11.4
0-day

d968d93ec39951451366b025e043dcef49dffcf697e2f23a64bedf222c3ade55

83f35f784812c69575c29bad4a97ff12.exe

分析耗时

170s

最近分析

文件大小

870.5KB
静态报毒 动态报毒 2GW@ACGVP@KI AI SCORE=84 AIDETECTVM ALI2000015 ANDROM ATTRIBUTE AUTO CLOUD CONFIDENCE DELF DELFINJECT DELPHILESS DKMX EMOY EMSE FAREIT HIGH CONFIDENCE HIGHCONFIDENCE HOLPNY HPLOKI MALWARE1 MALWARE@#2OF2FJ4KHC1J7 MODERATE NANOCORE PASSWORDSTEALER QVM05 SCORE SIGGEN2 SMBD SUSPICIOUS PE TSCOPE TSPY UNSAFE X2091 ZELPHIF ZIPSK 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Trojan:Win32/DelfInject.ali2000015 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20200803 18.4.3895.0
Tencent Win32.Trojan.Inject.Auto 20200803 1.0.0.1
Kingsoft 20200803 2013.8.14.323
McAfee Fareit-FVZ!83F35F784812 20200803 6.0.6.653
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
静态指标
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 个事件)
section CODE
section DATA
section BSS
The executable uses a known packer (1 个事件)
packer BobSoft Mini Delphi -> BoB / BobSoft
One or more processes crashed (7 个事件)
Time & API Arguments Status Return Repeated
1619698735.653249
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x73a4e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x73a4ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x73a4b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x73a4b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x73a4ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x73a4aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x73a45511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x73a4559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74107f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74104de3
hhsyrbs+0x40a4d @ 0x440a4d
hhsyrbs+0x39254 @ 0x439254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe661485
success 0 0
1619698752.903249
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x73aae97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x73aaea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x73aab25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x73aab4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x73aaac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x73aaaed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x73aa5511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x73aa559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74167f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74164de3
hhsyrbs+0x40a4d @ 0x440a4d
hhsyrbs+0x39254 @ 0x439254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe761485
success 0 0
1619698755.497124
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x7405e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x7405ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x7405b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x7405b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x7405ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x7405aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x74055511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x7405559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x741b7f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x741b4de3
hhsyrbs+0x40a4d @ 0x440a4d
hhsyrbs+0x39254 @ 0x439254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe531485
success 0 0
1619698764.808999
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x73aae97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x73aaea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x73aab25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x73aab4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x73aaac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x73aaaed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x73aa5511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x73aa559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74167f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74164de3
hhsyrbs+0x40a4d @ 0x440a4d
hhsyrbs+0x39254 @ 0x439254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfcdc1485
success 0 0
1619698768.063187
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x73a5e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x73a5ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x73a5b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x73a5b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x73a5ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x73a5aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x73a55511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x73a5559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74117f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74114de3
hhsyrbs+0x40a4d @ 0x440a4d
hhsyrbs+0x39254 @ 0x439254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe561485
success 0 0
1619698785.77302
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x73aae97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x73aaea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x73aab25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x73aab4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x73aaac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x73aaaed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x73aa5511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x73aa559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74167f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74164de3
