2.8
中危

bab0018688dca84b2f433575f005a9eb9ccf7f18c5c952889ed11d335e1675d3

9b6907772c54cab67506d6bae78062a7.exe

分析耗时

73s

最近分析

文件大小

179.5KB
静态报毒 动态报毒 100% AGEN AI SCORE=100 AIDETECTVM ATTRIBUTE BCEX CONFIDENCE DKHU DYNAMER EKZJCC FAREIT GENASA GENCIRC HESV HIGH CONFIDENCE HIGHCONFIDENCE JOHNNIE KCLOUD KNUZTMRMJKL MALWARE2 MALWARE@#2K72SDWT661EF PWSZBOT PYRHU4KFWDC R06EC0PI220 R194675 SCORE SHADE STATIC AI SUSPICIOUS PE TSGENERIC UNSAFE VBKRYPT XKRX ZBOT 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanSpy:Win32/Hesv.e4af49d1 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Baidu 20190318 1.0.0.2
Avast Win32:Rootkit-gen [Rtk] 20201219 21.1.5827.0
Kingsoft Win32.Troj.Hesv.d.(kcloud) 20201219 2017.9.26.565
McAfee PWSZbot-FHN.b 20201219 6.0.6.653
Tencent Malware.Win32.Gencirc.114b0993 20201219 1.0.0.1
静态指标
One or more processes crashed (1 个事件)
Time & API Arguments Status Return Repeated
1619781093.494148
__exception__
stacktrace:
gapfnScSendMessage+0x332 GetAppCompatFlags2-0x8ea user32+0x162fa @ 0x775a62fa
GetThreadDesktop+0xd7 GetWindowLongW-0x2c4 user32+0x16d3a @ 0x775a6d3a
GetClientRect+0xc5 CallWindowProcW-0xb user32+0x20d27 @ 0x775b0d27
CallWindowProcA+0x1b GetClassNameA-0x95 user32+0x2794a @ 0x775b794a
ProcCallEngine+0x2eb __vbaUdtVar-0x65c9 msvbvm60+0xfd348 @ 0x72a3d348
ProcCallEngine+0x5dfd __vbaUdtVar-0xab7 msvbvm60+0x102e5a @ 0x72a42e5a
ProcCallEngine+0x5dfd __vbaUdtVar-0xab7 msvbvm60+0x102e5a @ 0x72a42e5a
IID_IVbaHost+0x236f3 UserDllMain-0x41bc4 msvbvm60+0x51d33 @ 0x72991d33
9b6907772c54cab67506d6bae78062a7+0x6bd8 @ 0x406bd8
IID_IVbaHost+0x239f4 UserDllMain-0x418c3 msvbvm60+0x52034 @ 0x72992034
IID_IVbaHost+0x23e5b UserDllMain-0x4145c msvbvm60+0x5249b @ 0x7299249b
IID_IVbaHost+0x24027 UserDllMain-0x41290 msvbvm60+0x52667 @ 0x72992667
IID_IVbaHost+0x3b77 UserDllMain-0x61740 msvbvm60+0x321b7 @ 0x729721b7
IID_IVbaHost+0x386d UserDllMain-0x61a4a msvbvm60+0x31ead @ 0x72971ead
IID_IVbaHost+0x36291 UserDllMain-0x2f026 msvbvm60+0x648d1 @ 0x729a48d1
IID_IVbaHost+0x418d8 UserDllMain-0x239df msvbvm60+0x6ff18 @ 0x729aff18
BASIC_CLASS_Release+0xfcaa IID_IVbaHost-0xff3d msvbvm60+0x1e703 @ 0x7295e703
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
9b6907772c54cab67506d6bae78062a7+0x110a @ 0x40110a
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1636268
registers.edi: 40763392
registers.eax: 2010446512
registers.ebp: 1636268
registers.edx: 2130566132
registers.ebx: 39939224
registers.esi: 168568442
registers.ecx: 8728656
exception.instruction_r: 8b 4e 34 89 4f 04 89 f9 83 c1 48 89 4f 0c 83 c1
exception.instruction: mov ecx, dword ptr [esi + 0x34]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x26169ff
success 0 0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619781093.478148
NtAllocateVirtualMemory
process_identifier: 2120
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x026e0000
success 0 0
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) (1 个事件)
Time & API Arguments Status Return Repeated
1619781064.665148
NtProtectVirtualMemory
process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 32 (PAGE_EXECUTE_READ)
process_handle: 0xffffffff
base_address: 0x00710000
success 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 62 AntiVirus engines on VirusTotal as malicious (50 out of 62 个事件)
Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Johnnie.14520
FireEye Generic.mg.9b6907772c54cab6
CAT-QuickHeal Trojan.VBCrypt.MF.136
ALYac Gen:Variant.Johnnie.14520
Cylance Unsafe
Zillya Trojan.Bcex.Win32.115
SUPERAntiSpyware Trojan.Agent/Gen-Dropper
Sangfor Malware
K7AntiVirus Trojan ( 0051d4241 )
Alibaba TrojanSpy:Win32/Hesv.e4af49d1
K7GW Trojan ( 0051d4241 )
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Johnnie.D38B8
BitDefenderTheta AI:Packer.B7DE1ABD21
Cyren W32/Trojan.XKRX-3545
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Rootkit-gen [Rtk]
ClamAV Win.Trojan.Generic-5703484-0
Kaspersky Trojan.Win32.Hesv.dst
BitDefender Gen:Variant.Johnnie.14520
NANO-Antivirus Trojan.Win32.Zbot.ekzjcc
Paloalto generic.ml
AegisLab Trojan.Multi.Generic.4!c
Rising Spyware.Zbot!8.16B (TFE:4:KnUztmrmjKL)
Ad-Aware Gen:Variant.Johnnie.14520
Sophos Mal/Generic-S
Comodo Malware@#2k72sdwt661ef
F-Secure Heuristic.HEUR/AGEN.1125769
DrWeb Trojan.Inject2.42237
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R06EC0PI220
McAfee-GW-Edition BehavesLike.Win32.Fareit.cc
Emsisoft Gen:Variant.Johnnie.14520 (B)
Ikarus Virus.Win32.VBInject
Jiangmin Trojan.Shade.dw
eGambit Unsafe.AI_Score_99%
Avira HEUR/AGEN.1125769
Antiy-AVL Trojan/Win32.TSGeneric
Kingsoft Win32.Troj.Hesv.d.(kcloud)
Microsoft Trojan:Win32/Dynamer!ac
ZoneAlarm Trojan.Win32.Hesv.dst
GData Gen:Variant.Johnnie.14520
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.VBKrypt.R194675
McAfee PWSZbot-FHN.b
MAX malware (ai score=100)
VBA32 Trojan.Hesv
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2017-01-26 01:09:51

Imports

Library MSVBVM60.DLL:
0x401004 MethCallEngine
0x401008 EVENT_SINK_Invoke
0x40100c Zombie_GetTypeInfo
0x401010
0x401014
0x401018
0x40101c EVENT_SINK_AddRef
0x401020 DllFunctionCall
0x401028 EVENT_SINK_Release
0x401030 __vbaExceptHandler
0x401034
0x401038
0x40103c
0x401040
0x401044
0x401048
0x40104c
0x401050
0x401054
0x401058
0x40105c

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.