7.0
高危

db78609b1448737cd1963b2266cf085dbbeb324611cdeb5e2beec42e77c79057

8a99d538017c1e1f88e0d98bdd48a2a9.exe

分析耗时

76s

最近分析

文件大小

132.1KB
静态报毒 动态报毒 100% 11HLRTH 7+T0DKSBAFQ AI SCORE=85 AUSL BSCOPE CONFIDENCE CRYPTERX DBZPS EMOTET EMOTETMLFNG GENCIRC GENERICKDZ GENETIC HFUC HIGH CONFIDENCE HSYMGK INJUKE JV19JPIUTRR KRYPTIK R + TROJ R349155 SCORE SUSGEN THHBEBO UNSAFE WACATAC WVCAY@0 YVIY ZENPAK 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Trojan:Win32/Injuke.b3b3e84c 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:CrypterX-gen [Trj] 20200906 18.4.3895.0
Kingsoft 20200906 2013.8.14.323
McAfee RDN/EmotetMLFNG 20200906 6.0.6.653
Tencent Malware.Win32.Gencirc.10cdee4a 20200906 1.0.0.1
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
Queries for the computername (1 个事件)
Time & API Arguments Status Return Repeated
1619686149.437886
GetComputerNameA
computer_name: OSKAR-PC
success 1 0
Uses Windows APIs to generate a cryptographic key (5 个事件)
Time & API Arguments Status Return Repeated
1619686133.875886
CryptGenKey
crypto_handle: 0x005a6040
algorithm_identifier: 0x0000660e ()
provider_handle: 0x005a5530
flags: 1
key: fSx’þeùµ$F㞐oH
success 1 0
1619686149.453886
CryptExportKey
crypto_handle: 0x005a6040
crypto_export_handle: 0x005a55f8
buffer: f¤¸jÿäà>a%-i~‡º !XѳÞd֔Y°a”$nã¦*4¾þM÷SÆ«ˆå 7ß‚XsÑ6¶±Î`ï`<çH·[‰¾Br²3=È@¿Ç0oړ*ƒg£¹9›x_3”nÌuòYJ
blob_type: 1
flags: 64
success 1 0
1619686185.109886
CryptExportKey
crypto_handle: 0x005a6040
crypto_export_handle: 0x005a55f8
buffer: f¤~âHozûgÙüç‹üêIüõÒªãâî‹8ãÞ© a¹ãÚÆä^T8ÏVqÛ`U;û¯ró‚ì2Ä`ùäb:Ášn­³2¡• 5ž_æǯ¯i’Ðò=‚âmB
blob_type: 1
flags: 64
success 1 0
1619686190.015886
CryptExportKey
crypto_handle: 0x005a6040
crypto_export_handle: 0x005a55f8
buffer: f¤æõ"<\M)K+píÏ©"9\ðÍ0ˆRý'CXJRX†¢øYÝüþ˜3KŸƒ’Œ¶‡†µÖÂÅ „Üï{iþ™bhy,†ÇØÎ{^fÁ£°LF™ì"ê¹²“
blob_type: 1
flags: 64
success 1 0
1619686196.015886
CryptExportKey
crypto_handle: 0x005a6040
crypto_export_handle: 0x005a55f8
buffer: f¤Þâu‹ƒi „Î˽!Ê}¡r[©¢EŸöP‡¤=ˆËúteÌQr^kãÓÒ§Uüª[&½ú%«øe¢hܞÎú ™xàY"<Ë2m‘±]ëï€l&ã³*&!Ë@éöv
blob_type: 1
flags: 64
success 1 0
The executable uses a known packer (1 个事件)
packer Armadillo v1.71
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619686133.218886
NtAllocateVirtualMemory
process_identifier: 2476
region_size: 36864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00520000
success 0 0
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping (1 个事件)
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1619686149.922886
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.469102753597492 section {'size_of_data': '0x0000a000', 'virtual_address': '0x00017000', 'entropy': 7.469102753597492, 'name': '.rsrc', 'virtual_size': '0x00009240'} description A section with a high entropy has been found
entropy 0.3125 description Overall entropy of this PE file is high
Expresses interest in specific running processes (1 个事件)
process 8a99d538017c1e1f88e0d98bdd48a2a9.exe
Reads the systems User Agent and subsequently performs requests (1 个事件)
Time & API Arguments Status Return Repeated
1619686149.593886
InternetOpenW
proxy_bypass:
access_type: 0
proxy_name:
flags: 0
