0.9
低危

27053bc42ae988056c92f0a201b49f7f2bf6b7b1b78d3e8895fee9f0285cc1b9

27053bc42ae988056c92f0a201b49f7f2bf6b7b1b78d3e8895fee9f0285cc1b9.exe

分析耗时

197s

最近分析

370天前

文件大小

25.8KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER VAGUE
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.57
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Trojan-gen 20200501 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200503 2013.8.14.323
McAfee PWS-FBLP!9597DB608A27 20200503 6.0.6.653
Tencent Malware.Win32.Gencirc.10b9c1c3 20200503 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 61 个反病毒引擎识别为恶意 (50 out of 61 个事件)
ALYac Trojan.Agent.BAVV
APEX Malicious
AVG Win32:Trojan-gen
Acronis suspicious
Ad-Aware Trojan.Agent.BAVV
AhnLab-V3 Trojan/Win32.Upatre.C219756
Antiy-AVL Trojan/Win32.Vague
Arcabit Trojan.Agent.BAVV
Avast Win32:Trojan-gen
Avira TR/Crypt.XPACK.Gen7
BitDefender Trojan.Agent.BAVV
BitDefenderTheta Gen:NN.ZexaF.34108.bqX@a8y8ZVoi
Bkav W32.FamVT.GeND.Trojan
CAT-QuickHeal Trojan.Vague
Comodo TrojWare.Win32.Kryptik.BFP@54u2z9
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.08a273
Cylance Unsafe
Cyren W32/Trojan.OLOO-0497
DrWeb Trojan.PWS.Panda.5183
ESET-NOD32 Win32/TrojanDownloader.Waski.A
Emsisoft Trojan.Agent.BAVV (B)
Endgame malicious (high confidence)
F-Prot W32/Trojan3.GOO
F-Secure Trojan.TR/Crypt.XPACK.Gen7
FireEye Generic.mg.9597db608a273610
Fortinet W32/ZBOT.GQ!tr
GData Trojan.Agent.BAVV
Invincea heuristic
Jiangmin Trojan/Vague.i
K7AntiVirus Trojan-Downloader ( 004b972f1 )
K7GW Trojan-Downloader ( 004b972f1 )
Kaspersky Trojan.Win32.Vague.bl
MAX malware (ai score=84)
Malwarebytes Trojan.Email
MaxSecure Trojan.Upatre.Gen
McAfee PWS-FBLP!9597DB608A27
McAfee-GW-Edition BehavesLike.Win32.Downloader.mt
MicroWorld-eScan Trojan.Agent.BAVV
Microsoft TrojanDownloader:Win32/Upatre.A
NANO-Antivirus Trojan.Win32.Vague.cqjjaa
Panda Generic Malware
Qihoo-360 HEUR/QVM10.1.F8BC.Malware.Gen
Rising Trojan.DL.Win32.Waski.k (RDMK:cmRtazr6yqxhKhDhd6POA0pnKREf)
Sangfor Malware
SentinelOne DFI - Suspicious PE
Sophos Troj/Zbot-GZB
Tencent Malware.Win32.Gencirc.10b9c1c3
TotalDefense Win32/Tnega.ATIC
Trapmine suspicious.low.ml.score
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2013-11-21 14:23:34

PE Imphash

3c2e1c95b87b1cf3c33906bf62025007

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000123a 0x00001400 5.865043419969081
.rdata 0x00003000 0x0000171e 0x00001800 6.195364880298748
.data 0x00005000 0x00000430 0x00000200 1.060481211975618
.rsrc 0x00006000 0x00002990 0x00002a00 2.891928182575322

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000060ec 0x00002734 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x00008820 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MANIFEST 0x00008834 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library msvcrt.dll:
0x403084 _ismbblead
0x403088 exit
0x40308c _exit
0x403090 _acmdln
0x403094 _initterm
0x403098 _amsg_exit
0x40309c __setusermatherr
0x4030a0 __p__commode
0x4030a4 __p__fmode
0x4030a8 __set_app_type
0x4030ac ?terminate@@YAXXZ
0x4030b0 _controlfp
0x4030b4 _XcptFilter
0x4030b8 _cexit
0x4030bc __getmainargs
Library KERNEL32.dll:
0x40300c GetCurrentProcess
0x403010 TerminateProcess
0x403014 GetCurrentProcessId
0x403018 GetCurrentThreadId
0x40301c GetTickCount
0x403020 GetModuleHandleA
0x403028 GetStartupInfoA
0x403030 Sleep
0x403034 InterlockedExchange
0x403040 ExitProcess
Library USER32.dll:
0x403048 RegisterClassExW
0x40304c PostQuitMessage
0x403050 MessageBoxW
0x403054 GetWindowRect
0x403058 GetSystemMetrics
0x40305c GetMessageA
0x403060 EndPaint
0x403064 DrawTextW
0x403068 DispatchMessageW
0x40306c DefWindowProcW
0x403070 CreateWindowExW
0x403074 BringWindowToTop
0x403078 BeginPaint
0x40307c TranslateMessage
Library GDI32.dll:
0x403000 TextOutW

