5.6
高危

0f75f6670487368f4ba9f5cf419f8f96433a2c4176bd2d07c4a12d0c83963abb

831d4a721603de375526e83516add339.exe

分析耗时

143s

最近分析

文件大小

801.5KB
静态报毒 动态报毒 AI SCORE=88 ALI2000015 ANDROM AUTOG AXJL BSCOPE CLASSIC CLIPPER CONFIDENCE DELFIH DELFINJECT DELPHILESS DXCV ENDE ENEZ FAREIT GAMARUE GENERICKDZ HIGH CONFIDENCE HTEEXR KRYPTIK MALWARE@#2GZ96MJOXVSZ3 PDJWO R03BC0DI720 S + TROJ S15671540 SCORE SUSGEN SUSPICIOUS PE UNSAFE WKRK X2094 YGW@AKSM12II ZELPHIF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Fareit-FYT!831D4A721603 20200926 6.0.6.653
Alibaba Trojan:Win32/DelfInject.ali2000015 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20200926 18.4.3895.0
Tencent Win32.Backdoor.Androm.Dxcv 20200926 1.0.0.1
Kingsoft 20200926 2013.8.14.323
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:3742748006&cup2hreq=d22261ea20821964b02174ba8339de6b0eff2f0e3d18a008544065c188fbafbb
Performs some HTTP requests (4 个事件)
request HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
request HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619668816&mv=m&mvi=1&pl=23&shardbypass=yes
request HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=4639103e8e3fb126&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619668816&mv=m
request POST https://update.googleapis.com/service/update2?cup2key=10:3742748006&cup2hreq=d22261ea20821964b02174ba8339de6b0eff2f0e3d18a008544065c188fbafbb
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:3742748006&cup2hreq=d22261ea20821964b02174ba8339de6b0eff2f0e3d18a008544065c188fbafbb
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619685946.59425
NtAllocateVirtualMemory
process_identifier: 3036
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00350000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.620423209779085 section {'size_of_data': '0x0004c800', 'virtual_address': '0x00081000', 'entropy': 7.620423209779085, 'name': '.rsrc', 'virtual_size': '0x0004c688'} description A section with a high entropy has been found
entropy 0.38226108682073706 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 62 AntiVirus engines on VirusTotal as malicious (50 out of 62 个事件)
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKDZ.69764
FireEye Generic.mg.831d4a721603de37
CAT-QuickHeal Trojan.DelfIH.S15671540
McAfee Fareit-FYT!831D4A721603
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
K7AntiVirus Trojan ( 0056d6531 )
Alibaba Trojan:Win32/DelfInject.ali2000015
K7GW Trojan ( 0056d6531 )
Cybereason malicious.b3f62b
Arcabit Trojan.Generic.D11084
TrendMicro TROJ_GEN.R03BC0DI720
Cyren W32/Trojan.WKRK-5750
Symantec Trojan.Gen.MBT
APEX Malicious
Paloalto generic.ml
ClamAV Win.Trojan.Gamarue-9634191-0
Kaspersky HEUR:Backdoor.Win32.Androm.gen
BitDefender Trojan.GenericKDZ.69764
NANO-Antivirus Trojan.Win32.Androm.hteexr
ViRobot Trojan.Win32.Z.Injector.820736.W
Avast Win32:Trojan-gen
Tencent Win32.Backdoor.Androm.Dxcv
Ad-Aware Trojan.GenericKDZ.69764
Emsisoft Trojan.GenericKDZ.69764 (B)
Comodo Malware@#2gz96mjoxvsz3
F-Secure Trojan.TR/Injector.pdjwo
DrWeb Trojan.Clipper.8
Zillya Trojan.Injector.Win32.765578
Invincea Mal/Generic-S + Troj/AutoG-IX
McAfee-GW-Edition BehavesLike.Win32.Fareit.cc
Sophos Troj/AutoG-IX
SentinelOne DFI - Suspicious PE
Jiangmin Backdoor.Androm.axjl
Avira TR/Injector.pdjwo
eGambit Unsafe.AI_Score_99%
Antiy-AVL Trojan[Backdoor]/Win32.Androm
