12.6
0-day

3e24bc0f9fdba289c0ab90cd86709b32eb6903abc8f3843c07ca74d1af36a6a9

a4e5aac24c36ad5bcf0d935f07232006.exe

分析耗时

196s

最近分析

文件大小

917.0KB
静态报毒 动态报毒 5GW@AKO2 AI SCORE=100 ALI2000015 ATTRIBUTE CLASSIC CONFIDENCE DELF DELFINJECT DELPHILESS EMOY EMRE FAREIT GAUR6LQGEV4 GENERICKD HIGH CONFIDENCE HIGHCONFIDENCE HOEPKB KRYPTIK LOHP LOKI MALWARE@#10FESV1XWCZOC QVLPN SCORE SMAD1 SPUY STATIC AI SUSGEN SUSPICIOUS PE TSCOPE UNSAFE X2094 ZELPHIF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Fareit-FVZ!A4E5AAC24C36 20201211 6.0.6.653
Alibaba Trojan:Win32/DelfInject.ali2000015 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20201210 21.1.5827.0
Tencent Win32.Trojan.Kryptik.Lohp 20201211 1.0.0.1
Kingsoft 20201211 2017.9.26.565
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
静态指标
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 个事件)
section CODE
section DATA
section BSS
The executable uses a known packer (1 个事件)
packer BobSoft Mini Delphi -> BoB / BobSoft
One or more processes crashed (12 个事件)
Time & API Arguments Status Return Repeated
1619803348.537
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74104b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74105d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 184
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe891485
success 0 0
1619803357.95925
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe811485
success 0 0
1619803359.99025
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74114b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74115d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfce71485
success 0 0
1619803361.944125
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfce21485
success 0 0
1619803365.97525
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x741b4b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x741b5d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfce21485
success 0 0
1619803375.3505
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe771485
success 0 0
1619803421.16257
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfce71485
success 0 0
1619803428.712914
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfd011485
success 0 0
1619803435.267494
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe7a1485
success 0 0
1619803449.185807
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe651485
success 0 0
1619803456.500495
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe621485
success 0 0
1619803463.518794
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7456d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
ggsgjr+0xa23f8 @ 0x4a23f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x74164b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x74165d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfd051485
success 0 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself) (50 out of 383 个事件)
Time & API Arguments Status Return Repeated
1619803340.287
NtAllocateVirtualMemory
process_identifier: 796
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003e0000
success 0 0
1619803340.49
NtProtectVirtualMemory
process_identifier: 796
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00461000
success 0 0
1619803340.49
NtAllocateVirtualMemory
process_identifier: 796
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x02e50000
success 0 0
1619803341.397125
NtAllocateVirtualMemory
process_identifier: 708
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003d0000
success 0 0
1619803341.428125
NtProtectVirtualMemory
process_identifier: 708
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00461000
success 0 0
1619803341.428125
NtAllocateVirtualMemory
process_identifier: 708
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00590000
success 0 0
1619803343.037
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
1619803343.131
NtAllocateVirtualMemory
process_identifier: 2960
region_size: 1638400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x02080000
success 0 0
1619803343.131
NtAllocateVirtualMemory
process_identifier: 2960
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x021d0000
success 0 0
1619803343.131
NtAllocateVirtualMemory
process_identifier: 2960
region_size: 630784
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01f50000
success 0 0
1619803343.131
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 602112
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01f52000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d4f000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x02072000
success 0 0
1619803348.444
NtProtectVirtualMemory
process_identifier: 2960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619803343.083875
NtAllocateVirtualMemory
process_identifier: 2496
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003d0000
success 0 0
1619803343.099875
NtProtectVirtualMemory
process_identifier: 2496
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00461000
success 0 0
1619803343.099875
NtAllocateVirtualMemory
