6.0
高危

11c42a22bd49e9f723718ff607d073bfd3d47afd70ce7152b7329bff2013366c

903c68fa33ec1a69d5773cd181fd5c3f.exe

分析耗时

80s

最近分析

文件大小

1.4MB
静态报毒 动态报毒 100% AGENTB AI SCORE=86 AIDETECTVM ATTRIBUTE BSCOPE CH3@A8QEKMKI CONFIDENCE DELF EKLE EUFA FAREIT GENKRYPTIK GHDYZ HIGHCONFIDENCE HPCNCG KCLOUD KRYPTIK KTSE MALICIOUS MALICIOUS PE MALWARE1 MALWARE@#25VO0HRKU4X8I R346169 REMCOS REMCOSCRYPT SCORE STATIC AI UNSAFE WACATAC WJKQ ZELPHIF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Fareit-FVP!903C68FA33EC 20201211 6.0.6.653
Baidu 20190318 1.0.0.2
Alibaba TrojanDownloader:Win32/Agentb.8e1c1f54 20190527 0.3.0.5
Avast 20201211 21.1.5827.0
Kingsoft Win32.Troj.Undef.(kcloud) 20201211 2017.9.26.565
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619686133.795531
NtAllocateVirtualMemory
process_identifier: 2616
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00590000
success 0 0
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1619686180.889531
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Disables proxy possibly for traffic interception (1 个事件)
Time & API Arguments Status Return Repeated
1619686180.467531
RegSetValueExA
key_handle: 0x000002c4
value: 0
regkey_r: ProxyEnable
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable
success 0 0
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1619686183.452531
RegSetValueExA
key_handle: 0x000003b8
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1619686183.452531
RegSetValueExA
key_handle: 0x000003b8
value: ÜØË<×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1619686183.452531
RegSetValueExA
key_handle: 0x000003b8
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1619686183.452531
RegSetValueExW
key_handle: 0x000003b8
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1619686183.452531
RegSetValueExA
key_handle: 0x000003d4
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1619686183.452531
RegSetValueExA
key_handle: 0x000003d4
value: ÜØË<×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1619686183.452531
RegSetValueExA
key_handle: 0x000003d4
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1619686183.483531
RegSetValueExW
key_handle: 0x000003b4
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
Network activity contains more than one unique useragent (2 个事件)
process 903c68fa33ec1a69d5773cd181fd5c3f.exe useragent Internal
process 903c68fa33ec1a69d5773cd181fd5c3f.exe useragent WIN
Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) (1 个事件)
dead_host 69.63.184.30:443
File has been identified by 48 AntiVirus engines on VirusTotal as malicious (48 个事件)
Bkav W32.AIDetectVM.malware1
MicroWorld-eScan Trojan.Agent.EUFA
FireEye Generic.mg.903c68fa33ec1a69
CAT-QuickHeal Trojan.Wacatac
McAfee Fareit-FVP!903C68FA33EC
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
K7AntiVirus Trojan ( 0056b5351 )
BitDefender Trojan.Agent.EUFA
K7GW Trojan ( 0056b5351 )
BitDefenderTheta Gen:NN.ZelphiF.34670.CH3@a8QEkmki
Cyren W32/Trojan.WJKQ-1573
Symantec ML.Attribute.HighConfidence
Paloalto generic.ml
Kaspersky HEUR:Trojan.Win32.Agentb.gen