hhsyrbs+0x40a4d @ 0x440a4d
hhsyrbs+0x39254 @ 0x439254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe5a1485
success 0 0
1619698813.885688
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x7405e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x7405ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x7405b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x7405b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x7405ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x7405aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x74055511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x7405559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74167f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74164de3
hhsyrbs+0x40a4d @ 0x440a4d
hhsyrbs+0x39254 @ 0x439254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe641485
success 0 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself) (50 out of 238 个事件)
Time & API Arguments Status Return Repeated
1619685944.82725
NtAllocateVirtualMemory
process_identifier: 2732
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003d0000
success 0 0
1619685944.92125
NtProtectVirtualMemory
process_identifier: 2732
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00488000
success 0 0
1619685944.92125
NtAllocateVirtualMemory
process_identifier: 2732
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00770000
success 0 0
1619698724.574999
NtAllocateVirtualMemory
process_identifier: 2712
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003e0000
success 0 0
1619698724.574999
NtProtectVirtualMemory
process_identifier: 2712
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00488000
success 0 0
1619698724.574999
NtAllocateVirtualMemory
process_identifier: 2712
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01fd0000
success 0 0
1619698725.528249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
1619698725.856249
NtAllocateVirtualMemory
process_identifier: 2064
region_size: 917504
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x01e50000
success 0 0
1619698725.856249
NtAllocateVirtualMemory
process_identifier: 2064
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x01ef0000
success 0 0
1619698725.856249
NtAllocateVirtualMemory
process_identifier: 2064
region_size: 229376
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x004c0000
success 0 0
1619698725.856249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 118784
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x004c2000
success 0 0
1619698730.481249
NtAllocateVirtualMemory
process_identifier: 2064
region_size: 1114112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x01f30000
success 0 0
1619698730.481249
NtAllocateVirtualMemory
process_identifier: 2064
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02000000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d4f000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e42000
success 0 0
1619698735.653249
NtProtectVirtualMemory
process_identifier: 2064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619698725.496876
NtAllocateVirtualMemory
process_identifier: 284
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00370000
success 0 0
1619698725.496876
NtProtectVirtualMemory
process_identifier: 284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00488000
success 0 0
1619698725.496876
NtAllocateVirtualMemory
process_identifier: 284
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x006a0000
success 0 0
1619698752.403124
NtAllocateVirtualMemory
process_identifier: 3408
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003d0000
success 0 0
1619698752.403124
NtProtectVirtualMemory
process_identifier: 3408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00488000
success 0 0
1619698752.403124
NtAllocateVirtualMemory
process_identifier: 3408
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00570000
success 0 0
1619698752.731249
NtProtectVirtualMemory
process_identifier: 3480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
1619698752.731249
NtAllocateVirtualMemory
process_identifier: 3480
region_size: 458752
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x01d80000
success 0 0
1619698752.731249
NtAllocateVirtualMemory
process_identifier: 3480
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x01db0000
success 0 0
1619698752.731249
NtAllocateVirtualMemory
process_identifier: 3480
region_size: 229376
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x003c0000
success 0 0
1619698752.731249
NtProtectVirtualMemory
process_identifier: 3480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 118784
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619698752.731249
NtAllocateVirtualMemory
process_identifier: 3480
region_size: 1310720
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x01f50000
success 0 0
1619698752.731249
NtAllocateVirtualMemory
process_identifier: 3480
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02050000
success 0 0
1619698752.778249
NtProtectVirtualMemory
