1.8
低危

3ec703f22499b5e54c6c8e5f9ec17f4fafdb52707b178850c89d054511dc6c82

91639051e6052c3b80b6b6c7c3d256cd.exe

分析耗时

95s

最近分析

文件大小

9.4MB
静态报毒 动态报毒 ARTEMIS FAKEGAME R002H06HN19 SURVEYER
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!91639051E605 20190925 6.0.6.653
Alibaba 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast 20190925 18.4.3895.0
Kingsoft 20190925 2013.8.14.323
Tencent 20190925 1.0.0.1
CrowdStrike 20190702 1.0
静态指标
行为判定
动态指标
Creates executable files on the filesystem (9 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\msvcm90.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\wxmsw30u_adv_vc90_x64.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\wxbase30u_net_vc90_x64.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\python27.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\wxmsw30u_html_vc90_x64.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\wxbase30u_vc90_x64.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\wxmsw30u_core_vc90_x64.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\msvcr90.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\_MEI3602\msvcp90.dll
File has been identified by 5 AntiVirus engines on VirusTotal as malicious (5 个事件)
McAfee Artemis!91639051E605
DrWeb Trojan.Surveyer.160
McAfee-GW-Edition FakeGame.gen.a
TrendMicro-HouseCall TROJ_GEN.R002H06HN19
Fortinet Riskware/FakeGame
The binary likely contains encrypted or compressed data indicative of a packer (3 个事件)
entropy 6.804602163201875 section {'size_of_data': '0x00005600', 'virtual_address': '0x0000c000', 'entropy': 6.804602163201875, 'name': '.rdata', 'virtual_size': '0x00005470'} description A section with a high entropy has been found
entropy 7.465582661923411 section {'size_of_data': '0x0000ee00', 'virtual_address': '0x00025000', 'entropy': 7.465582661923411, 'name': '.rsrc', 'virtual_size': '0x0000ec88'} description A section with a high entropy has been found
entropy 0.6206896551724138 description Overall entropy of this PE file is high
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1970-02-19 09:09:20

Imports

Library KERNEL32.dll:
0x42142c CreateProcessW
0x42144c FormatMessageA
0x421454 GetCommandLineW
0x42145c GetCurrentProcess
0x421464 GetCurrentProcessId
0x42146c GetCurrentThreadId
0x42147c GetExitCodeProcess
0x421484 GetLastError
0x42148c GetModuleFileNameW
0x421494 GetModuleHandleA
0x42149c GetProcAddress
0x4214a4 GetShortPathNameW
0x4214ac GetStartupInfoW
0x4214bc GetTempPathW
0x4214c4 GetTickCount
0x4214dc LoadLibraryA
0x4214e4 LoadLibraryExW
0x4214ec MultiByteToWideChar
0x4214fc RtlAddFunctionTable
0x421504 RtlCaptureContext
0x421514 RtlVirtualUnwind
0x42151c SetDllDirectoryW
0x421534 Sleep
0x42153c TerminateProcess
0x421544 TlsGetValue
0x421554 VirtualProtect
0x42155c VirtualQuery
0x421564 WaitForSingleObject
0x42156c WideCharToMultiByte
Library msvcrt.dll:
0x421584 __argc
0x42158c __dllonexit
0x421594 __iob_func
0x42159c __lconv_init
0x4215a4 __set_app_type
0x4215ac __setusermatherr
0x4215b4 __wargv
0x4215bc __wgetmainargs
0x4215c4 __winitenv
0x4215cc _amsg_exit
0x4215d4 _cexit
0x4215dc _fileno
0x4215e4 _findclose
0x4215ec _fmode
0x4215f4 _fullpath
0x4215fc _get_osfhandle
0x421604 _getpid
0x42160c _initterm
0x421614 _lock
0x42161c _onexit
0x421624 _setmode
0x42162c _stat64
0x421634 _strdup
0x42163c _unlock
0x421644 _vsnprintf
0x42164c _vsnwprintf
0x421654 _wcmdln
0x42165c _wfindfirst64
0x421664 _wfindnext64
0x42166c _wfopen
0x421674 _wmkdir
0x42167c _wremove
0x421684 _wrmdir
0x42168c _wstat64
0x421694 _wtempnam
0x42169c abort
0x4216a4 calloc
0x4216ac clearerr
0x4216b4 exit
0x4216bc fclose
0x4216c4 feof
0x4216cc ferror
0x4216d4 fflush
0x4216dc fprintf
0x4216e4 fread
0x4216ec free
0x4216f4 fseek
0x4216fc ftell
0x421704 fwrite
0x42170c getenv
0x421714 malloc
0x42171c mbstowcs
0x421724 memcpy
0x42172c memset
0x421734 setbuf
0x42173c setlocale
0x421744 signal
0x42174c sprintf
0x421754 strcat
0x42175c strchr
0x421764 strcmp
0x42176c strcpy
0x421774 strlen
0x42177c strncat
0x421784 strncmp
0x42178c strncpy
0x421794 strrchr
0x42179c strtok
0x4217a4 vfprintf
0x4217ac wcscat
0x4217b4 wcscmp
0x4217bc wcscpy
0x4217c4 wcslen
Library USER32.dll:
0x4217d4 MessageBoxA
Library WS2_32.dll:
0x4217e4 ntohl

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 57874 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 49240 239.255.255.250 1900
192.168.56.101 57757 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.