1.8
低危

00a11fc55db9f04e52e8960636f4f12e92a0418a18b370fd5d0aa2ed42e9466c

9bd27e612a69ed125f7a93fdfd096105.exe

分析耗时

80s

最近分析

文件大小

221.4KB
静态报毒 动态报毒 GAMETHIEF GQXM MAGANIA
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba 20190527 0.3.0.5
Avast 20200521 18.4.3895.0
Baidu 20190318 1.0.0.2
Kingsoft 20200521 2013.8.14.323
McAfee 20200521 6.0.6.653
Tencent 20200521 1.0.0.1
CrowdStrike 20190702 1.0
静态指标
This executable is signed
This executable has a PDB path (1 个事件)
pdb_path F:\AliWWAutoPackage\Trunk\SourceCode\IMClient-RV\symbol\Release\AliIM.pdb
行为判定
动态指标
Foreign language identified in PE resource (16 个事件)
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00037118 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_MENU language LANG_CHINESE offset 0x00037618 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000050
name RT_DIALOG language LANG_CHINESE offset 0x00037678 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000c2
name RT_STRING language LANG_CHINESE offset 0x00037a58 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000000d0
name RT_ACCELERATOR language LANG_CHINESE offset 0x00037668 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000010
name RT_GROUP_ICON language LANG_CHINESE offset 0x00037580 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000092
name RT_VERSION language LANG_CHINESE offset 0x00037740 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000318
File has been identified by one AntiVirus engine on VirusTotal as malicious (1 个事件)
MaxSecure GameThief.Magania.gqxm
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2013-12-05 17:43:46

Imports

Library KERNEL32.dll:
0x40c004 CloseHandle
0x40c008 CreateFileW
0x40c00c GetProcAddress
0x40c010 GetModuleHandleW
0x40c014 GetLastError
0x40c018 ReadFile
0x40c01c WriteFile
0x40c020 SetFilePointer
0x40c024 FlushFileBuffers
0x40c028 GetFileSize
0x40c02c GetLocalTime
0x40c030 LocalFree
0x40c03c Sleep
0x40c040 CreateProcessW
0x40c048 LoadLibraryExW
0x40c04c lstrlenA
0x40c050 MultiByteToWideChar
0x40c054 SizeofResource
0x40c058 GetFileAttributesW
0x40c05c LoadResource
0x40c060 FindResourceW
0x40c064 FindResourceExW
0x40c068 RaiseException
0x40c078 GetCurrentProcessId
0x40c07c GetCurrentThreadId
0x40c080 GetTickCount
0x40c088 IsDebuggerPresent
0x40c094 GetCurrentProcess
0x40c098 TerminateProcess
0x40c09c GetStartupInfoW
0x40c0a0 HeapSetInformation
0x40c0a8 DeleteFileW
0x40c0ac CopyFileW
0x40c0b0 LockResource
0x40c0b4 GetModuleFileNameW
0x40c0b8 InterlockedExchange
0x40c0bc DecodePointer
0x40c0c8 GetProcessHeap
0x40c0cc HeapSize
0x40c0d0 HeapReAlloc
0x40c0d4 EncodePointer
0x40c0d8 HeapFree
0x40c0dc HeapAlloc
0x40c0e0 HeapDestroy
Library USER32.dll:
0x40c1dc MessageBoxW
Library SHELL32.dll:
0x40c1cc CommandLineToArgvW
Library ole32.dll:
0x40c1e4 CoInitialize
Library SHLWAPI.dll:
0x40c1d4 PathFileExistsW
Library MSVCP100.dll:
Library MSVCR100.dll:
0x40c0f4 ??2@YAPAXI@Z
0x40c0f8 _wcsicmp
0x40c0fc wcsstr
0x40c100 wcsrchr
0x40c104 _wcslwr_s
0x40c108 wcscmp
0x40c10c wcsnlen
0x40c110 memmove_s
0x40c114 _recalloc
0x40c118 calloc
0x40c11c _vscwprintf
0x40c120 vswprintf_s
0x40c128 memmove
0x40c12c strlen
0x40c130 memset
0x40c134 sprintf_s
0x40c138 _unlock
0x40c13c __dllonexit
0x40c140 _lock
0x40c144 _onexit
0x40c148 ?terminate@@YAXXZ
0x40c150 __wgetmainargs
0x40c154 _cexit
0x40c158 _exit
0x40c15c _XcptFilter
0x40c160 exit
0x40c164 _wcmdln
0x40c168 _initterm
0x40c16c _initterm_e
0x40c170 _configthreadlocale
0x40c174 __setusermatherr
0x40c178 _commode
0x40c17c _fmode
0x40c180 __set_app_type
0x40c184 _crt_debugger_hook
0x40c190 _invoke_watson
0x40c194 _controlfp_s
0x40c198 wmemcpy_s
0x40c19c memcpy
0x40c1a0 wcslen
0x40c1a8 ??3@YAXPAX@Z
0x40c1ac free
0x40c1b0 _amsg_exit
0x40c1b4 memcpy_s
0x40c1b8 __CxxFrameHandler3
0x40c1c0 _CxxThrowException

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50003 239.255.255.250 3702
192.168.56.101 51966 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.