user_agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
success 13369348 0
网络通信
Communicates with host for which no DNS query was performed (5 个事件)
host 116.202.234.183
host 137.119.36.33
host 172.217.24.14
host 2.58.16.85
host 69.30.203.214
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1619686152.500886
RegSetValueExA
key_handle: 0x00000398
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1619686152.500886
RegSetValueExA
key_handle: 0x00000398
value: ÀÇ?ZÜ<×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1619686152.500886
RegSetValueExA
key_handle: 0x00000398
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1619686152.500886
RegSetValueExW
key_handle: 0x00000398
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1619686152.500886
RegSetValueExA
key_handle: 0x000003b0
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1619686152.500886
RegSetValueExA
key_handle: 0x000003b0
value: ÀÇ?ZÜ<×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1619686152.500886
RegSetValueExA
key_handle: 0x000003b0
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1619686152.531886
RegSetValueExW
key_handle: 0x00000394
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
File has been identified by 56 AntiVirus engines on VirusTotal as malicious (50 out of 56 个事件)
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKDZ.69714
FireEye Generic.mg.8a99d538017c1e1f
CAT-QuickHeal Trojan.Injuke
Qihoo-360 Win32/Trojan.77b
ALYac Trojan.Agent.Emotet
Cylance Unsafe
Zillya Trojan.Emotet.Win32.24974
Sangfor Malware
K7AntiVirus Trojan ( 0056d4851 )
Alibaba Trojan:Win32/Injuke.b3b3e84c
K7GW Trojan ( 0056d4851 )
Cybereason malicious.62b24f
Arcabit Trojan.Generic.D11052
Invincea Mal/Generic-R + Troj/Emotet-CLR
Cyren W32/Trojan.YVIY-4358
Symantec Trojan.Emotet
APEX Malicious
Paloalto generic.ml
Kaspersky Trojan.Win32.Injuke.tlg
BitDefender Trojan.GenericKDZ.69714
NANO-Antivirus Trojan.Win32.Emotet.hsymgk
ViRobot Trojan.Win32.Z.Emotet.135288.C
Avast Win32:CrypterX-gen [Trj]
Rising Trojan.Kryptik!8.8 (TFE:5:Jv19jPIuTRR)
Ad-Aware Trojan.GenericKDZ.69714
Comodo TrojWare.Win32.Agent.wvcay@0
F-Secure Trojan.TR/Crypt.Agent.dbzps
DrWeb Trojan.Emotet.1005
VIPRE Trojan.Win32.Generic!BT
TrendMicro Trojan.Win32.WACATAC.THHBEBO
Sophos Troj/Emotet-CLR
Jiangmin Trojan.Banker.Emotet.ofh
Avira TR/Crypt.Agent.dbzps
Antiy-AVL Trojan/Win32.Injuke
Microsoft Trojan:Win32/Emotet.ARJ!MTB
AegisLab Trojan.Win32.Injuke.4!c
ZoneAlarm Trojan.Win32.Injuke.tlg
GData Win32.Trojan.PSE.11HLRTH
Cynet Malicious (score: 85)
AhnLab-V3 Malware/Win32.RL_Generic.R349155
McAfee RDN/EmotetMLFNG
MAX malware (ai score=85)
VBA32 BScope.Trojan.Downloader
Malwarebytes Trojan.MalPack.TRE
ESET-NOD32 a variant of Win32/Kryptik.HFUC
TrendMicro-HouseCall Trojan.Win32.WACATAC.THHBEBO
Tencent Malware.Win32.Gencirc.10cdee4a
Yandex Trojan.Kryptik!7+t0DKsBaFQ
Ikarus Trojan-Banker.Emotet
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (5 个事件)
dead_host 69.30.203.214:8080
dead_host 192.168.56.101:49181
dead_host 116.202.234.183:8080
dead_host 192.168.56.101:49180
dead_host 137.119.36.33:80
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-08-25 02:26:33

