2.4
中危

cb54dbbab3d84b1aafd5d3e7a81562995d21ae7917547b222a12ed84a13a51db

93e3604e200b4aa84b210e4ba7a707bf.exe

分析耗时

77s

最近分析

文件大小

1.6MB
静态报毒 动态报毒 AI SCORE=80 BSCOPE BURDEN CLASSIC CONFIDENCE HFSADWARE HIGH CONFIDENCE JOHNNIE SOFTCNAPP 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee 20200706 6.0.6.653
Alibaba 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_60% (D) 20190702 1.0
Baidu 20190318 1.0.0.2
Avast Win32:Adware-gen [Adw] 20200706 18.4.3895.0
Kingsoft 20200706 2013.8.14.323
Tencent 20200706 1.0.0.1
静态指标
This executable is signed
This executable has a PDB path (1 个事件)
pdb_path d:\Jenkins\workspace\srf_develop\ShuRuFa\程序\Trunk\Bin\pdbmap\DongFang\WBUpd32.pdb
The file contains an unknown PE resource name possibly indicative of a packer (2 个事件)
resource name PIC
resource name ZIPRES
行为判定
动态指标
Foreign language identified in PE resource (9 个事件)
name PIC language LANG_CHINESE offset 0x00193290 filetype PNG image data, 85 x 85, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000026f
name ZIPRES language LANG_CHINESE offset 0x00193500 filetype Zip archive data, at least v2.0 to extract sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000014da
name RT_ICON language LANG_CHINESE offset 0x001989b4 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x001989b4 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x001989b4 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x001989b4 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_GROUP_ICON language LANG_CHINESE offset 0x00198e1c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000003e
name RT_VERSION language LANG_CHINESE offset 0x00198e5c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000258
name RT_MANIFEST language LANG_CHINESE offset 0x001990b4 filetype UTF-8 Unicode text, with very long lines, with CRLF line terminators sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000318
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 24 AntiVirus engines on VirusTotal as malicious (24 个事件)
Bkav W32.HfsAdware.DA20
FireEye Generic.mg.93e3604e200b4aa8
K7AntiVirus Adware ( 00538f8f1 )
K7GW Adware ( 00538f8f1 )
CrowdStrike win/malicious_confidence_60% (D)
APEX Malicious
Avast Win32:Adware-gen [Adw]
BitDefender Gen:Variant.Johnnie.253551
MicroWorld-eScan Gen:Variant.Johnnie.253551
Rising Adware.Agent!1.C6F2 (CLASSIC)
Endgame malicious (high confidence)
DrWeb Adware.Softcnapp.60
Zillya Adware.Burden.Win32.100
Invincea heuristic
Emsisoft Gen:Variant.Johnnie.253551 (B)
Microsoft PUA:Win32/Softcnapp
GData Gen:Variant.Johnnie.253551
VBA32 BScope.Adware.Softcnapp
MAX malware (ai score=80)
ESET-NOD32 a variant of Win32/Softcnapp.J potentially unwanted
Yandex Riskware.Agent!
Ikarus PUA.Softcnapp
Fortinet Riskware/Softcnapp
AVG Win32:Adware-gen [Adw]
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-12-12 11:17:36