Microsoft Trojan:Win32/DelfInject.AR!MTB
AegisLab Trojan.Win32.Androm.m!c
ZoneAlarm HEUR:Backdoor.Win32.Androm.gen
GData Trojan.GenericKDZ.69764
Cynet Malicious (score: 100)
AhnLab-V3 Suspicious/Win.Delphiless.X2094
Acronis suspicious
VBA32 BScope.Trojan.Kryptik
ALYac Trojan.GenericKDZ.69764
MAX malware (ai score=88)
Malwarebytes Trojan.MalPack.DLF
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 172.217.160.110:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x475150 VirtualFree
0x475154 VirtualAlloc
0x475158 LocalFree
0x47515c LocalAlloc
0x475160 GetVersion
0x475164 GetCurrentThreadId
0x475170 VirtualQuery
0x475174 WideCharToMultiByte
0x47517c MultiByteToWideChar
0x475180 lstrlenA
0x475184 lstrcpynA
0x475188 LoadLibraryExA
0x47518c GetThreadLocale
0x475190 GetStartupInfoA
0x475194 GetProcAddress
0x475198 GetModuleHandleA
0x47519c GetModuleFileNameA
0x4751a0 GetLocaleInfoA
0x4751a4 GetLastError
0x4751ac GetCommandLineA
0x4751b0 FreeLibrary
0x4751b4 FindFirstFileA
0x4751b8 FindClose
0x4751bc ExitProcess
0x4751c0 WriteFile
0x4751c8 RtlUnwind
0x4751cc RaiseException
0x4751d0 GetStdHandle
Library user32.dll:
0x4751d8 GetKeyboardType
0x4751dc LoadStringA
0x4751e0 MessageBoxA
0x4751e4 CharNextA
Library advapi32.dll:
0x4751ec RegQueryValueExA
0x4751f0 RegOpenKeyExA
0x4751f4 RegCloseKey
Library oleaut32.dll:
0x4751fc SysFreeString
0x475200 SysReAllocStringLen
0x475204 SysAllocStringLen
Library kernel32.dll:
0x47520c TlsSetValue
0x475210 TlsGetValue
0x475214 LocalAlloc
0x475218 GetModuleHandleA
Library advapi32.dll:
0x475220 RegQueryValueExA
0x475224 RegOpenKeyExA
0x475228 RegCloseKey
Library kernel32.dll:
0x475230 lstrcpyA
0x475234 WriteFile
0x475238 WaitForSingleObject
0x47523c VirtualQuery
0x475240 VirtualProtect
0x475244 VirtualAlloc
0x475248 Sleep
0x47524c SizeofResource
0x475250 SetThreadLocale
0x475254 SetFilePointer
0x475258 SetEvent
0x47525c SetErrorMode
0x475260 SetEndOfFile
0x475264 ResetEvent
0x475268 ReadFile
0x47526c MulDiv
0x475270 LockResource
0x475274 LoadResource
0x475278 LoadLibraryA
0x475284 GlobalUnlock
0x475288 GlobalReAlloc
0x47528c GlobalHandle
0x475290 GlobalLock
0x475294 GlobalFree
0x475298 GlobalFindAtomA
0x47529c GlobalDeleteAtom
0x4752a0 GlobalAlloc
0x4752a4 GlobalAddAtomA
0x4752a8 GetVersionExA
0x4752ac GetVersion
0x4752b0 GetTickCount
0x4752b4 GetThreadLocale
0x4752b8 GetSystemInfo
0x4752bc GetStringTypeExA
0x4752c0 GetStdHandle
0x4752c4 GetProcAddress
0x4752c8 GetModuleHandleA
0x4752cc GetModuleFileNameA
0x4752d0 GetLocaleInfoA
0x4752d4 GetLocalTime
0x4752d8 GetLastError
0x4752dc GetFullPathNameA
0x4752e0 GetFileAttributesA
0x4752e4 GetDiskFreeSpaceA
0x4752e8 GetDateFormatA
0x4752ec GetCurrentThreadId
0x4752f0 GetCurrentProcessId
0x4752f4 GetCPInfo
0x4752f8 GetACP
0x4752fc FreeResource
0x475300 InterlockedExchange
0x475304 FreeLibrary
0x475308 FormatMessageA
0x47530c FindResourceA
0x475310 FindNextFileA
0x475314 FindFirstFileA
0x475318 FindClose
0x475324 EnumCalendarInfoA
0x475330 CreateThread
0x475334 CreateFileA
0x475338 CreateEventA
0x47533c CompareStringA
0x475340 CloseHandle
Library version.dll:
0x475348 VerQueryValueA
0x475350 GetFileVersionInfoA
Library gdi32.dll:
0x475358 UnrealizeObject
0x47535c StretchBlt
0x475360 SetWindowOrgEx
0x475364 SetViewportOrgEx
0x475368 SetTextColor
0x47536c SetStretchBltMode
0x475370 SetROP2
0x475374 SetPixel
