7.0
高危

7a155da0771a27c7d779b06baca6d15d9b0ba7dc10d9c5fb46cc9e5a8e3782c4

904e8f39d1fdc87932e760634187a18c.exe

分析耗时

75s

最近分析

文件大小

132.1KB
静态报毒 动态报毒 100% 1AXCZRA 8JJA8TDVGGS AI SCORE=87 AUSL BSCOPE CONFIDENCE CRYPTERX EMOTET GCLH GENCIRC GENERICKDZ GENETIC HFUC HIGH CONFIDENCE HSYMGK INJUKE IQX@AWCPW@MI JFGZ JV19JPIUTRR KRYPTIK MALWARE@#2032PWTZK1IE0 R + TROJ R011C0DHQ20 R349155 SCORE SUSGEN TAIJO UNSAFE WOREFLINTLCJ ZENPAK ZEXAE 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee 20200918 6.0.6.653
Alibaba Trojan:Win32/Emotet.0f24a221 20190527 0.3.0.5
Avast Win32:CrypterX-gen [Trj] 20200919 18.4.3895.0
Baidu 20190318 1.0.0.2
Kingsoft 20200919 2013.8.14.323
Tencent Malware.Win32.Gencirc.10cdee3d 20200919 1.0.0.1
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
Queries for the computername (1 个事件)
Time & API Arguments Status Return Repeated
1619686142.374372
GetComputerNameA
computer_name: OSKAR-PC
success 1 0
Uses Windows APIs to generate a cryptographic key (5 个事件)
Time & API Arguments Status Return Repeated
1619686134.061372
CryptGenKey
crypto_handle: 0x00585f78
algorithm_identifier: 0x0000660e ()
provider_handle: 0x005854a0
flags: 1
key: f Á×I‘:‚ÁˆËû<Åûd
success 1 0
1619686142.389372
CryptExportKey
crypto_handle: 0x00585f78
crypto_export_handle: 0x00585460
buffer: f¤GL‚áÓz¸˜¬ V_ñ4|íý@VeMè0Áo}l¦û1“¤°”©óNN5’™_t™W rÚ?'´ióÂ9â[Ú&“F®C^yÙ¾¡ÿIc­*jËù|÷I
blob_type: 1
flags: 64
success 1 0
1619686177.421372
CryptExportKey
crypto_handle: 0x00585f78
crypto_export_handle: 0x00585460
buffer: f¤i²U7ßi—ÍäslÖ¹“%[ífŽ‘¾9ï}ðyT©eÞ«lûˆHsÅ' „H¦\š=×ÐîøÛ—Xø" Í«ÇK Ô[%õÏÆô*³„ïšì 0R渑̃•CIH•
blob_type: 1
flags: 64
success 1 0
1619686189.936372
CryptExportKey
crypto_handle: 0x00585f78
crypto_export_handle: 0x00585460
buffer: f¤äK„?ç7‚“vR˜d € ¡þ¸cc󜒎 ނѺ3ê¸ÁC»él6}ý·Pä¾vbÑ@É4#Aµr79ĝp®WƒÉ|wK8â.q¸wûòÜeîÊz
blob_type: 1
flags: 64
success 1 0
1619686194.327372
CryptExportKey
crypto_handle: 0x00585f78
crypto_export_handle: 0x00585460
buffer: f¤Á>#pȽTù·uÄ>ãæŸôǶ@¹Kk]†·?á7~›¯½0ÐÐ÷ïØ2C2­ä-èoi&BÎ}¼g«ô ˆ[¾Ú‰È°²S¦SŠ2Åì`÷QKGsI˜wåń
blob_type: 1
flags: 64
success 1 0
The executable uses a known packer (1 个事件)
packer Armadillo v1.71
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619686133.249372
NtAllocateVirtualMemory
process_identifier: 472
region_size: 36864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x004e0000
success 0 0
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping (1 个事件)
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1619686142.842372
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.529537354354961 section {'size_of_data': '0x0000a000', 'virtual_address': '0x00017000', 'entropy': 7.529537354354961, 'name': '.rsrc', 'virtual_size': '0x00009440'} description A section with a high entropy has been found
entropy 0.3125 description Overall entropy of this PE file is high
Expresses interest in specific running processes (1 个事件)
process 904e8f39d1fdc87932e760634187a18c.exe
Reads the systems User Agent and subsequently performs requests (1 个事件)
Time & API Arguments Status Return Repeated
1619686142.546372
InternetOpenW
proxy_bypass:
access_type: 0
proxy_name:
flags: 0
user_agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
