5.4
中危

9445870d3049adc08cde726efb7bd2936251b89b6f9caf31f03b39af60378ed8

8bd966c222b1a35e1c0812d94b1fc80b.exe

分析耗时

85s

最近分析

文件大小

3.4MB
静态报毒 动态报毒 ADWARELINKURY AI SCORE=99 CONFIDENCE GENERIC ML PUA INFECTOR MALICIOUS MALICIOUS PE QHOST WACATAC 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee 20201003 6.0.6.653
Alibaba 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast 20201003 18.4.3895.0
Kingsoft 20201004 2013.8.14.323
CrowdStrike win/malicious_confidence_60% (W) 20190702 1.0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself) (7 个事件)
Time & API Arguments Status Return Repeated
1619700451.422625
NtAllocateVirtualMemory
process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00980000
success 0 0
1619700452.219625
NtAllocateVirtualMemory
process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x03b70000
success 0 0
1619700452.453625
NtAllocateVirtualMemory
process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x03e90000
success 0 0
1619700452.562625
NtAllocateVirtualMemory
process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04060000
success 0 0
1619700452.656625
NtAllocateVirtualMemory
process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04230000
success 0 0
1619700452.859625
NtAllocateVirtualMemory
process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x04450000
success 0 0
1619700453.141625
NtAllocateVirtualMemory
process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x046c0000
success 0 0
Creates executable files on the filesystem (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\lcaudfinder.exe
Creates hidden or system file (8 个事件)
Time & API Arguments Status Return Repeated
1619700452.047625
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\8E38E8FC.ttf
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FC.ttf
success 1 0
1619700452.141625
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\8E38E8FD.nbr
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FD.nbr
success 1 0
1619700452.250625
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\8E38E8FE.nbr
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FE.nbr
success 1 0
1619700452.328625
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\8E38E8FD.nbp
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FD.nbp
success 1 0
1619700452.531625
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\8E38E8FF.nbr
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FF.nbr
success 1 0
1619700452.641625
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\8E38E900.nbr
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E900.nbr
success 1 0
1619700452.797625
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\8E38E901.nbr
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E901.nbr
success 1 0
1619700453.016625
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\8E38E902.nbr
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E902.nbr
success 1 0
Drops a binary and executes it (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\lcaudfinder.exe
Drops an executable to the user AppData folder (8 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FF.nbr
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E901.nbr
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FD.nbr
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\lcaudfinder.exe
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FD.nbp
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E8FE.nbr
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E902.nbr
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\8E38E900.nbr
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Checks for the presence of known windows from debuggers and forensic tools (2 个事件)
Time & API Arguments Status Return Repeated
1619700453.437625
FindWindowA
class_name: TApplication
window_name: Loading...
success 65960 0
1619700456.937625
FindWindowA
class_name: TApplication
window_name: lcaudfinder
success 65960 0
Attempts to modify browser security settings (1 个事件)
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\lcaudfinder.exe
File has been identified by 15 AntiVirus engines on VirusTotal as malicious (15 个事件)
FireEye Generic.mg.8bd966c222b1a35e
VIPRE Trojan.Win32.Generic!BT
Invincea Generic ML PUA (PUA)
Symantec Trojan.Gen.2
APEX Malicious
Paloalto generic.ml
DrWeb BackDoor.Infector.50
McAfee-GW-Edition BehavesLike.Win32.AdwareLinkury.wc
Ikarus Backdoor.Agent
Jiangmin Trojan.Qhost.fd
MAX malware (ai score=99)
Microsoft Trojan:Win32/Wacatac.A!ml
AegisLab Trojan.Win32.Generic.4!c
SentinelOne DFI - Malicious PE
CrowdStrike win/malicious_confidence_60% (W)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2016-08-15 03:15:54

Imports

Library KERNEL32.dll:
0x422000 GetLastError
0x422004 SetLastError
0x422008 GetFileType
0x42200c GetStdHandle
0x422010 WriteFile
0x422014 ReadFile
0x422018 FlushFileBuffers
0x42201c SetEndOfFile
0x422020 SetFilePointer
0x422024 SetFileTime
0x422028 CloseHandle
0x42202c CreateFileW
0x422030 CreateDirectoryW
0x422034 SetFileAttributesW
0x422038 GetFileAttributesW
0x42203c DeleteFileW
0x422040 MoveFileW
0x422044 FindClose
0x422048 FindFirstFileW
0x42204c FindNextFileW
0x422050 GetVersionExW
0x422058 GetFullPathNameW
0x42205c FoldStringW
0x422060 GetModuleFileNameW
0x422064 GetModuleHandleW
0x422068 FindResourceW
0x42206c FreeLibrary
0x422070 GetProcAddress
0x422074 GetCurrentProcessId
0x422078 ExitProcess
0x42207c Sleep
0x422080 LoadLibraryW
0x422084 GetSystemDirectoryW
0x422088 CompareStringW
0x42208c AllocConsole
0x422090 FreeConsole
0x422094 AttachConsole
0x422098 WriteConsoleW
0x4220b0 GetCPInfo
0x4220b4 IsDBCSLeadByte
0x4220b8 MultiByteToWideChar
0x4220bc WideCharToMultiByte
0x4220c0 GlobalAlloc
0x4220c4 GetTickCount
0x4220cc GetExitCodeProcess
0x4220d0 WaitForSingleObject
0x4220d4 GetLocalTime
0x4220d8 MapViewOfFile
0x4220dc UnmapViewOfFile
0x4220e0 CreateFileMappingW
0x4220e4 OpenFileMappingW
0x4220e8 GetCommandLineW
0x4220f4 GetTempPathW
0x4220f8 MoveFileExW
0x4220fc GetLocaleInfoW
0x422100 GetTimeFormatW
0x422104 GetDateFormatW
0x422108 GetNumberFormatW
0x42210c RaiseException
0x422110 GetSystemInfo
0x422114 VirtualProtect
0x422118 VirtualQuery
0x42211c LoadLibraryExA
0x422124 IsDebuggerPresent
0x422130 GetStartupInfoW
0x422138 GetCurrentThreadId
0x422140 InitializeSListHead
0x422144 GetCurrentProcess
0x422148 TerminateProcess
0x42214c RtlUnwind
0x422150 EncodePointer
0x422164 TlsAlloc
0x422168 TlsGetValue
0x42216c TlsSetValue
0x422170 TlsFree
0x422174 LoadLibraryExW
0x42217c GetModuleHandleExW
0x422180 GetModuleFileNameA
0x422184 GetACP
0x422188 HeapFree
0x42218c HeapAlloc
0x422190 HeapReAlloc
0x422194 GetStringTypeW
0x422198 LCMapStringW
0x42219c FindFirstFileExA
0x4221a0 FindNextFileA
0x4221a4 IsValidCodePage
0x4221a8 GetOEMCP
0x4221ac GetCommandLineA
0x4221b8 GetProcessHeap
0x4221bc SetStdHandle
0x4221c0 HeapSize
0x4221c4 GetConsoleCP
0x4221c8 GetConsoleMode
0x4221cc SetFilePointerEx
0x4221d0 DecodePointer

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 50537 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.