process_identifier: 3480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01f42000
success 0 0
1619698752.778249
NtProtectVirtualMemory
process_identifier: 3480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619698752.778249
NtProtectVirtualMemory
process_identifier: 3480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01f42000
success 0 0
1619698752.778249
NtProtectVirtualMemory
process_identifier: 3480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping (23 个事件)
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.5801271681916305 section {'size_of_data': '0x0003a800', 'virtual_address': '0x000a4000', 'entropy': 7.5801271681916305, 'name': '.rsrc', 'virtual_size': '0x0003a7b8'} description A section with a high entropy has been found
entropy 0.26912018401380106 description Overall entropy of this PE file is high
Expresses interest in specific running processes (1 个事件)
process hhsyrbs.exe
Repeatedly searches for a not-found process, you may want to run a web browser during analysis (16 个事件)
Time & API Arguments Status Return Repeated
1619685944.92125
Process32NextW
process_name: 83f35f784812c69575c29bad4a97ff12.exe
snapshot_handle: 0x000000f8
process_identifier: 2732
failed 0 0
1619698724.589999
Process32NextW
process_name: conhost.exe
snapshot_handle: 0x000000f8
process_identifier: 1300
failed 0 0
1619698752.183876
Process32NextW
process_name: dllhost.exe
snapshot_handle: 0x000004d0
process_identifier: 3352
failed 0 0
1619698752.403124
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x000000f8
process_identifier: 3408
failed 0 0
1619698754.933876
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x0000014c
process_identifier: 3540
failed 0 0
1619698755.089999
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x000000f8
process_identifier: 3656
failed 0 0
1619698758.574751
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x00000168
process_identifier: 3788
failed 0 0
1619698759.152876
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000f8
process_identifier: 3960
failed 0 0
1619698766.230626
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x000001b8
process_identifier: 4040
failed 0 0
1619698766.995062
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x000000f8
process_identifier: 2960
failed 0 0
1619698774.519564
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x000001d4
process_identifier: 1344
failed 0 0
1619698775.910872
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x000000f8
process_identifier: 3204
failed 0 0
1619698795.319769
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x00000304
process_identifier: 3404
failed 0 0
1619698800.043483
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x000000f8
process_identifier: 3820
failed 0 0
1619698822.782316
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x00000240
process_identifier: 4056
failed 0 0
1619698826.357446
Process32NextW
process_name: hhsyrbs.exe
snapshot_handle: 0x000000f8
process_identifier: 2632
failed 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Creates an Alternate Data Stream (ADS) (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe:ZoneIdentifier
Allocates execute permission to another process indicative of possible code injection (1 个事件)
Time & API Arguments Status Return Repeated
1619685945.89025
NtAllocateVirtualMemory
process_identifier: 1916
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0x00000100
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x000b0000
success 0 0
Deletes executed files from disk (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
Creates a thread using NtQueueApcThread in a remote process potentially indicative of process injection (2 个事件)
Process injection Process 2732 created a thread in remote process 1916
Time & API Arguments Status Return Repeated
1619685945.89025
NtQueueApcThread
thread_handle: 0x00000108
process_identifier: 1916
function_address: 0x000b05c0
parameter: 0x000c0000
success 0 0
Potential code injection by writing to the memory of another process (2 个事件)
Time & API Arguments Status Return Repeated
1619685945.89025
WriteProcessMemory
process_identifier: 1916
buffer: Q¹0d‹‹@ ‹@ ‹‹‹@‰$‹$YÃVWR¾§ÆgNè„Yƒøv· ¿Zwf;Ït ¿Ntf;ÏuƒÂƒè…Àt‹ÎÁá‹þÁïϾ:Ï3ñBHué_‹Æ^ÃU‹ìQQ‹MSVW…Ét;¸MZf9u1‹A<Át*8PEu"‹@xƒeüÁ‹x‹X$‹p ‹@ùÙñ‰Eø…Àu 3À_^[ÉËM‹Eü‹†ÑèOÿÿÿ;E t ÿEü‹Eü;Eøràë׋Eü·C‹‡EëÊU‹ìQSW3ÿWWjWjh@ÿuÿV‹Øƒûÿu3Àë&WWWS‰}üÿV0W‹}EüPWÿu SÿV SÿV3À9}ü”À_[ÉÅÉtè•…Àt3Éf‰ÃU‹ììV‹ð…äüÿÿP3ÀPPjPÿVl…À…Žj\Xf‰Eü3Àj.f‰EþXjvf‰EðXf‰EòjbXf‰EôjsXf‰Eö3Àf‰EøUü…äüÿÿèÖ‹U è΍UðèÆÿu…ìþÿÿÿuPÿVxƒÄ …äüÿÿPÿV…ìþÿÿPèÂ@P…ìþÿÿP…äüÿÿPèîþÿÿƒÄ^ÉÃU‹ìì,j:XjZf‰EÜXjof‰EÞXjnf‰EàXjef‰EâXjIf‰EäXjdf‰EæXjef‰EèXjnf‰EêXjtf‰EìXjif‰EîXjff‰EðXjif‰EòXf‰EôjeXf‰EöjrXf‰Eø3Àf‰Eú…Ôýÿÿ謍UÜè÷EÿPÆEÿèPEÿP…ÔýÿÿPè?þÿÿƒÄÉÃU‹ìQƒeüV‹ðEüPÿuèþYY…Àtƒ}ütÿuüPÿu è þÿÿƒÄ …Àt3À@ë3À^ÉÃU‹ììSV‹ð‹Ï…øýÿÿè'‹Èè(þÿÿ3ÛS…øýÿÿPÿVWÿV8] uWÿu‹Æè~ÿÿÿYY‹Øë €} u5SWÿuÿWÿV(3ۃøÿ‹Ï•Ãèªþÿÿƒûu9]u WÿV(ƒÈPWÿV,3À@ë3À^[ÉÃU‹ìƒìSVWèsüÿÿ‹ø…ÿ„"h"¿ŠWèÌüÿÿ‹ØYY…Û„ jh0h„jÿӋð…ö„ñh¼Û«½W‰~`‰^@è•üÿÿhÒ¼‰W‰F$è‡üÿÿh|QgjW‰F(èyüÿÿhëI”W‰F,èküÿÿh•å©—W‰F0è]üÿÿh¥°(W‰F4èOüÿÿh)·W‰F8èAüÿÿh[uŠðW‰FDè3üÿÿƒÄ@‹Øhd†óuW‰^ è üÿÿh¢¦aëW‰F èüÿÿhÕOd"W‰Fèüÿÿhy.ÔW‰Fèöûÿÿh±÷W‰FèèûÿÿheóW÷W‰FèÚûÿÿh¯4P“W‰FèÌûÿÿh{=#W‰F<è¾ûÿÿƒÄ@hOû~ W‰Fè­ûÿÿhà=!6W‰FHèŸûÿÿhh‰#W‰è’ûÿÿ‰FLhÍeWè„ûÿÿhÓ1ÆVW‰FPèvûÿÿh7œ½W‰FTèhûÿÿh£-ãW‰FXèZûÿÿ‰F\ƒÄ8EðPÇEðshelÇEôl32ÿӋø…ÿt"hÀåz°W‰~dè,ûÿÿhêêºW‰FlèûÿÿƒÄ‰FpEøPÇEøuserfÇEü32ÆEþÿV ‹ø…ÿtAhqV°0W‰~hèìúÿÿhkV°0W‰FxèÞúÿÿh&cj—W‰FtèÐúÿÿh<cj—W‰F|èÂúÿÿƒÄ ‰†€‹Æë3À_^[ÉÃU‹ìƒì\V‹uW3ÿ;÷„îSè¤ýÿÿ‹Ø;ßu WÿDéՍ†‰EüPëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPF‰Eø‰E9>tYÿ¶¶ŽQP¾ ‹Ãè¾üÿÿ‰}3ÿƒÄ 9>t1jDE¤WPèjEèWPèüƒÄEèPE¤PWWj WWWWÿuÿS$9¾(t†lP†,Pÿu‹Ãè½úÿÿƒÄ 9¾tëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPÿuøÿSWÿSD[_3À^ÉÂU‹ìƒì SW3ÿWWjWjh€ÿu‰}øÿV‹Øƒûÿu3Àë>WSÿV‰Eô;Çt+jh0PWÿV@‰Eø;ÇtWMüQÿuô‰}üPSÿV‹Eü‹M ‰SÿV‹Eø_[É÷f‰f…ÒtV‹ð+ñƒÁ·f‰f…Òuñ^ÃU‹ìQQ‹E‰Eü‹EüE‰Eø‹Eü;Eøt‹EüŠM ˆ‹Eü@‰Eüëç‹EÉÃfƒ8V‹ðt ƒÆfƒ>u÷+ò· f‰ ƒÂf…Éuñ^ËD$Š@„Éuù+D$HÅÉu3ÀÃfƒ9‹Át ƒÀfƒ8u÷+ÁÑøÃ…Ét èÚÿÿÿ…ÀtDAþë fƒù\t ƒè·f…Éuï3ÀÃ
