom.MX!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.Dlder.C4167969
Acronis suspicious
McAfee Ransomware-HAV!7E415D5A1B12
MAX malware (ai score=100)
VBA32 Trojan.DelShad
Malwarebytes Ransom.Exorcist
Panda Trj/GdSda.A
TrendMicro-HouseCall Ransom.Win32.Exorcist.A
Tencent Win32.Trojan.Raas.Auto
Yandex Trojan.Filecoder!O+4OFF0h88E
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.104306632.susgen
Fortinet W32/Filecoder.7D31!tr.ransom
Webroot W32.Ransom.Exorcist
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-07-20 17:40:32

Imports

Library KERNEL32.dll:
0x406064 Sleep
0x40606c CreateThread
0x406070 GetSystemInfo
0x406074 QueueUserWorkItem
0x406078 MoveFileW
0x40607c FreeConsole
0x406080 VerSetConditionMask
0x406084 GetDiskFreeSpaceExW
0x40608c GetLastError
0x406090 GetDriveTypeW
0x406094 ReleaseMutex
0x40609c CreateMutexA
0x4060a0 GetCurrentProcess
0x4060a4 GetCurrentThread
0x4060a8 GetNativeSystemInfo
0x4060ac GetModuleFileNameW
0x4060b0 LocalAlloc
0x4060b4 LocalFree
0x4060b8 GetComputerNameA
0x4060bc VerifyVersionInfoW
0x4060c0 GetLocaleInfoA
0x4060c4 FindNextFileW
0x4060c8 FindFirstFileW
0x4060cc FindClose
0x4060d0 DeleteFileW
0x4060d8 WaitForSingleObject
0x4060dc SetFilePointerEx
0x4060e0 WideCharToMultiByte
0x4060e4 MultiByteToWideChar
0x4060e8 lstrlenW
0x4060ec lstrlenA
0x4060f0 VirtualFree
0x4060f4 VirtualAlloc
0x4060f8 CreateProcessW
0x4060fc ExitProcess
0x406100 GetProcessHeap
0x406104 HeapFree
0x406108 HeapAlloc
0x40610c CreatePipe
0x406110 CloseHandle
0x406114 WriteFile
0x406118 ReadFile
0x40611c GetFileSizeEx
0x406120 CreateFileW
0x406124 SetLastError
Library USER32.dll:
Library IPHLPAPI.DLL:
0x406058 GetIpNetTable
Library RstrtMgr.DLL:
0x40613c RmShutdown
0x406140 RmGetList
0x406144 RmStartSession
0x406148 RmEndSession
0x40614c RmRegisterResources
Library WININET.dll:
0x406178 HttpOpenRequestA
0x40617c HttpSendRequestA
0x406180 InternetCloseHandle
0x406184 InternetOpenA
0x406188 InternetConnectA
0x40618c InternetReadFile
Library NETAPI32.dll:
0x406130 NetShareEnum
0x406134 NetApiBufferFree
Library WS2_32.dll:
0x406194 closesocket
0x406198 connect
0x40619c htons
0x4061a0 inet_ntoa
0x4061a4 socket
0x4061a8 gethostbyname
0x4061ac WSACleanup
0x4061b0 WSAStartup
Library bcrypt.dll:
0x4061bc BCryptGetProperty
0x4061c4 BCryptCreateHash
0x4061c8 BCryptHashData
0x4061cc BCryptFinishHash
0x4061d0 BCryptDestroyHash
0x4061d8 BCryptGenRandom
0x4061dc BCryptDestroyKey
0x4061e4 BCryptImportKeyPair
0x4061e8 BCryptExportKey
0x4061ec BCryptEncrypt
0x4061f4 BCryptSetProperty
Library SHLWAPI.dll:
0x406160 StrStrW
Library CRYPT32.dll:
Library ADVAPI32.dll:
0x406008 InitializeAcl
0x40600c GetLengthSid
0x406010 FreeSid
0x406020 GetUserNameA
0x406028 DuplicateToken
0x40602c RegOpenKeyExA
0x406030 RegQueryValueExA
0x406038 AddAccessAllowedAce
0x40603c AccessCheck
0x406040 OpenThreadToken
0x406044 OpenProcessToken
Library SHELL32.dll:
0x406154 SHEmptyRecycleBinA
0x406158 ShellExecuteW

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49251 113.108.239.130 r1---sn-j5o76n7e.gvt1.com 80
192.168.56.101 49249 203.208.41.34 update.googleapis.com 443
192.168.56.101 49250 203.208.41.97 redirector.gvt1.com 80
192.168.56.101 49252 58.63.233.69 r4---sn-j5o76n7l.gvt1.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355

HTTP & HTTPS Requests

URI Data
http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: redirector.gvt1.com

http://r4---sn-j5o76n7l.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=4&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5oe7e&req_id=25a5e3ae1a625a50&cms_redirect=yes&ipbypass=yes&mip=59.50.85.28&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1619652494&mv=m
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=4&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5oe7e&req_id=25a5e3ae1a625a50&cms_redirect=yes&ipbypass=yes&mip=59.50.85.28&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1619652494&mv=m HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r4---sn-j5o76n7l.gvt1.com

http://r1---sn-j5o76n7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.105&mm=28&mn=sn-j5o76n7e&ms=nvh&mt=1619652494&mv=m&mvi=1&pl=23&shardbypass=yes
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.105&mm=28&mn=sn-j5o76n7e&ms=nvh&mt=1619652494&mv=m&mvi=1&pl=23&shardbypass=yes HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r1---sn-j5o76n7e.gvt1.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.