L!This program cannot be run in DOS mode.
X7 X' X! X0 X X% Rich
`.rdata
@.data
E_^[SXP@
VirtEualAPllocU
u}_^[_^[
33uvv|Z
SVW]u}K
VVRRRRh
0E_^[i
PQRESE|
+#K;uU-P@
3+EnumEWindPows
VirtEualPProteUct
jXhXB@
u 5$T@
8csmu+x
B(;r3_^[]j
VaYt=E
+PVYYt+@$
+SVWP@
1E3PeuEEEEd
Y__^[]Q
tDt?!EMZ
u+Q<|$
E3E3;t
"wP!w#
!wv!w("wB1"w
w<!wf!w^!w!wD!w*"w
+!6w5w:wPt6w
6wo(6ws{6w 6w6wKr6wQ
Cw6DwIw
MwQCwIwwLw'Dw'Dw
(DwaHwCwuEw7Dw+Dw
VjMQSVEu
MDu=uuSVu
uVVjPE
_EPEPjS}
WEPjS
EVVVVS
A;EtjM
WP_3^@[
@;Vhuh
GetCurW
DirectoryW
WrFile"
CloseHandle
ileNiteFile
lstrcmpW
ReadFile
GetFileSize
CreateFileW
GetTempPatMU
USERuleF
HeapAlloc
HeapCreate
ExitProcess
eHanodul"
KERNEL32.dll
wsprintfW
32.dll
Shternxecu#
SHELL32.dll
InSendetReadFile
HttpQueryInfoWRequHttp
InternetSetOptionW
GetMlete"
ternetQueryOptiodll
MAnnecenReenW
PQetCotpOpetOpU
ternMW
HtUtern
WINIt
Uf2n22222
333333
0C1k1g0s0
1L0Y0110010>01100d
110062?2t11
VirtEualPMroteUct
BBMRQ\EP
GetPErocAMddreUss
LoadELibrMaryEUxA
UeVirtEualAMllocU
q|s|)#;
3PPWMM(
3jSVW}
5EU+#Eo@
|uz}tz0N#;
tvtvE#;
VirtEualFMree
tA_^[UEM
ERNUEEML32MU
|.DLLx
__getmainargs
_cexit
_XcptFilter
_ismbblead
_acmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
msvcrt.dll
_controlfp
ExitProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
KERNEL32.dll
BeginPaint
BringWindowToTop
CreateWindowExW
DefWindowProcW
DispatchMessageW
DrawTextW
EndPaint
GetMessageA
GetSystemMetrics
GetWindowRect
MessageBoxW
PostQuitMessage
RegisterClassExW
TranslateMessage
USER32.dll
TextOutW
GDI32.dll
0!dX0!0!0!0!0!0!0!.
0!1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"0!
2#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#2#
3$I:I:I:I:I:I:H:I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;4$
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGC
/i/ige
html.rar
agmages/html.eac
or.ulinic.co.uk
epc-gwenn/co
pnik.exe
applicwnio"
text/*
Updates do
lopner"
it.exe
Lapoxfu
Bejafi
C:\Users\admin\Downloads\2fa1bbe739c150b25263a90dec913d52.virus.exe
C:\b2bf72c117f2395458196d1ffb887a446f88f272db9ca10665427deead3d8f7f
C:\Users\Petra\AppData\Local\Temp\pnit.pe32
C:\Users\Petra\AppData\Local\Temp\71c55cbe2446fbbc-pni.pe32
C:\Users\admin\Downloads\0755c6f277bc1dd6_pnit.exe
C:\c5f8e737aa15d5c58b5513c691e4eb600d22988e76fdf859b5803e9692452c72
C:\af7916a4657d8226da449e5167dec2619b941dfa5c3ed2c98939662ce7a12fdd
C:\7cf100c99ba55d9b00c3c438d4b7308c6d920951ab8f351d6a6a221d0e592032
C:\Users\admin\Downloads\pnit.exe
C:\Users\admin\Downloads\8561f85451d9fe7b4e39771b263b8cb31a95543abae5c9abaabab3127400f448.exe
C:\232a96ba6a0c42082f44069e7f25dff487d9bf451c49eb1332b0b2221de70190
C:\Users\admin\Downloads\pnit.exe
C:\Users\admin\Downloads\7107d46a6230f90053f95ccf90a940dacbc6b340f141987189ea22fa63c1c0c9.exe
C:\5db80ca6aa427a4e448b9f28aaf0fcbe642b2a96f6d2c2ffa6070ba8bee26289
C:\Users\admin\Downloads\pnit.exe
C:\Users\Petra\AppData\Local\Temp\pnit.pe32
C:\Users\admin\Downloads\a5b2aa1ab9ca85f1_pnit.exe
C:\e7ed4212df4ada62f9719c63ecbd4d6a1ada7ef0f321368af520d73bfdbc8f81
C:\Users\admin\Downloads\pnit.exe
C:\1047bf2a1b1121923604f801889e2a5045d500b0c08db44764434228c77ba240
C:\0a1b7fb6c464d0d69a838c8a3e4171179e3b04adce1f58e9d8d4b3475d393ec7
C:\5bd976fedca632a25fedc6882f7b93a924aeacce9f4e97edb737c179b18941ac
C:\6f9f84bf1e289b5efacd8d04b257b97132f3383b0da8e986787e05f9675b315c

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.