process_handle: 0x00000100
base_address: 0x000b0000
success 1 0
1619685945.89025
WriteProcessMemory
process_identifier: 1916
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\83f35f784812c69575c29bad4a97ff12.exeC:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe"C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\83f35f784812c69575c29bad4a97ff12.exe"
process_handle: 0x00000100
base_address: 0x000c0000
success 1 0
Used NtSetContextThread to modify a thread in a remote process indicative of process injection (16 个事件)
Process injection Process 2712 called NtSetContextThread to modify thread in remote process 2064
Process injection Process 3408 called NtSetContextThread to modify thread in remote process 3480
Process injection Process 3656 called NtSetContextThread to modify thread in remote process 3728
Process injection Process 3904 called NtSetContextThread to modify thread in remote process 3980
Process injection Process 2960 called NtSetContextThread to modify thread in remote process 2548
Process injection Process 3204 called NtSetContextThread to modify thread in remote process 3528
Process injection Process 3820 called NtSetContextThread to modify thread in remote process 3920
Process injection Process 2632 called NtSetContextThread to modify thread in remote process 796
Time & API Arguments Status Return Repeated
1619698724.621999
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2064
success 0 0
1619698752.497124
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3480
success 0 0
1619698755.121999
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3728
success 0 0
1619698759.511876
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3980
success 0 0
1619698767.338062
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2548
success 0 0
1619698776.441872
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3528
success 0 0
1619698803.355483
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3920
success 0 0
1619698827.623446
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 796
success 0 0
Resumed a suspended thread in a remote process potentially indicative of process injection (16 个事件)
Process injection Process 2712 resumed a thread in remote process 2064
Process injection Process 3408 resumed a thread in remote process 3480
Process injection Process 3656 resumed a thread in remote process 3728
Process injection Process 3904 resumed a thread in remote process 3980
Process injection Process 2960 resumed a thread in remote process 2548
Process injection Process 3204 resumed a thread in remote process 3528
Process injection Process 3820 resumed a thread in remote process 3920
Process injection Process 2632 resumed a thread in remote process 796
Time & API Arguments Status Return Repeated
1619698725.355999
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 2064
success 0 0
1619698752.590124
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 3480
success 0 0
1619698755.152999
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 3728
success 0 0
1619698759.824876
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 3980
success 0 0
1619698767.432062
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 2548
success 0 0
1619698778.394872
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 3528
success 0 0
1619698808.918483
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 3920
success 0 0
1619698830.873446
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 796
success 0 0
Executed a process and injected code into it, probably while unpacking (50 out of 69 个事件)
Time & API Arguments Status Return Repeated
1619685945.89025
CreateProcessInternalW
thread_identifier: 1940
thread_handle: 0x00000108
process_identifier: 1916
current_directory:
filepath: C:\Windows\System32\notepad.exe
track: 1
command_line:
filepath_r: C:\Windows\system32\notepad.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000100
inherit_handles: 0
success 1 0
1619685945.89025
NtAllocateVirtualMemory
process_identifier: 1916
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0x00000100
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x000b0000
success 0 0
1619685945.89025
NtAllocateVirtualMemory
process_identifier: 1916
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 4 (PAGE_READWRITE)
process_handle: 0x00000100
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x000c0000
success 0 0
1619685945.89025
WriteProcessMemory
process_identifier: 1916