Alibaba TrojanDownloader:Win32/Agentb.8e1c1f54
NANO-Antivirus Trojan.Win32.Delf.hpcncg
Ad-Aware Trojan.Agent.EUFA
Sophos Mal/Generic-S
Comodo Malware@#25vo0hrku4x8i
F-Secure Trojan.TR/Agent.ghdyz
Zillya Trojan.Agent.Win32.1357349
McAfee-GW-Edition Fareit-FVP!903C68FA33EC
SentinelOne Static AI - Malicious PE
Emsisoft Trojan.Agent.EUFA (B)
APEX Malicious
Jiangmin Trojan.Agentb.hkx
Avira TR/Agent.ghdyz
Antiy-AVL Trojan/Win32.Agentb
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Trojan:Win32/RemcosCrypt.ACH!MTB
ZoneAlarm HEUR:Trojan.Win32.Agentb.gen
GData Trojan.Agent.EUFA
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Fareit.R346169
VBA32 BScope.Backdoor.Remcos
ALYac Spyware.Infostealer.Fareit
MAX malware (ai score=86)
Malwarebytes Trojan.MalPack.SMY
Zoner Trojan.Win32.91597
ESET-NOD32 Win32/TrojanDownloader.Delf.CYV
Rising Trojan.Kryptik!1.C56D (KTSE)
Fortinet W32/GenKryptik.EKLE!tr
Webroot W32.Trojan.Gen
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_100% (W)
Qihoo-360 Win32/Trojan.ae8
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x462164 VirtualFree
0x462168 VirtualAlloc
0x46216c LocalFree
0x462170 LocalAlloc
0x462174 GetTickCount
0x46217c GetVersion
0x462180 GetCurrentThreadId
0x46218c VirtualQuery
0x462190 WideCharToMultiByte
0x462194 MultiByteToWideChar
0x462198 lstrlenA
0x46219c lstrcpynA
0x4621a0 LoadLibraryExA
0x4621a4 GetThreadLocale
0x4621a8 GetStartupInfoA
0x4621ac GetProcAddress
0x4621b0 GetModuleHandleA
0x4621b4 GetModuleFileNameA
0x4621b8 GetLocaleInfoA
0x4621bc GetCommandLineA
0x4621c0 FreeLibrary
0x4621c4 FindFirstFileA
0x4621c8 FindClose
0x4621cc ExitProcess
0x4621d0 WriteFile
0x4621d8 RtlUnwind
0x4621dc RaiseException
0x4621e0 GetStdHandle
Library user32.dll:
0x4621e8 GetKeyboardType
0x4621ec LoadStringA
0x4621f0 MessageBoxA
0x4621f4 CharNextA
Library advapi32.dll:
0x4621fc RegQueryValueExA
0x462200 RegOpenKeyExA
0x462204 RegCloseKey
Library oleaut32.dll:
0x46220c SysFreeString
0x462210 SysReAllocStringLen
0x462214 SysAllocStringLen
Library kernel32.dll:
0x46221c TlsSetValue
0x462220 TlsGetValue
0x462224 LocalAlloc
0x462228 GetModuleHandleA
Library advapi32.dll:
0x462230 RegQueryValueExA
0x462234 RegOpenKeyExA
0x462238 RegCloseKey
Library kernel32.dll:
0x462240 lstrcpyA
0x462244 WriteFile
0x462248 WaitForSingleObject
0x46224c VirtualQuery
0x462250 VirtualProtect
0x462254 VirtualAlloc
0x462258 Sleep
0x46225c SizeofResource
0x462260 SetThreadLocale
0x462264 SetFilePointer
0x462268 SetEvent
0x46226c SetErrorMode
0x462270 SetEndOfFile
0x462274 ResetEvent
0x462278 ReadFile
0x46227c MulDiv
0x462280 LockResource
0x462284 LoadResource
0x462288 LoadLibraryA
0x462294 GlobalUnlock
0x462298 GlobalReAlloc
0x46229c GlobalHandle
0x4622a0 GlobalLock
0x4622a4 GlobalFree
0x4622a8 GlobalFindAtomA
0x4622ac GlobalDeleteAtom
0x4622b0 GlobalAlloc
0x4622b4 GlobalAddAtomA
0x4622b8 GetVersionExA
0x4622bc GetVersion
0x4622c0 GetTickCount
0x4622c4 GetThreadLocale
0x4622c8 GetSystemInfo
0x4622cc GetStringTypeExA
0x4622d0 GetStdHandle
0x4622d4 GetProcAddress
0x4622d8 GetModuleHandleA
0x4622dc GetModuleFileNameA
0x4622e0 GetLocaleInfoA
