2.0
低危

358900e83868860c95adc23aa96cfbe4ae41a60b310452c93dc3e662f13e2f48

932997240db37b33404f44647c36d7b2.exe

分析耗时

20s

最近分析

文件大小

617.0KB
静态报毒 动态报毒 AGEN AI SCORE=99 AIDETECTVM APPLICUNWNT@#23UP38I9BD0SP ATTRIBUTE CONFIDENCE DHTNQAZA GAMEHACK GDSDA GENASA GENERIC PUA MN GENERIC@ML GENERICRXBU HACKTOOL HIGH CONFIDENCE HIGHCONFIDENCE HYG2ZMN2HTP3V KM7J0WY MALWARE1 MIKEY MUW@AKF R002C0PIF20 RDML RISKTOOL SCORE STATIC AI SUSPICIOUS PE TOOL UNSAFE VIGRAM ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee GenericRXBU-QY!932997240DB3 20201129 6.0.6.653
Alibaba RiskWare:Win32/Generic.7e08ab5a 20190527 0.3.0.5
Avast Win32:Malware-gen 20201129 20.10.5736.0
Tencent 20201129 1.0.0.1
Baidu 20190318 1.0.0.2
Kingsoft 20201129 2017.9.26.565
CrowdStrike win/malicious_confidence_80% (W) 20190702 1.0
静态指标
Command line console output was observed (19 个事件)
Time & API Arguments Status Return Repeated
1619796985.39125
WriteConsoleA
buffer: E
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: R
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: R
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: O
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: R
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: C
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: S
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: G
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: O
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: n
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: o
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: t
console_handle: 0x00000007
success 1 0
1619796985.39125
WriteConsoleA
buffer: r
console_handle: 0x00000007
success 1 0
1619796985.40725
WriteConsoleA
buffer: u
console_handle: 0x00000007
success 1 0
1619796985.40725
WriteConsoleA
buffer: n
console_handle: 0x00000007
success 1 0
1619796985.40725
WriteConsoleA
buffer: n
console_handle: 0x00000007
success 1 0
1619796985.40725
WriteConsoleA
buffer: i
console_handle: 0x00000007
success 1 0
1619796985.40725
WriteConsoleA
buffer: n
console_handle: 0x00000007
success 1 0
1619796985.40725
WriteConsoleA
buffer: g
console_handle: 0x00000007
success 1 0
行为判定
动态指标
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 48 AntiVirus engines on VirusTotal as malicious (48 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Mikey.61370
FireEye Generic.mg.932997240db37b33
CAT-QuickHeal Hacktool.Vigram
Qihoo-360 Win32/Virus.RiskTool.f09
McAfee GenericRXBU-QY!932997240DB3
AegisLab Hacktool.Win32.Gamehack.3!c
Sangfor Malware
K7AntiVirus Riskware ( 0050e8131 )
BitDefender Gen:Variant.Mikey.61370
K7GW Riskware ( 0050e8131 )
BitDefenderTheta Gen:NN.ZexaF.34658.MuW@aKF!hCd
Symantec ML.Attribute.HighConfidence
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:HackTool.Win32.Gamehack.gen
Alibaba RiskWare:Win32/Generic.7e08ab5a
Avast Win32:Malware-gen
Ad-Aware Gen:Variant.Mikey.61370
Sophos Generic PUA MN (PUA)
Comodo ApplicUnwnt@#23up38i9bd0sp
F-Secure Heuristic.HEUR/AGEN.1111158
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R002C0PIF20
McAfee-GW-Edition BehavesLike.Win32.Generic.jh
Emsisoft Gen:Variant.Mikey.61370 (B)
GData Gen:Variant.Mikey.61370
Jiangmin RiskTool.Gamehack.ahy
Avira HEUR/AGEN.1111158
Antiy-AVL RiskWare[RiskTool]/Win32.Gamehack
Arcabit Trojan.Mikey.DEFBA
SUPERAntiSpyware Hack.Tool/Gen-GameHack
ZoneAlarm HEUR:HackTool.Win32.Gamehack.gen
Microsoft Program:Win32/Vigram.A
Cynet Malicious (score: 90)
AhnLab-V3 Malware/Win32.Generic.C1950485
MAX malware (ai score=99)
Cylance Unsafe
ESET-NOD32 a variant of Win32/RiskWare.GameHack.BK
TrendMicro-HouseCall TROJ_GEN.R002C0PIF20
Rising Trojan.Generic@ML.100 (RDML:hYg2zmN2HtP3v/dhTnqaZA)
Yandex Trojan.GenAsa!aeH/kM7J0WY
SentinelOne Static AI - Suspicious PE
Fortinet Riskware/GameHack
AVG Win32:Malware-gen
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_80% (W)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2017-08-31 04:09:12