0x475378 SetDIBColorTable
0x47537c SetBrushOrgEx
0x475380 SetBkMode
0x475384 SetBkColor
0x475388 SelectPalette
0x47538c SelectObject
0x475390 SelectClipRgn
0x475394 SaveDC
0x475398 RestoreDC
0x47539c Rectangle
0x4753a0 RectVisible
0x4753a4 RealizePalette
0x4753a8 PatBlt
0x4753ac MoveToEx
0x4753b0 MaskBlt
0x4753b4 LineTo
0x4753b8 IntersectClipRect
0x4753bc GetWindowOrgEx
0x4753c0 GetTextMetricsA
0x4753cc GetStockObject
0x4753d0 GetPixel
0x4753d4 GetPaletteEntries
0x4753d8 GetObjectA
0x4753dc GetDeviceCaps
0x4753e0 GetDIBits
0x4753e4 GetDIBColorTable
0x4753e8 GetDCOrgEx
0x4753f0 GetClipRgn
0x4753f4 GetClipBox
0x4753f8 GetBrushOrgEx
0x4753fc GetBitmapBits
0x475400 ExtTextOutA
0x475404 ExcludeClipRect
0x475408 DeleteObject
0x47540c DeleteDC
0x475410 CreateSolidBrush
0x475414 CreateRectRgn
0x475418 CreatePenIndirect
0x47541c CreatePalette
0x475424 CreateFontIndirectA
0x475428 CreateDIBitmap
0x47542c CreateDIBSection
0x475430 CreateCompatibleDC
0x475438 CreateBrushIndirect
0x47543c CreateBitmap
0x475440 BitBlt
Library user32.dll:
0x475448 CreateWindowExA
0x47544c WindowFromPoint
0x475450 WinHelpA
0x475454 WaitMessage
0x475458 UpdateWindow
0x47545c UnregisterClassA
0x475460 UnhookWindowsHookEx
0x475464 TranslateMessage
0x47546c TrackPopupMenu
0x475474 ShowWindow
0x475478 ShowScrollBar
0x47547c ShowOwnedPopups
0x475480 ShowCursor
0x475484 SetWindowsHookExA
0x475488 SetWindowTextA
0x47548c SetWindowPos
0x475490 SetWindowPlacement
0x475494 SetWindowLongA
0x475498 SetTimer
0x47549c SetScrollRange
0x4754a0 SetScrollPos
0x4754a4 SetScrollInfo
0x4754a8 SetRect
0x4754ac SetPropA
0x4754b0 SetParent
0x4754b4 SetMenuItemInfoA
0x4754b8 SetMenu
0x4754bc SetForegroundWindow
0x4754c0 SetFocus
0x4754c4 SetCursor
0x4754c8 SetClassLongA
0x4754cc SetCapture
0x4754d0 SetActiveWindow
0x4754d4 SendMessageA
0x4754d8 ScrollWindow
0x4754dc ScreenToClient
0x4754e0 RemovePropA
0x4754e4 RemoveMenu
0x4754e8 ReleaseDC
0x4754ec ReleaseCapture
0x4754f8 RegisterClassA
0x4754fc RedrawWindow
0x475500 PtInRect
0x475504 PostQuitMessage
0x475508 PostMessageA
0x47550c PeekMessageA
0x475510 OffsetRect
0x475514 OemToCharA
0x475518 MessageBoxA
0x47551c MapWindowPoints
0x475520 MapVirtualKeyA
0x475524 LoadStringA
0x475528 LoadKeyboardLayoutA
0x47552c LoadIconA
0x475530 LoadCursorA
0x475534 LoadBitmapA
0x475538 KillTimer
0x47553c IsZoomed
0x475540 IsWindowVisible
0x475544 IsWindowEnabled
0x475548 IsWindow
0x47554c IsRectEmpty
0x475550 IsIconic
0x475554 IsDialogMessageA
0x475558 IsChild
0x47555c InvalidateRect
0x475560 IntersectRect
0x475564 InsertMenuItemA
0x475568 InsertMenuA
0x47556c InflateRect
0x475574 GetWindowTextA
0x475578 GetWindowRect
0x47557c GetWindowPlacement
0x475580 GetWindowLongA
0x475584 GetWindowDC
0x475588 GetTopWindow
0x47558c GetSystemMetrics
0x475590 GetSystemMenu
0x475594 GetSysColorBrush
0x475598 GetSysColor
0x47559c GetSubMenu
0x4755a0 GetScrollRange
0x4755a4 GetScrollPos
0x4755a8 GetScrollInfo
0x4755ac GetPropA
0x4755b0 GetParent
0x4755b4 GetWindow
0x4755b8 GetMenuStringA
0x4755bc GetMenuState
0x4755c0 GetMenuItemInfoA
0x4755c4 GetMenuItemID
0x4755c8 GetMenuItemCount
0x4755cc GetMenu
0x4755d0 GetLastActivePopup
0x4755d4 GetKeyboardState
0x4755dc GetKeyboardLayout
0x4755e0 GetKeyState
0x4755e4 GetKeyNameTextA
0x4755e8 GetIconInfo
0x4755ec GetForegroundWindow
0x4755f0 GetFocus
0x4755f4 GetDlgItem
0x4755f8 GetDesktopWindow