buffer: Q¹0d‹‹@ ‹@ ‹‹‹@‰$‹$YÃVWR¾§ÆgNè„Yƒøv· ¿Zwf;Ït ¿Ntf;ÏuƒÂƒè…Àt‹ÎÁá‹þÁïϾ:Ï3ñBHué_‹Æ^ÃU‹ìQQ‹MSVW…Ét;¸MZf9u1‹A<Át*8PEu"‹@xƒeüÁ‹x‹X$‹p ‹@ùÙñ‰Eø…Àu 3À_^[ÉËM‹Eü‹†ÑèOÿÿÿ;E t ÿEü‹Eü;Eøràë׋Eü·C‹‡EëÊU‹ìQSW3ÿWWjWjh@ÿuÿV‹Øƒûÿu3Àë&WWWS‰}üÿV0W‹}EüPWÿu SÿV SÿV3À9}ü”À_[ÉÅÉtè•…Àt3Éf‰ÃU‹ììV‹ð…äüÿÿP3ÀPPjPÿVl…À…Žj\Xf‰Eü3Àj.f‰EþXjvf‰EðXf‰EòjbXf‰EôjsXf‰Eö3Àf‰EøUü…äüÿÿèÖ‹U è΍UðèÆÿu…ìþÿÿÿuPÿVxƒÄ …äüÿÿPÿV…ìþÿÿPèÂ@P…ìþÿÿP…äüÿÿPèîþÿÿƒÄ^ÉÃU‹ìì,j:XjZf‰EÜXjof‰EÞXjnf‰EàXjef‰EâXjIf‰EäXjdf‰EæXjef‰EèXjnf‰EêXjtf‰EìXjif‰EîXjff‰EðXjif‰EòXf‰EôjeXf‰EöjrXf‰Eø3Àf‰Eú…Ôýÿÿ謍UÜè÷EÿPÆEÿèPEÿP…ÔýÿÿPè?þÿÿƒÄÉÃU‹ìQƒeüV‹ðEüPÿuèþYY…Àtƒ}ütÿuüPÿu è þÿÿƒÄ …Àt3À@ë3À^ÉÃU‹ììSV‹ð‹Ï…øýÿÿè'‹Èè(þÿÿ3ÛS…øýÿÿPÿVWÿV8] uWÿu‹Æè~ÿÿÿYY‹Øë €} u5SWÿuÿWÿV(3ۃøÿ‹Ï•Ãèªþÿÿƒûu9]u WÿV(ƒÈPWÿV,3À@ë3À^[ÉÃU‹ìƒìSVWèsüÿÿ‹ø…ÿ„"h"¿ŠWèÌüÿÿ‹ØYY…Û„ jh0h„jÿӋð…ö„ñh¼Û«½W‰~`‰^@è•üÿÿhÒ¼‰W‰F$è‡üÿÿh|QgjW‰F(èyüÿÿhëI”W‰F,èküÿÿh•å©—W‰F0è]üÿÿh¥°(W‰F4èOüÿÿh)·W‰F8èAüÿÿh[uŠðW‰FDè3üÿÿƒÄ@‹Øhd†óuW‰^ è üÿÿh¢¦aëW‰F èüÿÿhÕOd"W‰Fèüÿÿhy.ÔW‰Fèöûÿÿh±÷W‰FèèûÿÿheóW÷W‰FèÚûÿÿh¯4P“W‰FèÌûÿÿh{=#W‰F<è¾ûÿÿƒÄ@hOû~ W‰Fè­ûÿÿhà=!6W‰FHèŸûÿÿhh‰#W‰è’ûÿÿ‰FLhÍeWè„ûÿÿhÓ1ÆVW‰FPèvûÿÿh7œ½W‰FTèhûÿÿh£-ãW‰FXèZûÿÿ‰F\ƒÄ8EðPÇEðshelÇEôl32ÿӋø…ÿt"hÀåz°W‰~dè,ûÿÿhêêºW‰FlèûÿÿƒÄ‰FpEøPÇEøuserfÇEü32ÆEþÿV ‹ø…ÿtAhqV°0W‰~hèìúÿÿhkV°0W‰FxèÞúÿÿh&cj—W‰FtèÐúÿÿh<cj—W‰F|èÂúÿÿƒÄ ‰†€‹Æë3À_^[ÉÃU‹ìƒì\V‹uW3ÿ;÷„îSè¤ýÿÿ‹Ø;ßu WÿDéՍ†‰EüPëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPF‰Eø‰E9>tYÿ¶¶ŽQP¾ ‹Ãè¾üÿÿ‰}3ÿƒÄ 9>t1jDE¤WPèjEèWPèüƒÄEèPE¤PWWj WWWWÿuÿS$9¾(t†lP†,Pÿu‹Ãè½úÿÿƒÄ 9¾tëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPÿuøÿSWÿSD[_3À^ÉÂU‹ìƒì SW3ÿWWjWjh€ÿu‰}øÿV‹Øƒûÿu3Àë>WSÿV‰Eô;Çt+jh0PWÿV@‰Eø;ÇtWMüQÿuô‰}üPSÿV‹Eü‹M ‰SÿV‹Eø_[É÷f‰f…ÒtV‹ð+ñƒÁ·f‰f…Òuñ^ÃU‹ìQQ‹E‰Eü‹EüE‰Eø‹Eü;Eøt‹EüŠM ˆ‹Eü@‰Eüëç‹EÉÃfƒ8V‹ðt ƒÆfƒ>u÷+ò· f‰ ƒÂf…Éuñ^ËD$Š@„Éuù+D$HÅÉu3ÀÃfƒ9‹Át ƒÀfƒ8u÷+ÁÑøÃ…Ét èÚÿÿÿ…ÀtDAþë fƒù\t ƒè·f…Éuï3ÀÃ
process_handle: 0x00000100
base_address: 0x000b0000
success 1 0
1619685945.89025
WriteProcessMemory
process_identifier: 1916
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\83f35f784812c69575c29bad4a97ff12.exeC:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe"C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\83f35f784812c69575c29bad4a97ff12.exe"
process_handle: 0x00000100
base_address: 0x000c0000
success 1 0
1619685946.266
CreateProcessInternalW
thread_identifier: 2632
thread_handle: 0x000000d0
process_identifier: 2712
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x000000cc
inherit_handles: 0
success 1 0
1619698724.605999
CreateProcessInternalW
thread_identifier: 1912
thread_handle: 0x00000108
process_identifier: 2064
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000100
inherit_handles: 0
success 1 0
1619698724.605999
NtUnmapViewOfSection
process_identifier: 2064
region_size: 4096
process_handle: 0x00000100
base_address: 0x00400000
success 0 0
1619698724.605999
NtMapViewOfSection
section_handle: 0x00000110
process_identifier: 2064
commit_size: 520192
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000100
allocation_type: 0 ()
section_offset: 0
view_size: 520192
base_address: 0x00400000
success 0 0
1619698724.621999
NtGetContextThread
thread_handle: 0x00000108
success 0 0
1619698724.621999
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2064
success 0 0
1619698725.355999
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 2064
success 0 0
1619698725.371999
CreateProcessInternalW
thread_identifier: 2040
thread_handle: 0x0000010c
process_identifier: 284
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe" 2 2064 21699234
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000011c
inherit_handles: 0
success 1 0
1619698752.261876
CreateProcessInternalW
thread_identifier: 3412
thread_handle: 0x000004d4
process_identifier: 3408
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x000004d8
inherit_handles: 0
success 1 0
1619698752.497124
CreateProcessInternalW
thread_identifier: 3484
thread_handle: 0x00000108
process_identifier: 3480
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000100
inherit_handles: 0
success 1 0
1619698752.497124
NtUnmapViewOfSection
process_identifier: 3480
region_size: 4096
process_handle: 0x00000100
base_address: 0x00400000
success 0 0
1619698752.497124
NtMapViewOfSection
section_handle: 0x00000110
process_identifier: 3480
commit_size: 520192
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000100
allocation_type: 0 ()
section_offset: 0
view_size: 520192
base_address: 0x00400000
success 0 0
1619698752.497124
NtGetContextThread
thread_handle: 0x00000108
success 0 0
1619698752.497124
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3480
success 0 0
1619698752.590124
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 3480
success 0 0
1619698752.606124
CreateProcessInternalW
thread_identifier: 3544
thread_handle: 0x0000010c
process_identifier: 3540
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe" 2 3480 21726468
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000011c
inherit_handles: 0
success 1 0
1619698754.933876
CreateProcessInternalW
thread_identifier: 3660
thread_handle: 0x00000150
process_identifier: 3656
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000154
inherit_handles: 0
success 1 0
1619698755.105999
CreateProcessInternalW
thread_identifier: 3732
thread_handle: 0x00000108
process_identifier: 3728
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000100