Imports

Library MFC42.DLL:
0x40d0b0
0x40d0b4
0x40d0b8
0x40d0bc
0x40d0c0
0x40d0c4
0x40d0c8
0x40d0cc
0x40d0d0
0x40d0d4
0x40d0d8
0x40d0dc
0x40d0e0
0x40d0e4
0x40d0e8
0x40d0ec
0x40d0f0
0x40d0f4
0x40d0f8
0x40d0fc
0x40d100
0x40d104
0x40d108
0x40d10c
0x40d110
0x40d114
0x40d118
0x40d11c
0x40d120
0x40d124
0x40d128
0x40d12c
0x40d130
0x40d134
0x40d138
0x40d13c
0x40d140
0x40d144
0x40d148
0x40d14c
0x40d150
0x40d154
0x40d158
0x40d15c
0x40d160
0x40d164
0x40d168
0x40d16c
0x40d170
0x40d174
0x40d178
0x40d17c
0x40d180
0x40d184
0x40d188
0x40d18c
0x40d190
0x40d194
0x40d198
0x40d19c
0x40d1a0
0x40d1a4
0x40d1a8
0x40d1ac
0x40d1b0
0x40d1b4
0x40d1b8
0x40d1bc
0x40d1c0
0x40d1c4
0x40d1c8
0x40d1cc
0x40d1d0
0x40d1d4
0x40d1d8
0x40d1dc
0x40d1e0
0x40d1e4
0x40d1e8
0x40d1ec
0x40d1f0
0x40d1f4
0x40d1f8
0x40d1fc
0x40d200
0x40d204
0x40d208
0x40d20c
0x40d210
0x40d214
0x40d218
0x40d21c
0x40d220
0x40d224
0x40d228
0x40d22c
0x40d230
0x40d234
0x40d238
0x40d23c
0x40d240
0x40d244
0x40d248
0x40d24c
0x40d250
0x40d254
0x40d258
0x40d25c
0x40d260
0x40d264
0x40d268
0x40d26c
0x40d270
0x40d274
0x40d278
0x40d27c
0x40d280
0x40d284
0x40d288
0x40d28c
0x40d290
0x40d294
0x40d298
0x40d29c
0x40d2a0
0x40d2a4
0x40d2a8
0x40d2ac
0x40d2b0
0x40d2b4
0x40d2b8
0x40d2bc
0x40d2c0
0x40d2c4
0x40d2c8
0x40d2cc
0x40d2d0
0x40d2d4
0x40d2d8
0x40d2dc
0x40d2e0
0x40d2e4
0x40d2e8
0x40d2ec
0x40d2f0
0x40d2f4
0x40d2f8
0x40d2fc
0x40d300
0x40d304
0x40d308
0x40d30c
0x40d310
0x40d314
0x40d318
0x40d31c
0x40d320
0x40d324
0x40d328
0x40d32c
Library MSVCRT.dll:
0x40d358 _acmdln
0x40d35c exit
0x40d360 _XcptFilter
0x40d364 _exit
0x40d368 _onexit
0x40d36c __dllonexit
0x40d370 __getmainargs
0x40d374 atoi
0x40d378 clock
0x40d37c malloc
0x40d380 _wcslwr
0x40d384 _mbsnbcat
0x40d388 _setmbcp
0x40d38c _initterm
0x40d390 __setusermatherr
0x40d394 _adjust_fdiv
0x40d398 __p__commode
0x40d39c __p__fmode
0x40d3a0 __set_app_type
0x40d3a4 _except_handler3
0x40d3a8 _ftol
0x40d3ac __CxxFrameHandler
0x40d3b0 memcpy
0x40d3b4 memset
0x40d3b8 strcpy
0x40d3bc strlen
0x40d3c0 strcat
0x40d3c4 _mbsstr
0x40d3c8 _vsnprintf
0x40d3cc sprintf
0x40d3d0 _mbsnbcpy
0x40d3d4 _mbscmp
0x40d3d8 _controlfp
0x40d3dc _mbsupr
Library KERNEL32.dll:
0x40d030 OpenFileMappingA
0x40d034 CreateFileMappingA
0x40d038 FlushViewOfFile
0x40d03c CloseHandle
0x40d040 UnmapViewOfFile
0x40d044 GetCurrentThreadId
0x40d048 SetEvent
0x40d04c IsBadWritePtr
0x40d050 IsBadReadPtr
0x40d054 MapViewOfFile
0x40d058 ReleaseMutex
0x40d05c CreateEventA
0x40d060 CreateMutexA
0x40d064 OpenEventA
0x40d068 OpenMutexA
0x40d06c ExitProcess
0x40d070 GetModuleHandleA
0x40d074 GetStartupInfoA
0x40d078 CreateFileA
0x40d07c DeviceIoControl
0x40d080 GlobalUnlock
0x40d084 GlobalLock
0x40d088 GlobalSize
0x40d08c GlobalAlloc
0x40d090 FreeLibrary
0x40d094 Sleep
0x40d098 LoadLibraryA
0x40d0a0 WaitForSingleObject
0x40d0a4 GetFileSize
0x40d0a8 WinExec
Library USER32.dll:
0x40d3ec RedrawWindow
0x40d3f0 SetTimer
0x40d3f4 KillTimer
0x40d3f8 GetParent
0x40d3fc GetSystemMetrics
0x40d400 DrawFocusRect
0x40d404 GetSubMenu
0x40d408 LoadMenuA
0x40d40c ShowWindow
0x40d410 DrawIcon
0x40d414 AppendMenuA
0x40d418 GetSystemMenu
0x40d41c IsIconic
0x40d420 InvalidateRect
0x40d424 GetDC
0x40d428 GetClientRect
0x40d42c GetWindowRect
0x40d430 SendMessageA
0x40d434 InflateRect
0x40d438 PtInRect
0x40d43c LoadCursorA
0x40d440 CopyIcon
0x40d444 IsWindow
0x40d448 GetSysColor
0x40d44c SetCursor
0x40d450 GetMessagePos
0x40d454 LoadIconA
0x40d458 ReleaseDC
0x40d45c MessageBeep
0x40d460 SetWindowLongA
0x40d464 DestroyCursor
0x40d46c EmptyClipboard
0x40d470 SetClipboardData
0x40d474 OpenClipboard
0x40d478 GetClipboardData
0x40d47c CloseClipboard
0x40d480 EnableWindow
0x40d484 ScreenToClient
Library GDI32.dll:
0x40d010 GetTextMetricsA
0x40d018 GetObjectA
0x40d01c CreateFontIndirectA
0x40d020 CreateSolidBrush
0x40d024 GetStockObject
0x40d028 GetCharWidthA
Library ADVAPI32.dll:
0x40d000 RegQueryValueA
0x40d004 RegCloseKey
0x40d008 RegOpenKeyExA
Library SHELL32.dll:
0x40d3e4 ShellExecuteA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51809 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 60124 239.255.255.250 3702
192.168.56.101 62194 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.