success 13369348 0
网络通信
Communicates with host for which no DNS query was performed (5 个事件)
host 162.249.220.190
host 172.217.24.14
host 178.128.14.92
host 50.116.78.109
host 85.25.207.108
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1619686145.421372
RegSetValueExA
key_handle: 0x00000398
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1619686145.421372
RegSetValueExA
key_handle: 0x00000398
value: €^l‰Ê<×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1619686145.421372
RegSetValueExA
key_handle: 0x00000398
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1619686145.421372
RegSetValueExW
key_handle: 0x00000398
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1619686145.421372
RegSetValueExA
key_handle: 0x000003b0
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1619686145.421372
RegSetValueExA
key_handle: 0x000003b0
value: €^l‰Ê<×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1619686145.421372
RegSetValueExA
key_handle: 0x000003b0
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1619686145.436372
RegSetValueExW
key_handle: 0x00000394
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
File has been identified by 56 AntiVirus engines on VirusTotal as malicious (50 out of 56 个事件)
Bkav W32.WoreflintLCJ.Trojan
Elastic malicious (high confidence)
DrWeb Trojan.Emotet.1005
MicroWorld-eScan Trojan.GenericKDZ.69712
FireEye Generic.mg.904e8f39d1fdc879
Cylance Unsafe
Zillya Trojan.Emotet.Win32.24974
Sangfor Malware
K7AntiVirus Trojan ( 0056d4851 )
Alibaba Trojan:Win32/Emotet.0f24a221
K7GW Trojan ( 0056d4851 )
Arcabit Trojan.Generic.D11050
Invincea Mal/Generic-R + Troj/Emotet-CLR
BitDefenderTheta Gen:NN.ZexaE.34254.iqX@aWCPW@mi
Cyren W32/Trojan.JFGZ-7874
Symantec Trojan.Emotet
APEX Malicious
Avast Win32:CrypterX-gen [Trj]
Cynet Malicious (score: 85)
Kaspersky Trojan-Banker.Win32.Emotet.gclh
BitDefender Trojan.GenericKDZ.69712
NANO-Antivirus Trojan.Win32.Emotet.hsymgk
Paloalto generic.ml
ViRobot Trojan.Win32.Z.Emotet.135288.A
Rising Trojan.Kryptik!8.8 (TFE:5:Jv19jPIuTRR)
Ad-Aware Trojan.GenericKDZ.69712
Comodo Malware@#2032pwtzk1ie0
F-Secure Trojan.TR/Crypt.Agent.taijo
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R011C0DHQ20
Sophos Troj/Emotet-CLR
Ikarus Trojan-Banker.Emotet
Jiangmin Trojan.Banker.Emotet.ofh
MaxSecure Trojan.Malware.105913907.susgen
Avira TR/Crypt.Agent.taijo
Antiy-AVL Trojan/Win32.Injuke
Microsoft Trojan:Win32/Emotet.ARJ!MTB
AegisLab Trojan.Win32.Emotet.L!c
ZoneAlarm Trojan-Banker.Win32.Emotet.gclh
GData Win32.Trojan.PSE.1AXCZRA
TACHYON Trojan/W32.Agent.135288.O
AhnLab-V3 Malware/Win32.RL_Generic.R349155
VBA32 BScope.Trojan.Downloader
ALYac Trojan.Agent.Emotet
MAX malware (ai score=87)
Malwarebytes Trojan.MalPack.TRE
ESET-NOD32 a variant of Win32/Kryptik.HFUC
TrendMicro-HouseCall TROJ_GEN.R011C0DHQ20
Tencent Malware.Win32.Gencirc.10cdee3d
Yandex Trojan.Kryptik!8jJA8TDvggs
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (4 个事件)
dead_host 85.25.207.108:8080
dead_host 162.249.220.190:80
dead_host 192.168.56.101:49185
dead_host 178.128.14.92:8080
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-08-25 02:29:40