inherit_handles: 0
success 1 0
1619698755.105999
NtUnmapViewOfSection
process_identifier: 3728
region_size: 4096
process_handle: 0x00000100
base_address: 0x00400000
success 0 0
1619698755.105999
NtMapViewOfSection
section_handle: 0x00000110
process_identifier: 3728
commit_size: 520192
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000100
allocation_type: 0 ()
section_offset: 0
view_size: 520192
base_address: 0x00400000
success 0 0
1619698755.121999
NtGetContextThread
thread_handle: 0x00000108
success 0 0
1619698755.121999
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3728
success 0 0
1619698755.152999
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 3728
success 0 0
1619698755.152999
CreateProcessInternalW
thread_identifier: 3792
thread_handle: 0x0000010c
process_identifier: 3788
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe" 2 3728 21729031
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000011c
inherit_handles: 0
success 1 0
1619698758.589751
CreateProcessInternalW
thread_identifier: 3908
thread_handle: 0x0000016c
process_identifier: 3904
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000170
inherit_handles: 0
success 1 0
1619698759.511876
CreateProcessInternalW
thread_identifier: 3984
thread_handle: 0x00000108
process_identifier: 3980
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000100
inherit_handles: 0
success 1 0
1619698759.511876
NtUnmapViewOfSection
process_identifier: 3980
region_size: 4096
process_handle: 0x00000100
base_address: 0x00400000
success 0 0
1619698759.511876
NtMapViewOfSection
section_handle: 0x00000110
process_identifier: 3980
commit_size: 520192
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000100
allocation_type: 0 ()
section_offset: 0
view_size: 520192
base_address: 0x00400000
success 0 0
1619698759.511876
NtGetContextThread
thread_handle: 0x00000108
success 0 0
1619698759.511876
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3980
success 0 0
1619698759.824876
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 3980
success 0 0
1619698759.824876
CreateProcessInternalW
thread_identifier: 4044
thread_handle: 0x0000010c
process_identifier: 4040
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe" 2 3980 21733703
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000011c
inherit_handles: 0
success 1 0
1619698766.277626
CreateProcessInternalW
thread_identifier: 2604
thread_handle: 0x000001bc
process_identifier: 2960
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x000001c0
inherit_handles: 0
success 1 0
1619698767.026062
CreateProcessInternalW
thread_identifier: 2448
thread_handle: 0x00000108
process_identifier: 2548
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000100
inherit_handles: 0
success 1 0
1619698767.026062
NtUnmapViewOfSection
process_identifier: 2548
region_size: 4096
process_handle: 0x00000100
base_address: 0x00400000
success 0 0
1619698767.026062
NtMapViewOfSection
section_handle: 0x00000110
process_identifier: 2548
commit_size: 520192
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000100
allocation_type: 0 ()
section_offset: 0
view_size: 520192
base_address: 0x00400000
success 0 0
1619698767.338062
NtGetContextThread
thread_handle: 0x00000108
success 0 0
1619698767.338062
NtSetContextThread
thread_handle: 0x00000108
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4708144
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2548
success 0 0
1619698767.432062
NtResumeThread
thread_handle: 0x00000108
suspend_count: 1
process_identifier: 2548
success 0 0
1619698767.448062
CreateProcessInternalW
thread_identifier: 2576
thread_handle: 0x0000010c
process_identifier: 1344
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe" 2 2548 21741015
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000011c
inherit_handles: 0
success 1 0
1619698774.535564
CreateProcessInternalW
thread_identifier: 3424
thread_handle: 0x000001d8
process_identifier: 3204
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x000001dc
inherit_handles: 0
success 1 0
1619698775.956872
CreateProcessInternalW
thread_identifier: 3520
thread_handle: 0x00000108
process_identifier: 3528
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\hhsyrbs.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000100
inherit_handles: 0
success 1 0
1619698775.956872
NtUnmapViewOfSection
process_identifier: 3528
region_size: 4096
process_handle: 0x00000100
base_address: 0x00400000
success 0 0
1619698775.956872
NtMapViewOfSection
section_handle: 0x00000110
process_identifier: 3528
commit_size: 520192
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000100
allocation_type: 0 ()
section_offset: 0
view_size: 520192
base_address: 0x00400000
success 0 0
1619698776.441872
NtGetContextThread
thread_handle: 0x00000108
success 0 0
File has been identified by 59 AntiVirus engines on VirusTotal as malicious (50 out of 59 个事件)
Bkav W32.AIDetectVM.malware1
MicroWorld-eScan Trojan.Delf.FareIt.Gen.7
FireEye Generic.mg.83f35f784812c695
CAT-QuickHeal Backdoor.Androm
ALYac Trojan.Delf.FareIt.Gen.7
Cylance Unsafe
Zillya Trojan.Androm.Win32.1171
Sangfor Malware
K7AntiVirus Trojan ( 0056aeff1 )
Alibaba Trojan:Win32/DelfInject.ali2000015
K7GW Trojan ( 0056aeff1 )