0x4622e4 GetLocalTime
0x4622e8 GetLastError
0x4622ec GetFullPathNameA
0x4622f0 GetDiskFreeSpaceA
0x4622f4 GetDateFormatA
0x4622f8 GetCurrentThreadId
0x4622fc GetCurrentProcessId
0x462300 GetCPInfo
0x462304 GetACP
0x462308 FreeResource
0x46230c InterlockedExchange
0x462310 FreeLibrary
0x462314 FormatMessageA
0x462318 FindResourceA
0x46231c EnumCalendarInfoA
0x462328 CreateThread
0x46232c CreateFileA
0x462330 CreateEventA
0x462334 CompareStringA
0x462338 CloseHandle
Library version.dll:
0x462340 VerQueryValueA
0x462348 GetFileVersionInfoA
Library gdi32.dll:
0x462350 UnrealizeObject
0x462354 StretchBlt
0x462358 SetWindowOrgEx
0x46235c SetViewportOrgEx
0x462360 SetTextColor
0x462364 SetStretchBltMode
0x462368 SetROP2
0x46236c SetPixel
0x462370 SetDIBColorTable
0x462374 SetBrushOrgEx
0x462378 SetBkMode
0x46237c SetBkColor
0x462380 SelectPalette
0x462384 SelectObject
0x462388 SaveDC
0x46238c RestoreDC
0x462390 Rectangle
0x462394 RectVisible
0x462398 RealizePalette
0x46239c PatBlt
0x4623a0 MoveToEx
0x4623a4 MaskBlt
0x4623a8 LineTo
0x4623ac IntersectClipRect
0x4623b0 GetWindowOrgEx
0x4623b4 GetTextMetricsA
0x4623c0 GetStockObject
0x4623c4 GetPixelFormat
0x4623c8 GetPixel
0x4623cc GetPaletteEntries
0x4623d0 GetObjectA
0x4623d4 GetDeviceCaps
0x4623d8 GetDIBits
0x4623dc GetDIBColorTable
0x4623e0 GetDCOrgEx
0x4623e8 GetClipBox
0x4623ec GetBrushOrgEx
0x4623f0 GetBitmapBits
0x4623f4 ExcludeClipRect
0x4623f8 DeleteObject
0x4623fc DeleteDC
0x462400 CreateSolidBrush
0x462404 CreatePenIndirect
0x462408 CreatePalette
0x462410 CreateFontIndirectA
0x462414 CreateDIBitmap
0x462418 CreateDIBSection
0x46241c CreateCompatibleDC
0x462424 CreateBrushIndirect
0x462428 CreateBitmap
0x46242c BitBlt
Library user32.dll:
0x462434 CreateWindowExA
0x462438 WindowFromPoint
0x46243c WinHelpA
0x462440 WaitMessage
0x462444 UpdateWindow
0x462448 UnregisterClassA
0x46244c UnhookWindowsHookEx
0x462450 TranslateMessage
0x462458 TrackPopupMenu
0x462460 ShowWindow
0x462464 ShowScrollBar
0x462468 ShowOwnedPopups
0x46246c ShowCursor
0x462470 SetWindowsHookExA
0x462474 SetWindowPos
0x462478 SetWindowPlacement
0x46247c SetWindowLongA
0x462480 SetTimer
0x462484 SetScrollRange
0x462488 SetScrollPos
0x46248c SetScrollInfo
0x462490 SetRect
0x462494 SetPropA
0x462498 SetParent
0x46249c SetMenuItemInfoA
0x4624a0 SetMenu
0x4624a4 SetForegroundWindow
0x4624a8 SetFocus
0x4624ac SetCursor
0x4624b0 SetClassLongA
0x4624b4 SetCapture
0x4624b8 SetActiveWindow
0x4624bc SendMessageA
0x4624c0 ScrollWindow
0x4624c4 ScreenToClient
0x4624c8 RemovePropA
0x4624cc RemoveMenu
0x4624d0 ReleaseDC
0x4624d4 ReleaseCapture
0x4624e0 RegisterClassA
0x4624e4 RedrawWindow
0x4624e8 PtInRect
0x4624ec PostQuitMessage
0x4624f0 PostMessageA
0x4624f4 PeekMessageA
0x4624f8 OffsetRect
0x4624fc OemToCharA
0x462504 MessageBoxA
0x462508 MapWindowPoints
0x46250c MapVirtualKeyA
0x462510 LoadStringA
0x462514 LoadKeyboardLayoutA
0x462518 LoadIconA
0x46251c LoadCursorA
0x462520 LoadBitmapA
0x462524 KillTimer
0x462528 IsZoomed
0x46252c IsWindowVisible
0x462530 IsWindowEnabled
0x462534 IsWindow
0x462538 IsRectEmpty