0x4755fc GetDCEx
0x475600 GetDC
0x475604 GetCursorPos
0x475608 GetCursor
0x47560c GetClientRect
0x475610 GetClassNameA
0x475614 GetClassInfoA
0x475618 GetCapture
0x47561c GetActiveWindow
0x475620 FrameRect
0x475624 FindWindowA
0x475628 FillRect
0x47562c EqualRect
0x475630 EnumWindows
0x475634 EnumThreadWindows
0x475638 EndPaint
0x47563c EnableWindow
0x475640 EnableScrollBar
0x475644 EnableMenuItem
0x475648 DrawTextA
0x47564c DrawMenuBar
0x475650 DrawIconEx
0x475654 DrawIcon
0x475658 DrawFrameControl
0x47565c DrawFocusRect
0x475660 DrawEdge
0x475664 DispatchMessageA
0x475668 DestroyWindow
0x47566c DestroyMenu
0x475670 DestroyIcon
0x475674 DestroyCursor
0x475678 DeleteMenu
0x47567c DefWindowProcA
0x475680 DefMDIChildProcA
0x475684 DefFrameProcA
0x475688 CreatePopupMenu
0x47568c CreateMenu
0x475690 CreateIcon
0x475694 ClientToScreen
0x475698 CheckMenuItem
0x47569c CallWindowProcA
0x4756a0 CallNextHookEx
0x4756a4 BeginPaint
0x4756a8 CharNextA
0x4756ac CharLowerBuffA
0x4756b0 CharLowerA
0x4756b4 CharToOemA
0x4756b8 AdjustWindowRectEx
Library kernel32.dll:
0x4756c4 Sleep
Library oleaut32.dll:
0x4756cc SafeArrayPtrOfIndex
0x4756d0 SafeArrayGetUBound
0x4756d4 SafeArrayGetLBound
0x4756d8 SafeArrayCreate
0x4756dc VariantChangeType
0x4756e0 VariantCopy
0x4756e4 VariantClear
0x4756e8 VariantInit
Library comctl32.dll:
0x4756f8 ImageList_Write
0x4756fc ImageList_Read
0x47570c ImageList_DragMove
0x475710 ImageList_DragLeave
0x475714 ImageList_DragEnter
0x475718 ImageList_EndDrag
0x47571c ImageList_BeginDrag
0x475720 ImageList_Remove
0x475724 ImageList_DrawEx
0x475728 ImageList_Replace
0x47572c ImageList_Draw
0x47573c ImageList_Add
0x475744 ImageList_Destroy
0x475748 ImageList_Create
0x47574c InitCommonControls
Library comdlg32.dll:
0x475754 GetOpenFileNameA
Library kernel32.dll:

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49183 113.108.239.194 r1---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49184 113.108.239.196 r3---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49181 203.208.41.34 update.googleapis.com 443
192.168.56.101 49182 203.208.41.65 redirector.gvt1.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 53500 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 56743 114.114.114.114 53
192.168.56.101 58070 114.114.114.114 53
192.168.56.101 60088 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 60215 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 53210 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 54991 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355

HTTP & HTTPS Requests

URI Data
http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: redirector.gvt1.com

http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=4639103e8e3fb126&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619668816&mv=m
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=4639103e8e3fb126&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619668816&mv=m HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r3---sn-j5o7dn7e.gvt1.com

http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619668816&mv=m&mvi=1&pl=23&shardbypass=yes
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619668816&mv=m&mvi=1&pl=23&shardbypass=yes HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r1---sn-j5o7dn7e.gvt1.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.