Cybereason malicious.781ce6
Arcabit Trojan.Delf.FareIt.Gen.7
Invincea heuristic
BitDefenderTheta Gen:NN.ZelphiF.34144.2GW@aCGvP@ki
F-Prot W32/Injector.JFS
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Injector.EMSE
TrendMicro-HouseCall TSPY_HPLOKI.SMBD
Avast Win32:Trojan-gen
ClamAV Win.Dropper.Nanocore-9075385-0
GData Trojan.Delf.FareIt.Gen.7
Kaspersky HEUR:Backdoor.Win32.Androm.gen
BitDefender Trojan.Delf.FareIt.Gen.7
NANO-Antivirus Trojan.Win32.Androm.holpny
Paloalto generic.ml
ViRobot Trojan.Win32.Z.Injector.891392.U
Tencent Win32.Trojan.Inject.Auto
Ad-Aware Trojan.Delf.FareIt.Gen.7
Sophos Mal/Generic-S
Comodo Malware@#2of2fj4khc1j7
F-Secure Trojan.TR/Injector.zipsk
DrWeb Trojan.PWS.Siggen2.52313
VIPRE Trojan.Win32.Generic!BT
TrendMicro TSPY_HPLOKI.SMBD
SentinelOne DFI - Suspicious PE
Trapmine malicious.moderate.ml.score
Emsisoft Trojan.Delf.FareIt.Gen.7 (B)
APEX Malicious
Cyren W32/Injector.DKMX-0814
Avira TR/Injector.zipsk
Antiy-AVL Trojan[Backdoor]/Win32.Androm
Microsoft PWS:Win32/Fareit.AQ!MTB
Endgame malicious (high confidence)
AegisLab Trojan.Win32.Androm.m!c
ZoneAlarm HEUR:Backdoor.Win32.Androm.gen
Cynet Malicious (score: 100)
AhnLab-V3 Suspicious/Win.Delphiless.X2091
McAfee Fareit-FVZ!83F35F784812
MAX malware (ai score=84)
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 216.58.200.238:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x495164 VirtualFree
0x495168 VirtualAlloc
0x49516c LocalFree
0x495170 LocalAlloc
0x495174 GetVersion
0x495178 GetCurrentThreadId
0x495184 VirtualQuery
0x495188 WideCharToMultiByte
0x495190 MultiByteToWideChar
0x495194 lstrlenA
0x495198 lstrcpynA
0x49519c LoadLibraryExA
0x4951a0 GetThreadLocale
0x4951a4 GetStartupInfoA
0x4951a8 GetProcAddress
0x4951ac GetModuleHandleA
0x4951b0 GetModuleFileNameA
0x4951b4 GetLocaleInfoA
0x4951b8 GetLastError
0x4951c0 GetCommandLineA
0x4951c4 FreeLibrary
0x4951c8 FindFirstFileA
0x4951cc FindClose
0x4951d0 ExitProcess
0x4951d4 WriteFile
0x4951dc RtlUnwind
0x4951e0 RaiseException
0x4951e4 GetStdHandle
Library user32.dll:
0x4951ec GetKeyboardType
0x4951f0 LoadStringA
0x4951f4 MessageBoxA
0x4951f8 CharNextA
Library advapi32.dll:
0x495200 RegQueryValueExA
0x495204 RegOpenKeyExA
0x495208 RegCloseKey
Library oleaut32.dll:
0x495210 SysFreeString
0x495214 SysReAllocStringLen
0x495218 SysAllocStringLen
Library kernel32.dll:
0x495220 TlsSetValue
0x495224 TlsGetValue
0x495228 LocalAlloc
0x49522c GetModuleHandleA
Library advapi32.dll:
0x495234 RegQueryValueExA
0x495238 RegOpenKeyExA
0x49523c RegCloseKey
Library kernel32.dll:
0x495244 lstrcpyA
0x495248 WriteFile
0x49524c WaitForSingleObject
0x495250 VirtualQuery
0x495254 VirtualProtect
0x495258 VirtualAlloc
0x49525c Sleep
0x495260 SizeofResource
0x495264 SetThreadLocale
0x495268 SetFilePointer
0x49526c SetEvent
0x495270 SetErrorMode
0x495274 SetEndOfFile
0x495278 ResetEvent
0x49527c ReadFile
0x495280 MultiByteToWideChar
0x495284 MulDiv
0x495288 LockResource
0x49528c LoadResource
0x495290 LoadLibraryA
0x49529c GlobalUnlock
0x4952a0 GlobalSize
0x4952a4 GlobalReAlloc
0x4952a8 GlobalHandle
0x4952ac GlobalLock
0x4952b0 GlobalFree
0x4952b4 GlobalFindAtomA
0x4952b8 GlobalDeleteAtom
0x4952bc GlobalAlloc
0x4952c0 GlobalAddAtomA
0x4952c4 GetVersionExA
0x4952c8 GetVersion
0x4952cc GetUserDefaultLCID
0x4952d0 GetTickCount
0x4952d4 GetThreadLocale
0x4952d8 GetSystemInfo
0x4952dc GetStringTypeExA
0x4952e0 GetStdHandle
0x4952e4 GetProcAddress
0x4952e8 GetModuleHandleA
0x4952ec GetModuleFileNameA
0x4952f0 GetLocaleInfoA
0x4952f4 GetLocalTime
0x4952f8 GetLastError
0x4952fc GetFullPathNameA
0x495300 GetFileAttributesA
0x495304 GetDiskFreeSpaceA
0x495308 GetDateFormatA
0x49530c GetCurrentThreadId
0x495310 GetCurrentProcessId
0x495314 GetComputerNameA
0x495318 GetCPInfo
0x49531c GetACP
0x495320 FreeResource
0x495328 InterlockedExchange
0x495330 FreeLibrary
0x495334 FormatMessageA
0x495338 FindResourceA
0x49533c FindNextFileA
0x495340 FindFirstFileA
0x495344 FindClose
0x495350 EnumCalendarInfoA
0x49535c CreateThread
0x495360 CreateFileA
0x495364 CreateEventA
0x495368 CompareStringA
0x49536c CloseHandle
Library version.dll:
0x495374 VerQueryValueA
0x49537c GetFileVersionInfoA
Library gdi32.dll:
0x495384 UnrealizeObject
0x495388 StretchBlt
0x49538c SetWindowOrgEx
0x495390 SetWinMetaFileBits
0x495394 SetViewportOrgEx
0x495398 SetTextColor
0x49539c SetStretchBltMode
0x4953a0 SetROP2
0x4953a4 SetPixel
0x4953a8 SetMapMode
0x4953ac SetEnhMetaFileBits
0x4953b0 SetDIBColorTable
0x4953b4 SetBrushOrgEx
0x4953b8 SetBkMode
0x4953bc SetBkColor
0x4953c0 SetArcDirection
0x4953c4 SelectPalette
0x4953c8 SelectObject
0x4953cc SelectClipRgn
0x4953d0 SaveDC
0x4953d4 RestoreDC
0x4953d8 Rectangle
0x4953dc RectVisible
0x4953e0 RealizePalette
0x4953e4 Polyline
0x4953e8 PlayEnhMetaFile
0x4953ec PatBlt
0x4953f0 MoveToEx
0x4953f4 MaskBlt
0x4953f8 LineTo
0x4953fc LPtoDP
0x495400 IntersectClipRect
0x495404 GetWindowOrgEx
0x495408 GetWinMetaFileBits
0x49540c GetTextMetricsA
0x495418 GetStockObject
0x49541c GetPixel
0x495420 GetPaletteEntries
0x495424 GetObjectA
0x495434 GetEnhMetaFileBits
0x495438 GetDeviceCaps
0x49543c GetDIBits
0x495440 GetDIBColorTable
0x495444 GetDCOrgEx
0x49544c GetClipBox
0x495450 GetBrushOrgEx
0x495454 GetBitmapBits
0x495458 ExtTextOutA