Imports

Library USER32.dll:
0x480198 GetAsyncKeyState
Library KERNEL32.dll:
0x480008 CloseHandle
0x48000c Sleep
0x480010 OpenProcess
0x480014 ReadProcessMemory
0x480018 WriteProcessMemory
0x480020 Process32Next
0x480024 Module32Next
0x480028 FormatMessageW
0x48002c WideCharToMultiByte
0x48003c MultiByteToWideChar
0x480040 EncodePointer
0x480044 DecodePointer
0x480048 SetLastError
0x480050 CreateEventW
0x480054 TlsAlloc
0x480058 TlsGetValue
0x48005c TlsSetValue
0x480060 TlsFree
0x480068 GetTickCount
0x48006c GetModuleHandleW
0x480070 GetProcAddress
0x480074 CompareStringW
0x480078 LCMapStringW
0x48007c GetLocaleInfoW
0x480080 GetStringTypeW
0x480084 GetCPInfo
0x480088 SetEvent
0x48008c ResetEvent
0x480098 IsDebuggerPresent
0x4800a4 GetStartupInfoW
0x4800ac GetCurrentProcessId
0x4800b0 GetCurrentThreadId
0x4800b4 InitializeSListHead
0x4800b8 GetCurrentProcess
0x4800bc TerminateProcess
0x4800c0 RaiseException
0x4800c4 RtlUnwind
0x4800c8 GetLastError
0x4800cc FreeLibrary
0x4800d0 LoadLibraryExW
0x4800d4 GetModuleFileNameW
0x4800e0 ExitProcess
0x4800e4 GetModuleHandleExW
0x4800e8 HeapAlloc
0x4800ec HeapFree
0x4800f0 HeapReAlloc
0x4800f4 GetStdHandle
0x4800f8 WriteFile
0x4800fc GetModuleFileNameA
0x480100 GetCommandLineA
0x480104 GetCommandLineW
0x480108 GetACP
0x48010c GetCurrentThread
0x480110 GetDateFormatW
0x480114 GetTimeFormatW
0x480118 IsValidLocale
0x48011c GetUserDefaultLCID
0x480120 EnumSystemLocalesW
0x480124 GetProcessHeap
0x480128 GetFileType
0x48012c FlushFileBuffers
0x480130 GetConsoleCP
0x480134 GetConsoleMode
0x480138 ReadFile
0x48013c SetFilePointerEx
0x480148 IsValidCodePage
0x48014c GetOEMCP
0x480160 OutputDebugStringA
0x480164 OutputDebugStringW
0x480168 CreateThread
0x48016c FindClose
0x480170 FindFirstFileExA
0x480174 FindFirstFileExW
0x480178 FindNextFileA
0x48017c FindNextFileW
0x480180 SetStdHandle
0x480184 WriteConsoleW
0x480188 ReadConsoleW
0x48018c HeapSize
0x480190 CreateFileW
Library ADVAPI32.dll:
0x480000 SystemFunction036

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 49238 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.