Imports

Library KERNEL32.dll:
0x52f128 LockResource
0x52f12c GetLongPathNameW
0x52f130 lstrcpyW
0x52f134 ExitThread
0x52f144 SetFileTime
0x52f14c GlobalMemoryStatus
0x52f150 GetVersion
0x52f154 PeekNamedPipe
0x52f158 GetSystemDirectoryA
0x52f15c SleepEx
0x52f160 GetThreadLocale
0x52f168 CompareStringW
0x52f16c CompareStringA
0x52f170 SetEndOfFile
0x52f174 CreateMutexW
0x52f178 GetDriveTypeA
0x52f180 GetLocaleInfoW
0x52f184 FlushFileBuffers
0x52f188 SetStdHandle
0x52f18c WriteConsoleW
0x52f190 GetConsoleOutputCP
0x52f194 WriteConsoleA
0x52f19c ReadConsoleInputA
0x52f1a0 SetConsoleMode
0x52f1a8 ReleaseMutex
0x52f1ac CreateFileA
0x52f1b0 MoveFileExW
0x52f1b4 FindClose
0x52f1b8 SetFileAttributesW
0x52f1bc GlobalUnlock
0x52f1c4 GlobalFree
0x52f1c8 GetTickCount
0x52f1d0 WriteFile
0x52f1d4 WaitForSingleObject
0x52f1d8 RemoveDirectoryW
0x52f1dc GetVersionExW
0x52f1e0 WideCharToMultiByte
0x52f1e4 Process32FirstW
0x52f1e8 GlobalLock
0x52f1ec FindNextFileW
0x52f1f0 FormatMessageW
0x52f1f4 GlobalAlloc
0x52f1f8 CopyFileW
0x52f200 OpenProcess
0x52f204 Process32NextW
0x52f208 GetCommandLineW
0x52f20c GetCommandLineA
0x52f220 GetStringTypeW
0x52f224 GetStringTypeA
0x52f228 IsValidLocale
0x52f22c EnumSystemLocalesA
0x52f230 GetLocaleInfoA
0x52f234 GetUserDefaultLCID
0x52f23c GetStartupInfoA
0x52f240 GetFileType
0x52f244 SetHandleCount
0x52f248 IsValidCodePage
0x52f24c GetOEMCP
0x52f254 GetCurrentProcess
0x52f258 GetLocalTime
0x52f260 CreateProcessW
0x52f264 GetCurrentProcessId
0x52f268 GetCurrentThreadId
0x52f26c SetErrorMode
0x52f270 HeapFree
0x52f274 GetProcAddress
0x52f278 HeapAlloc
0x52f27c GetProcessHeap
0x52f280 CreateFileW
0x52f284 TerminateThread
0x52f288 GetExitCodeThread
0x52f28c GetFileSize
0x52f294 ReadFile
0x52f298 Sleep
0x52f29c GetModuleFileNameW
0x52f2a0 DeleteFileW
0x52f2a4 SizeofResource
0x52f2a8 LoadResource
0x52f2b0 FreeLibrary
0x52f2b8 LoadLibraryExW
0x52f2bc LoadLibraryW
0x52f2c0 FindResourceW
0x52f2c4 lstrlenW
0x52f2c8 RaiseException
0x52f2d4 lstrcmpiW
0x52f2d8 GetLastError
0x52f2e4 GetTempPathW
0x52f2f0 CreateThread
0x52f2f4 CreateDirectoryW
0x52f2f8 FindFirstFileW
0x52f2fc MultiByteToWideChar
0x52f300 CloseHandle
0x52f304 GetModuleHandleW
0x52f308 GetFullPathNameA
0x52f30c GetACP
0x52f310 SetFilePointer
0x52f314 HeapCreate
0x52f318 HeapDestroy
0x52f31c VirtualAlloc
0x52f320 VirtualFree
0x52f324 LoadLibraryA
0x52f32c GetModuleFileNameA
0x52f330 GetStdHandle
0x52f334 HeapSize
0x52f338 SetLastError
0x52f33c TlsFree
0x52f340 TlsSetValue
0x52f344 TlsAlloc
0x52f348 TlsGetValue
0x52f34c GetConsoleMode
0x52f350 GetConsoleCP
0x52f354 GetCPInfo
0x52f358 LCMapStringW
0x52f35c LCMapStringA
0x52f360 RtlUnwind
0x52f364 GetStartupInfoW
0x52f368 GetVersionExA
0x52f36c MoveFileW
0x52f370 FindFirstFileA
0x52f37c HeapReAlloc
0x52f380 IsDebuggerPresent
0x52f388 TerminateProcess
0x52f38c ExitProcess
0x52f390 GetModuleHandleA
0x52f394 InterlockedExchange