process_identifier: 2496
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x007c0000
success 0 0
1619803356.787498
NtAllocateVirtualMemory
process_identifier: 3212
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00370000
success 0 0
1619803356.803498
NtProtectVirtualMemory
process_identifier: 3212
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00461000
success 0 0
1619803356.803498
NtAllocateVirtualMemory
process_identifier: 3212
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01fa0000
success 0 0
1619803357.88125
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
1619803357.89725
NtAllocateVirtualMemory
process_identifier: 3284
region_size: 2293760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x02000000
success 0 0
1619803357.89725
NtAllocateVirtualMemory
process_identifier: 3284
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x021f0000
success 0 0
1619803357.89725
NtAllocateVirtualMemory
process_identifier: 3284
region_size: 630784
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01f40000
success 0 0
1619803357.89725
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 602112
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01f42000
success 0 0
1619803357.94425
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01ff2000
success 0 0
1619803357.94425
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619803357.94425
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01ff2000
success 0 0
1619803357.94425
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619803357.94425
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01ff2000
success 0 0
1619803357.94425
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619803357.94425
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01ff2000
success 0 0
1619803357.94425
NtProtectVirtualMemory
process_identifier: 3284
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
Creates executable files on the filesystem (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.vbs
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping (28 个事件)
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.575617870959157 section {'size_of_data': '0x00072a00', 'virtual_address': '0x00079000', 'entropy': 7.575617870959157, 'name': '.rsrc', 'virtual_size': '0x00072820'} description A section with a high entropy has been found
entropy 0.5005458515283843 description Overall entropy of this PE file is high
Expresses interest in specific running processes (1 个事件)
process ggsgjr.exe
Repeatedly searches for a not-found process, you may want to run a web browser during analysis (38 个事件)
Time & API Arguments Status Return Repeated
1619803340.506
Process32NextW
process_name: a4e5aac24c36ad5bcf0d935f07232006.exe
snapshot_handle: 0x000000fc
process_identifier: 796
failed 0 0
1619803341.428125
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 2956
failed 0 0
1619803343.114875
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 2080
failed 0 0
1619803356.474875
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000002d4
process_identifier: 2496
failed 0 0
1619803356.803498
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 3268
failed 0 0
1619803358.100125
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 3436
failed 0 0
1619803359.162125
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x00000124
process_identifier: 3344
failed 0 0
1619803359.459
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 3452
failed 0 0
1619803360.005875
Process32NextW
process_name: is32bit.exe
snapshot_handle: 0x000000fc
process_identifier: 3668
failed 0 0
1619803361.083875
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x00000124
process_identifier: 3588
failed 0 0
1619803361.256498
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 3752
failed 0 0
1619803361.959373
Process32NextW
process_name: is32bit.exe
snapshot_handle: 0x000000fc
process_identifier: 3908
failed 0 0
1619803364.522373
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x0000015c
process_identifier: 3828
failed 0 0
1619803365.39675
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 3992
failed 0 0
1619803366.225498
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 3124
failed 0 0
1619803371.631498
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000001b4
process_identifier: 4072
failed 0 0
1619803372.678498
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 2440
failed 0 0
1619803376.819625
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 3424
failed 0 0
1619803408.069625
Process32NextW
process_name: mscorsvw.exe
snapshot_handle: 0x00000388
process_identifier: 3468
failed 0 0
1619803415.10635
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 3712
failed 0 0
1619803421.202723
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 4064
failed 0 0
1619803423.936723
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000164
process_identifier: 3152
failed 0 0
1619803424.604458
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 3576
failed 0 0