Imports

Library MFC42.DLL:
0x40d0b0
0x40d0b4
0x40d0b8
0x40d0bc
0x40d0c0
0x40d0c4
0x40d0c8
0x40d0cc
0x40d0d0
0x40d0d4
0x40d0d8
0x40d0dc
0x40d0e0
0x40d0e4
0x40d0e8
0x40d0ec
0x40d0f0
0x40d0f4
0x40d0f8
0x40d0fc
0x40d100
0x40d104
0x40d108
0x40d10c
0x40d110
0x40d114
0x40d118
0x40d11c
0x40d120
0x40d124
0x40d128
0x40d12c
0x40d130
0x40d134
0x40d138
0x40d13c
0x40d140
0x40d144
0x40d148
0x40d14c
0x40d150
0x40d154
0x40d158
0x40d15c
0x40d160
0x40d164
0x40d168
0x40d16c
0x40d170
0x40d174
0x40d178
0x40d17c
0x40d180
0x40d184
0x40d188
0x40d18c
0x40d190
0x40d194
0x40d198
0x40d19c
0x40d1a0
0x40d1a4
0x40d1a8
0x40d1ac
0x40d1b0
0x40d1b4
0x40d1b8
0x40d1bc
0x40d1c0
0x40d1c4
0x40d1c8
0x40d1cc
0x40d1d0
0x40d1d4
0x40d1d8
0x40d1dc
0x40d1e0
0x40d1e4
0x40d1e8
0x40d1ec
0x40d1f0
0x40d1f4
0x40d1f8
0x40d1fc
0x40d200
0x40d204
0x40d208
0x40d20c
0x40d210
0x40d214
0x40d218
0x40d21c
0x40d220
0x40d224
0x40d228
0x40d22c
0x40d230
0x40d234
0x40d238
0x40d23c
0x40d240
0x40d244
0x40d248
0x40d24c
0x40d250
0x40d254
0x40d258
0x40d25c
0x40d260
0x40d264
0x40d268
0x40d26c
0x40d270
0x40d274
0x40d278
0x40d27c
0x40d280
0x40d284
0x40d288
0x40d28c
0x40d290
0x40d294
0x40d298
0x40d29c
0x40d2a0
0x40d2a4
0x40d2a8
0x40d2ac
0x40d2b0
0x40d2b4
0x40d2b8
0x40d2bc
0x40d2c0
0x40d2c4
0x40d2c8
0x40d2cc
0x40d2d0
0x40d2d4
0x40d2d8
0x40d2dc
0x40d2e0
0x40d2e4
0x40d2e8
0x40d2ec
0x40d2f0
0x40d2f4
0x40d2f8
0x40d2fc
0x40d300
0x40d304
0x40d308
0x40d30c
0x40d310
0x40d314
0x40d318
0x40d31c
0x40d320
0x40d324
0x40d328
0x40d32c
Library MSVCRT.dll:
0x40d358 _acmdln
0x40d35c exit
0x40d360 _XcptFilter
0x40d364 _exit
0x40d368 _onexit
0x40d36c __dllonexit
0x40d370 __getmainargs
0x40d374 atoi
0x40d378 clock
0x40d37c malloc
0x40d380 _wcslwr
0x40d384 _mbsnbcat
0x40d388 _setmbcp
0x40d38c _initterm
0x40d390 __setusermatherr
0x40d394 _adjust_fdiv
0x40d398 __p__commode
0x40d39c __p__fmode
0x40d3a0 __set_app_type
0x40d3a4 _except_handler3
0x40d3a8 _ftol
0x40d3ac __CxxFrameHandler
0x40d3b0 memcpy
0x40d3b4 memset
0x40d3b8 strcpy
0x40d3bc strlen
0x40d3c0 strcat
0x40d3c4 _mbsstr
0x40d3c8 _vsnprintf
0x40d3cc sprintf
0x40d3d0 _mbsnbcpy
0x40d3d4 _mbscmp
0x40d3d8 _controlfp
0x40d3dc _mbsupr
Library KERNEL32.dll:
0x40d030 OpenFileMappingA
0x40d034 CreateFileMappingA
0x40d038 FlushViewOfFile
0x40d03c CloseHandle
0x40d040 UnmapViewOfFile
0x40d044 GetCurrentThreadId
0x40d048 SetEvent
0x40d04c IsBadWritePtr
0x40d050 IsBadReadPtr
0x40d054 MapViewOfFile
0x40d058 ReleaseMutex
0x40d05c CreateEventA
0x40d060 CreateMutexA
0x40d064 OpenEventA
0x40d068 OpenMutexA
0x40d06c ExitProcess
0x40d070 GetModuleHandleA
0x40d074 GetStartupInfoA
0x40d078 CreateFileA
0x40d07c DeviceIoControl
0x40d080 GlobalUnlock
0x40d084 GlobalLock
0x40d088 GlobalSize
0x40d08c GlobalAlloc
0x40d090 FreeLibrary
0x40d094 Sleep
0x40d098 LoadLibraryA
0x40d0a0 WaitForSingleObject
0x40d0a4 GetFileSize
0x40d0a8 WinExec
Library USER32.dll:
0x40d3ec RedrawWindow
0x40d3f0 SetTimer
0x40d3f4 KillTimer
0x40d3f8 GetParent
0x40d3fc GetSystemMetrics
0x40d400 DrawFocusRect
0x40d404 GetSubMenu
0x40d408 LoadMenuA
0x40d40c ShowWindow
0x40d410 DrawIcon
0x40d414 AppendMenuA
0x40d418 GetSystemMenu
0x40d41c IsIconic
0x40d420 InvalidateRect
0x40d424 GetDC
0x40d428 GetClientRect
0x40d42c GetWindowRect
0x40d430 SendMessageA
0x40d434 InflateRect
0x40d438 PtInRect
0x40d43c LoadCursorA
0x40d440 CopyIcon
0x40d444 IsWindow
0x40d448 GetSysColor
0x40d44c SetCursor
0x40d450 GetMessagePos
0x40d454 LoadIconA
0x40d458 ReleaseDC
0x40d45c MessageBeep
0x40d460 SetWindowLongA
0x40d464 DestroyCursor
0x40d46c EmptyClipboard
0x40d470 SetClipboardData
0x40d474 OpenClipboard
0x40d478 GetClipboardData
0x40d47c CloseClipboard
0x40d480 EnableWindow
0x40d484 ScreenToClient
Library GDI32.dll:
0x40d010 GetTextMetricsA
0x40d018 GetObjectA
0x40d01c CreateFontIndirectA
0x40d020 CreateSolidBrush
0x40d024 GetStockObject
0x40d028 GetCharWidthA
Library ADVAPI32.dll:
0x40d000 RegQueryValueA
0x40d004 RegCloseKey
0x40d008 RegOpenKeyExA
Library SHELL32.dll:
0x40d3e4 ShellExecuteA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58370 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.