0x46253c IsIconic
0x462540 IsDialogMessageA
0x462544 IsChild
0x462548 InvalidateRect
0x46254c IntersectRect
0x462550 InsertMenuItemA
0x462554 InsertMenuA
0x462558 InflateRect
0x462560 GetWindowTextA
0x462564 GetWindowRect
0x462568 GetWindowPlacement
0x46256c GetWindowLongA
0x462570 GetWindowDC
0x462574 GetTopWindow
0x462578 GetSystemMetrics
0x46257c GetSystemMenu
0x462580 GetSysColorBrush
0x462584 GetSysColor
0x462588 GetSubMenu
0x46258c GetScrollRange
0x462590 GetScrollPos
0x462594 GetScrollInfo
0x462598 GetPropA
0x46259c GetParent
0x4625a0 GetWindow
0x4625a4 GetMenuStringA
0x4625a8 GetMenuState
0x4625ac GetMenuItemInfoA
0x4625b0 GetMenuItemID
0x4625b4 GetMenuItemCount
0x4625b8 GetMenu
0x4625bc GetLastActivePopup
0x4625c0 GetKeyboardState
0x4625c8 GetKeyboardLayout
0x4625cc GetKeyState
0x4625d0 GetKeyNameTextA
0x4625d4 GetIconInfo
0x4625d8 GetForegroundWindow
0x4625dc GetFocus
0x4625e0 GetDesktopWindow
0x4625e4 GetDCEx
0x4625e8 GetDC
0x4625ec GetCursorPos
0x4625f0 GetCursor
0x4625f4 GetClientRect
0x4625f8 GetClassNameA
0x4625fc GetClassInfoA
0x462600 GetCapture
0x462604 GetActiveWindow
0x462608 FrameRect
0x46260c FindWindowA
0x462610 FillRect
0x462614 EqualRect
0x462618 EnumWindows
0x46261c EnumThreadWindows
0x462620 EndPaint
0x462624 EnableWindow
0x462628 EnableScrollBar
0x46262c EnableMenuItem
0x462630 DrawTextA
0x462634 DrawMenuBar
0x462638 DrawIconEx
0x46263c DrawIcon
0x462640 DrawFrameControl
0x462644 DrawFocusRect
0x462648 DrawEdge
0x46264c DispatchMessageA
0x462650 DestroyWindow
0x462654 DestroyMenu
0x462658 DestroyIcon
0x46265c DestroyCursor
0x462660 DeleteMenu
0x462664 DefWindowProcA
0x462668 DefMDIChildProcA
0x46266c DefFrameProcA
0x462670 CreatePopupMenu
0x462674 CreateMenu
0x462678 CreateIcon
0x46267c ClientToScreen
0x462680 CheckMenuItem
0x462684 CallWindowProcA
0x462688 CallNextHookEx
0x46268c BeginPaint
0x462690 CharNextA
0x462694 CharLowerA
0x462698 CharToOemA
0x46269c AdjustWindowRectEx
Library kernel32.dll:
0x4626a8 Sleep
Library oleaut32.dll:
0x4626b0 SafeArrayPtrOfIndex
0x4626b4 SafeArrayGetUBound
0x4626b8 SafeArrayGetLBound
0x4626bc SafeArrayCreate
0x4626c0 VariantChangeType
0x4626c4 VariantCopy
0x4626c8 VariantClear
0x4626cc VariantInit
Library comctl32.dll:
0x4626dc ImageList_Write
0x4626e0 ImageList_Read
0x4626f0 ImageList_DragMove
0x4626f4 ImageList_DragLeave
0x4626f8 ImageList_DragEnter
0x4626fc ImageList_EndDrag
0x462700 ImageList_BeginDrag
0x462704 ImageList_Remove
0x462708 ImageList_DrawEx
0x46270c ImageList_Draw
0x46271c ImageList_Add
0x462728 ImageList_Destroy
0x46272c ImageList_Create
Library winmm.dll:
0x462734 mciSendCommandA
0x462738 mciGetErrorStringA
Library advapi32.dll:
0x462740 QueryServiceStatus
0x462744 OpenServiceA
0x462748 OpenSCManagerA
0x46274c CloseServiceHandle
Library url.dll:
0x462754 InetIsOffline

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 57874 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 58367 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51379 239.255.255.250 3702
192.168.56.101 51964 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.