0x49545c ExcludeClipRect
0x495460 DeleteObject
0x495464 DeleteEnhMetaFile
0x495468 DeleteDC
0x49546c CreateSolidBrush
0x495470 CreatePenIndirect
0x495474 CreatePalette
0x49547c CreateFontIndirectA
0x495480 CreateEnhMetaFileA
0x495484 CreateDIBitmap
0x495488 CreateDIBSection
0x49548c CreateCompatibleDC
0x495494 CreateBrushIndirect
0x495498 CreateBitmap
0x49549c CopyEnhMetaFileA
0x4954a0 CloseEnhMetaFile
0x4954a4 BitBlt
Library user32.dll:
0x4954ac CreateWindowExA
0x4954b0 WindowFromPoint
0x4954b4 WinHelpA
0x4954b8 WaitMessage
0x4954bc UpdateWindow
0x4954c0 UnregisterClassA
0x4954c4 UnhookWindowsHookEx
0x4954c8 TranslateMessage
0x4954d0 TrackPopupMenu
0x4954d8 ShowWindow
0x4954dc ShowScrollBar
0x4954e0 ShowOwnedPopups
0x4954e4 ShowCursor
0x4954e8 SetWindowsHookExA
0x4954ec SetWindowTextA
0x4954f0 SetWindowPos
0x4954f4 SetWindowPlacement
0x4954f8 SetWindowLongA
0x4954fc SetTimer
0x495500 SetScrollRange
0x495504 SetScrollPos
0x495508 SetScrollInfo
0x49550c SetRect
0x495510 SetPropA
0x495514 SetParent
0x495518 SetMenuItemInfoA
0x49551c SetMenu
0x495520 SetForegroundWindow
0x495524 SetFocus
0x495528 SetCursor
0x49552c SetClassLongA
0x495530 SetCapture
0x495534 SetActiveWindow
0x495538 SendMessageA
0x49553c ScrollWindow
0x495540 ScreenToClient
0x495544 RemovePropA
0x495548 RemoveMenu
0x49554c ReleaseDC
0x495550 ReleaseCapture
0x49555c RegisterClassA
0x495560 RedrawWindow
0x495564 PtInRect
0x495568 PostQuitMessage
0x49556c PostMessageA
0x495570 PeekMessageA
0x495574 OffsetRect
0x495578 OemToCharA
0x49557c MessageBoxA
0x495580 MapWindowPoints
0x495584 MapVirtualKeyA
0x495588 LoadStringA
0x49558c LoadKeyboardLayoutA
0x495590 LoadIconA
0x495594 LoadCursorA
0x495598 LoadBitmapA
0x49559c KillTimer
0x4955a0 IsZoomed
0x4955a4 IsWindowVisible
0x4955a8 IsWindowEnabled
0x4955ac IsWindow
0x4955b0 IsRectEmpty
0x4955b4 IsIconic
0x4955b8 IsDialogMessageA
0x4955bc IsChild
0x4955c0 InvalidateRect
0x4955c4 IntersectRect
0x4955c8 InsertMenuItemA
0x4955cc InsertMenuA
0x4955d0 InflateRect
0x4955d8 GetWindowTextA
0x4955dc GetWindowRect
0x4955e0 GetWindowPlacement
0x4955e4 GetWindowLongA
0x4955e8 GetWindowDC
0x4955ec GetTopWindow
0x4955f0 GetSystemMetrics
0x4955f4 GetSystemMenu
0x4955f8 GetSysColorBrush
0x4955fc GetSysColor
0x495600 GetSubMenu
0x495604 GetScrollRange
0x495608 GetScrollPos
0x49560c GetScrollInfo
0x495610 GetPropA
0x495614 GetParent
0x495618 GetWindow
0x49561c GetMessageTime
0x495620 GetMenuStringA
0x495624 GetMenuState
0x495628 GetMenuItemInfoA
0x49562c GetMenuItemID
0x495630 GetMenuItemCount
0x495634 GetMenu
0x495638 GetLastActivePopup
0x49563c GetKeyboardState
0x495644 GetKeyboardLayout
0x495648 GetKeyState
0x49564c GetKeyNameTextA
0x495650 GetIconInfo
0x495654 GetForegroundWindow
0x495658 GetFocus
0x49565c GetDlgItem
0x495660 GetDesktopWindow
0x495664 GetDCEx
0x495668 GetDC
0x49566c GetCursorPos
0x495670 GetCursor
0x495674 GetClipboardData
0x495678 GetClientRect
0x49567c GetClassNameA
0x495680 GetClassInfoA
0x495684 GetCapture
0x495688 GetActiveWindow
0x49568c FrameRect
0x495690 FindWindowA
0x495694 FillRect
0x495698 EqualRect
0x49569c EnumWindows
0x4956a0 EnumThreadWindows
0x4956a4 EndPaint
0x4956a8 EnableWindow
0x4956ac EnableScrollBar
0x4956b0 EnableMenuItem
0x4956b4 DrawTextA
0x4956b8 DrawMenuBar
0x4956bc DrawIconEx
0x4956c0 DrawIcon
0x4956c4 DrawFrameControl
0x4956c8 DrawFocusRect
0x4956cc DrawEdge
0x4956d0 DispatchMessageA
0x4956d4 DestroyWindow
0x4956d8 DestroyMenu
0x4956dc DestroyIcon
0x4956e0 DestroyCursor
0x4956e4 DeleteMenu
0x4956e8 DefWindowProcA
0x4956ec DefMDIChildProcA
0x4956f0 DefFrameProcA
0x4956f4 CreatePopupMenu
0x4956f8 CreateMenu
0x4956fc CreateIcon
0x495700 ClientToScreen
0x495704 CheckMenuItem
0x495708 CallWindowProcA
0x49570c CallNextHookEx
0x495710 BeginPaint
0x495714 CharNextA
0x495718 CharLowerBuffA
0x49571c CharLowerA
0x495720 CharUpperBuffA
0x495724 CharToOemA
0x495728 AdjustWindowRectEx
Library kernel32.dll:
0x495734 Sleep
Library oleaut32.dll:
0x49573c SafeArrayPtrOfIndex
0x495740 SafeArrayPutElement
0x495744 SafeArrayGetElement
0x49574c SafeArrayAccessData
0x495750 SafeArrayGetUBound
0x495754 SafeArrayGetLBound
0x495758 SafeArrayCreate
0x49575c VariantChangeType
0x495760 VariantCopyInd
0x495764 VariantCopy
0x495768 VariantClear
0x49576c VariantInit
Library ole32.dll:
0x495778 IsAccelerator
0x49577c OleDraw
0x495784 CoTaskMemFree
0x495788 ProgIDFromCLSID
0x49578c StringFromCLSID
0x495790 CoCreateInstance
0x495794 CoGetClassObject
0x495798 CoUninitialize
0x49579c CoInitialize
0x4957a0 IsEqualGUID
Library oleaut32.dll:
0x4957a8 CreateErrorInfo
0x4957ac GetErrorInfo
0x4957b0 SetErrorInfo
0x4957b4 GetActiveObject
0x4957b8 SysFreeString
Library comctl32.dll:
0x4957c8 ImageList_Write
0x4957cc ImageList_Read
0x4957dc ImageList_DragMove
0x4957e0 ImageList_DragLeave
0x4957e4 ImageList_DragEnter
0x4957e8 ImageList_EndDrag
0x4957ec ImageList_BeginDrag
0x4957f0 ImageList_Remove
0x4957f4 ImageList_DrawEx
0x4957f8 ImageList_Replace
0x4957fc ImageList_Draw
0x49580c ImageList_Add
0x495814 ImageList_Destroy
0x495818 ImageList_Create
0x49581c InitCommonControls
Library comdlg32.dll:
0x495824 GetOpenFileNameA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 58367 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.