0x52f398 SetPriorityClass
0x52f39c OutputDebugStringA
0x52f3a0 DeviceIoControl
0x52f3a4 GetSystemDirectoryW
Library USER32.dll:
0x52f3dc SetWindowLongW
0x52f3e0 GetWindowRect
0x52f3e4 GetMonitorInfoW
0x52f3e8 LoadCursorW
0x52f3ec CreateWindowExW
0x52f3f0 SetWindowPos
0x52f3f4 DefWindowProcW
0x52f3f8 MoveWindow
0x52f3fc RegisterClassExW
0x52f400 PostMessageW
0x52f404 ShowWindow
0x52f408 CharNextW
0x52f40c UnregisterClassA
0x52f410 DestroyWindow
0x52f414 PostQuitMessage
0x52f418 wsprintfW
0x52f424 MessageBoxA
0x52f428 GetWindowLongW
0x52f42c GetDesktopWindow
Library GDI32.dll:
0x52f110 DeleteObject
0x52f114 SelectObject
0x52f118 DeleteDC
0x52f11c CreateDIBSection
0x52f120 CreateCompatibleDC
Library ADVAPI32.dll:
0x52f008 RegCreateKeyExW
0x52f00c RegOpenKeyExW
0x52f010 RegQueryValueExW
0x52f014 RegCloseKey
0x52f018 RegSetValueExW
0x52f01c RegQueryInfoKeyW
0x52f020 RegDeleteValueW
0x52f024 RegEnumKeyExW
0x52f028 RegDeleteKeyW
0x52f034 RevertToSelf
0x52f03c RegEnumKeyW
0x52f040 DuplicateTokenEx
0x52f044 RegOpenKeyW
0x52f048 OpenProcessToken
0x52f04c ReportEventA
Library SHELL32.dll:
0x52f3c4 SHGetFolderPathW
0x52f3cc ShellExecuteW
Library ole32.dll:
0x52f4f4 CoInitialize
0x52f4f8 OleInitialize
0x52f4fc CoCreateInstance
0x52f500 CoTaskMemAlloc
0x52f504 CoUninitialize
0x52f508 CoTaskMemRealloc
0x52f50c CoTaskMemFree
0x52f510 OleUninitialize
0x52f514 CLSIDFromString
Library OLEAUT32.dll:
0x52f3bc VarUI4FromStr
Library DuiLib32.dll:
Library gdiplus.dll:
0x52f4bc GdipGetImageHeight
0x52f4c0 GdipAlloc
0x52f4c4 GdipFree
0x52f4c8 GdipCreateFromHDC
0x52f4cc GdipCloneImage
0x52f4d4 GdipDeleteGraphics
0x52f4d8 GdipGetImageWidth
0x52f4e0 GdipDisposeImage
Library SHLWAPI.dll:
0x52f3d4 PathFileExistsW
Library WS2_32.dll:
0x52f434 shutdown
0x52f438 WSACleanup
0x52f43c WSAStartup
0x52f440 WSAGetLastError
0x52f444 closesocket
0x52f448 socket
0x52f44c recv
0x52f450 send
0x52f454 getsockname
0x52f458 ntohs
0x52f45c bind
0x52f460 htons
0x52f464 getsockopt
0x52f468 getpeername
0x52f46c setsockopt
0x52f470 connect
0x52f474 WSASetLastError
0x52f478 inet_addr
0x52f47c gethostbyname
0x52f480 inet_ntoa
0x52f484 htonl
0x52f488 getservbyname
0x52f48c gethostbyaddr
0x52f490 getservbyport
0x52f494 sendto
0x52f498 recvfrom
0x52f49c accept
0x52f4a0 listen
0x52f4a4 __WSAFDIsSet
0x52f4a8 select
0x52f4ac ioctlsocket
0x52f4b0 gethostname
Library NETAPI32.dll:
0x52f3b0 NetApiBufferFree
0x52f3b4 NetWkstaGetInfo
Library iphlpapi.dll:
0x52f4e8 GetAdaptersInfo

Exports

Ordinal Address Name
1 0x441720 curl_easy_cleanup
2 0x4417b0 curl_easy_duphandle
3 0x469cd0 curl_easy_escape
4 0x441790 curl_easy_getinfo
5 0x441600 curl_easy_init
6 0x441a50 curl_easy_pause
7 0x441670 curl_easy_perform
8 0x441bc0 curl_easy_recv
9 0x4419b0 curl_easy_reset
10 0x441c20 curl_easy_send

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50539 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.