1619803428.891143
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 1936
failed 0 0
1619803430.641143
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x00000140
process_identifier: 3300
failed 0 0
1619803431.004747
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 1924
failed 0 0
1619803435.313655
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x000000fc
process_identifier: 3180
failed 0 0
1619803445.781655
Process32NextW
process_name: mscorsvw.exe
snapshot_handle: 0x0000022c
process_identifier: 3788
failed 0 0
1619803445.523909
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 300
failed 0 0
1619803449.16945
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 1616
failed 0 0
1619803455.95045
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000001f8
process_identifier: 1616
failed 0 0
1619803455.027958
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 3432
failed 0 0
1619803456.480777
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 284
failed 0 0
1619803461.418777
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000001b4
process_identifier: 284
failed 0 0
1619803460.468219
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 1712
failed 0 0
1619803463.51381
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 4068
failed 0 0
1619803467.23181
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x00000188
process_identifier: 4068
failed 0 0
1619803466.847919
Process32NextW
process_name: ggsgjr.exe
snapshot_handle: 0x000000fc
process_identifier: 3624
failed 0 0
网络通信
Communicates with host for which no DNS query was performed (3 个事件)
host 172.217.24.14
host 203.208.41.33
host 203.208.41.66
Creates an Alternate Data Stream (ADS) (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe:ZoneIdentifier
Allocates execute permission to another process indicative of possible code injection (1 个事件)
Time & API Arguments Status Return Repeated
1619803340.834
NtAllocateVirtualMemory
process_identifier: 2404
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0x00000104
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x000f0000
success 0 0
Installs itself for autorun at Windows startup (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.vbs
Deletes executed files from disk (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
Creates a thread using NtQueueApcThread in a remote process potentially indicative of process injection (2 个事件)
Process injection Process 796 created a thread in remote process 2404
Time & API Arguments Status Return Repeated
1619803340.834
NtQueueApcThread
thread_handle: 0x0000010c
process_identifier: 2404
function_address: 0x000f05c0
parameter: 0x00100000
success 0 0
Potential code injection by writing to the memory of another process (2 个事件)
Time & API Arguments Status Return Repeated
1619803340.834
WriteProcessMemory
process_identifier: 2404
buffer: Q¹0d‹‹@ ‹@ ‹‹‹@‰$‹$YÃVWR¾§ÆgNè„Yƒøv· ¿Zwf;Ït ¿Ntf;ÏuƒÂƒè…Àt‹ÎÁá‹þÁïϾ:Ï3ñBHué_‹Æ^ÃU‹ìQQ‹MSVW…Ét;¸MZf9u1‹A<Át*8PEu"‹@xƒeüÁ‹x‹X$‹p ‹@ùÙñ‰Eø…Àu 3À_^[ÉËM‹Eü‹†ÑèOÿÿÿ;E t ÿEü‹Eü;Eøràë׋Eü·C‹‡EëÊU‹ìQSW3ÿWWjWjh@ÿuÿV‹Øƒûÿu3Àë&WWWS‰}üÿV0W‹}EüPWÿu SÿV SÿV3À9}ü”À_[ÉÅÉtè•…Àt3Éf‰ÃU‹ììV‹ð…äüÿÿP3ÀPPjPÿVl…À…Žj\Xf‰Eü3Àj.f‰EþXjvf‰EðXf‰EòjbXf‰EôjsXf‰Eö3Àf‰EøUü…äüÿÿèÖ‹U è΍UðèÆÿu…ìþÿÿÿuPÿVxƒÄ …äüÿÿPÿV…ìþÿÿPèÂ@P…ìþÿÿP…äüÿÿPèîþÿÿƒÄ^ÉÃU‹ìì,j:XjZf‰EÜXjof‰EÞXjnf‰EàXjef‰EâXjIf‰EäXjdf‰EæXjef‰EèXjnf‰EêXjtf‰EìXjif‰EîXjff‰EðXjif‰EòXf‰EôjeXf‰EöjrXf‰Eø3Àf‰Eú…Ôýÿÿ謍UÜè÷EÿPÆEÿèPEÿP…ÔýÿÿPè?þÿÿƒÄÉÃU‹ìQƒeüV‹ðEüPÿuèþYY…Àtƒ}ütÿuüPÿu è þÿÿƒÄ …Àt3À@ë3À^ÉÃU‹ììSV‹ð‹Ï…øýÿÿè'‹Èè(þÿÿ3ÛS…øýÿÿPÿVWÿV8] uWÿu‹Æè~ÿÿÿYY‹Øë €} u5SWÿuÿWÿV(3ۃøÿ‹Ï•Ãèªþÿÿƒûu9]u WÿV(ƒÈPWÿV,3À@ë3À^[ÉÃU‹ìƒìSVWèsüÿÿ‹ø…ÿ„"h"¿ŠWèÌüÿÿ‹ØYY…Û„ jh0h„jÿӋð…ö„ñh¼Û«½W‰~`‰^@è•üÿÿhÒ¼‰W‰F$è‡üÿÿh|QgjW‰F(èyüÿÿhëI”W‰F,èküÿÿh•å©—W‰F0è]üÿÿh¥°(W‰F4èOüÿÿh)·W‰F8èAüÿÿh[uŠðW‰FDè3üÿÿƒÄ@‹Øhd†óuW‰^ è üÿÿh¢¦aëW‰F èüÿÿhÕOd"W‰Fèüÿÿhy.ÔW‰Fèöûÿÿh±÷W‰FèèûÿÿheóW÷W‰FèÚûÿÿh¯4P“W‰FèÌûÿÿh{=#W‰F<è¾ûÿÿƒÄ@hOû~ W‰Fè­ûÿÿhà=!6W‰FHèŸûÿÿhh‰#W‰è’ûÿÿ‰FLhÍeWè„ûÿÿhÓ1ÆVW‰FPèvûÿÿh7œ½W‰FTèhûÿÿh£-ãW‰FXèZûÿÿ‰F\ƒÄ8EðPÇEðshelÇEôl32ÿӋø…ÿt"hÀåz°W‰~dè,ûÿÿhêêºW‰FlèûÿÿƒÄ‰FpEøPÇEøuserfÇEü32ÆEþÿV ‹ø…ÿtAhqV°0W‰~hèìúÿÿhkV°0W‰FxèÞúÿÿh&cj—W‰FtèÐúÿÿh<cj—W‰F|èÂúÿÿƒÄ ‰†€‹Æë3À_^[ÉÃU‹ìƒì\V‹uW3ÿ;÷„îSè¤ýÿÿ‹Ø;ßu WÿDéՍ†‰EüPëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPF‰Eø‰E9>tYÿ¶¶ŽQP¾ ‹Ãè¾üÿÿ‰}3ÿƒÄ 9>t1jDE¤WPèjEèWPèüƒÄEèPE¤PWWj WWWWÿuÿS$9¾(t†lP†,Pÿu‹Ãè½úÿÿƒÄ 9¾tëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPÿuøÿSWÿSD[_3À^ÉÂU‹ìƒì SW3ÿWWjWjh€ÿu‰}øÿV‹Øƒûÿu3Àë>WSÿV‰Eô;Çt+jh0PWÿV@‰Eø;ÇtWMüQÿuô‰}üPSÿV‹Eü‹M ‰SÿV‹Eø_[É÷f‰f…ÒtV‹ð+ñƒÁ·f‰f…Òuñ^ÃU‹ìQQ‹E‰Eü‹EüE‰Eø‹Eü;Eøt‹EüŠM ˆ‹Eü@‰Eüëç‹EÉÃfƒ8V‹ðt ƒÆfƒ>u÷+ò· f‰ ƒÂf…Éuñ^ËD$Š@„Éuù+D$HÅÉu3ÀÃfƒ9‹Át ƒÀfƒ8u÷+ÁÑøÃ…Ét èÚÿÿÿ…ÀtDAþë fƒù\t ƒè·f…Éuï3ÀÃ
process_handle: 0x00000104
base_address: 0x000f0000
success 1 0
1619803340.834
WriteProcessMemory
process_identifier: 2404
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\a4e5aac24c36ad5bcf0d935f07232006.exeC:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe"C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\a4e5aac24c36ad5bcf0d935f07232006.exe" winsEt lSBSafubszRzcBvQ = cREAteobjEcT("wscriPt.shEll") lSBsafuBsZRZcBvQ.ruN """%ls""", 0, False
