3.0
中危

03cb271539ca2d5db317014afe55709e1c9b24b5cbfc48958c177ef36ebbc252

984d65356ea193c9203e43c2de78d585.exe

分析耗时

20s

最近分析

文件大小

295.5KB
静态报毒 动态报毒 AGEN AI SCORE=82 BSCOPE CLASSIC CONFIDENCE ELDORADO FVVRFW GANDCRAB GDSDA GENERICKD GVOI HIGH CONFIDENCE HTCF KRYPTIK MALICIOUS PE MALPE23 MULTIPLUG PLOCK QVM10 SODINOK TIGGRE UNSAFE WACATAC ZENPAK 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee RDN/Generic.dx 20191001 6.0.6.653
Alibaba Trojan:Win32/Zenpak.3eaead19 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20191001 18.4.3895.0
Kingsoft 20191001 2013.8.14.323
Tencent Win32.Trojan.Zenpak.Htcf 20191001 1.0.0.1
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
静态指标
This executable has a PDB path (1 个事件)
pdb_path C:\zecuwafisu.pdbserver\runtime\crypt\tmp_482925056\bin\yonisupiti.pdb³³¬)Dÿÿÿÿ@ ?B
The file contains an unknown PE resource name possibly indicative of a packer (2 个事件)
resource name MICURUCALEMOLEMOBOKUJUNIGUSOSIX
resource name None
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (2 个事件)
Time & API Arguments Status Return Repeated
1620985514.133988
NtProtectVirtualMemory
process_identifier: 1108
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 86016
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x002b8000
success 0 0
1620985514.133988
NtAllocateVirtualMemory
process_identifier: 1108
region_size: 118784
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00500000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 6.849247426457796 section {'size_of_data': '0x0001b800', 'virtual_address': '0x00001000', 'entropy': 6.849247426457796, 'name': '.text', 'virtual_size': '0x0001b6fb'} description A section with a high entropy has been found
entropy 0.3735144312393888 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 52 AntiVirus engines on VirusTotal as malicious (50 out of 52 个事件)
MicroWorld-eScan Trojan.GenericKD.32267062
FireEye Generic.mg.984d65356ea193c9
CAT-QuickHeal Trojan.Wacatac
McAfee RDN/Generic.dx
Malwarebytes Trojan.MalPack.GS
K7AntiVirus Trojan ( 005560cd1 )
Alibaba Trojan:Win32/Zenpak.3eaead19
K7GW Trojan ( 005560cd1 )
Cybereason malicious.fa6da6
Arcabit Trojan.Generic.D1EC5B36
Invincea heuristic
Cyren W32/Kryptik.ADA.gen!Eldorado
Symantec Packed.Generic.525
APEX Malicious
Avast Win32:Trojan-gen
Kaspersky Trojan.Win32.Zenpak.ibf
BitDefender Trojan.GenericKD.32267062
NANO-Antivirus Trojan.Win32.Zenpak.fvvrfw
Paloalto generic.ml
Rising Trojan.Kryptik!1.BB49 (CLASSIC)
Ad-Aware Trojan.GenericKD.32267062
Sophos Mal/GandCrab-H
F-Secure Heuristic.HEUR/AGEN.1043783
VIPRE VirTool.Win32.Obfuscator.hg!b1 (v)
TrendMicro Trojan.Win32.SODINOK.SM.hp
McAfee-GW-Edition BehavesLike.Win32.MultiPlug.dh
Emsisoft Trojan.GenericKD.32267062 (B)
Ikarus Trojan.Agent
F-Prot W32/Kryptik.ADA.gen!Eldorado
Avira HEUR/AGEN.1043783
MAX malware (ai score=82)
Antiy-AVL Trojan/Win32.Wacatac
Microsoft Trojan:Win32/Tiggre!plock
Endgame malicious (high confidence)
AegisLab Trojan.Win32.Malicious.4!c
ZoneAlarm Trojan.Win32.Zenpak.ibf
GData Trojan.GenericKD.32267062
AhnLab-V3 Win-Trojan/MalPe23.Suspicious
Acronis suspicious
VBA32 BScope.Trojan.Gandcrab
ALYac Trojan.GenericKD.32267062
Cylance Unsafe
ESET-NOD32 a variant of Win32/Kryptik.GVOI
TrendMicro-HouseCall Trojan.Win32.SODINOK.SM.hp
Tencent Win32.Trojan.Zenpak.Htcf
Yandex Trojan.Zenpak!
SentinelOne DFI - Malicious PE
Fortinet W32/Kryptik.GVOI!tr
AVG Win32:Trojan-gen
Panda Trj/GdSda.A
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-08-20 08:38:35

Imports

Library KERNEL32.dll:
0x41d010 Sleep
0x41d014 FormatMessageW
0x41d018 lstrlenW
0x41d01c GetLastError
0x41d020 GetProcAddress
0x41d024 GlobalAlloc
0x41d028 GetModuleHandleA
0x41d02c PeekConsoleInputA
0x41d030 CloseHandle
0x41d038 GetCurrencyFormatW
0x41d040 GetDiskFreeSpaceW
0x41d044 ExitProcess
0x41d048 EncodePointer
0x41d04c DecodePointer
0x41d050 IsDebuggerPresent
0x41d058 GetCommandLineW
0x41d05c RaiseException
0x41d060 RtlUnwind
0x41d06c GetModuleHandleExW
0x41d070 AreFileApisANSI
0x41d074 MultiByteToWideChar
0x41d078 WideCharToMultiByte
0x41d07c HeapSize
0x41d080 HeapFree
0x41d08c SetLastError
0x41d094 GetCurrentProcess
0x41d098 TerminateProcess
0x41d09c TlsAlloc
0x41d0a0 TlsGetValue
0x41d0a4 TlsSetValue
0x41d0a8 TlsFree
0x41d0ac GetStartupInfoW
0x41d0b0 GetModuleHandleW
0x41d0b4 WriteFile
0x41d0b8 GetConsoleCP
0x41d0bc GetConsoleMode
0x41d0c0 ReadFile
0x41d0c4 SetFilePointerEx
0x41d0c8 HeapAlloc
0x41d0cc GetCurrentThreadId
0x41d0d0 GetProcessHeap
0x41d0d4 GetStdHandle
0x41d0d8 GetFileType
0x41d0e0 GetModuleFileNameW
0x41d0e8 GetCurrentProcessId
0x41d0f8 IsValidCodePage
0x41d0fc GetACP
0x41d100 GetOEMCP
0x41d104 GetCPInfo
0x41d108 LoadLibraryExW
0x41d10c HeapReAlloc
0x41d110 LCMapStringW
0x41d114 SetStdHandle
0x41d118 WriteConsoleW
0x41d11c FlushFileBuffers
0x41d120 ReadConsoleW
0x41d124 OutputDebugStringW
0x41d128 GetStringTypeW
0x41d12c CreateFileW
0x41d130 SetEndOfFile
Library ADVAPI32.dll:
0x41d000 IsTextUnicode
0x41d004 LookupAccountNameA
0x41d008 SetTokenInformation

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.