process_handle: 0x00000104
base_address: 0x00100000
success 1 0
Used NtSetContextThread to modify a thread in a remote process indicative of process injection (26 个事件)
Process injection Process 708 called NtSetContextThread to modify thread in remote process 2960
Process injection Process 3212 called NtSetContextThread to modify thread in remote process 3284
Process injection Process 3452 called NtSetContextThread to modify thread in remote process 3524
Process injection Process 3696 called NtSetContextThread to modify thread in remote process 3768
Process injection Process 3936 called NtSetContextThread to modify thread in remote process 4008
Process injection Process 2620 called NtSetContextThread to modify thread in remote process 3232
Process injection Process 3712 called NtSetContextThread to modify thread in remote process 3812
Process injection Process 3940 called NtSetContextThread to modify thread in remote process 3144
Process injection Process 1924 called NtSetContextThread to modify thread in remote process 1256
Process injection Process 300 called NtSetContextThread to modify thread in remote process 3968
Process injection Process 3432 called NtSetContextThread to modify thread in remote process 2288
Process injection Process 1712 called NtSetContextThread to modify thread in remote process 3224
Process injection Process 3624 called NtSetContextThread to modify thread in remote process 2212
Time & API Arguments Status Return Repeated
1619803341.803125
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2960
success 0 0
1619803357.506498
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3284
success 0 0
1619803359.725
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3524
success 0 0
1619803361.381498
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3768
success 0 0
1619803365.59975
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 4008
success 0 0
1619803374.240498
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3232
success 0 0
1619803416.88735
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3812
success 0 0
1619803426.213458
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3144
success 0 0
1619803433.458747
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 1256
success 0 0
1619803446.460909
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3968
success 0 0
1619803456.137958
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2288
success 0 0
1619803461.031219
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3224
success 0 0
1619803467.535919
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2212
success 0 0
Resumed a suspended thread in a remote process potentially indicative of process injection (26 个事件)
Process injection Process 708 resumed a thread in remote process 2960
Process injection Process 3212 resumed a thread in remote process 3284
Process injection Process 3452 resumed a thread in remote process 3524
Process injection Process 3696 resumed a thread in remote process 3768
Process injection Process 3936 resumed a thread in remote process 4008
Process injection Process 2620 resumed a thread in remote process 3232
Process injection Process 3712 resumed a thread in remote process 3812
Process injection Process 3940 resumed a thread in remote process 3144
Process injection Process 1924 resumed a thread in remote process 1256
Process injection Process 300 resumed a thread in remote process 3968
Process injection Process 3432 resumed a thread in remote process 2288
Process injection Process 1712 resumed a thread in remote process 3224
Process injection Process 3624 resumed a thread in remote process 2212
Time & API Arguments Status Return Repeated
1619803342.881125
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 2960
success 0 0
1619803357.694498
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3284
success 0 0
1619803359.819
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3524
success 0 0
1619803361.725498
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3768
success 0 0
1619803365.80275
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 4008
success 0 0
1619803374.631498
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3232
success 0 0
1619803419.98135
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3812
success 0 0
1619803426.291458
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3144
success 0 0
1619803434.817747
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 1256
success 0 0
1619803449.538909
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3968
success 0 0
1619803456.715958
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 2288
success 0 0
1619803463.890219
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3224
success 0 0
1619803468.863919
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 2212
success 0 0
Executed a process and injected code into it, probably while unpacking (50 out of 109 个事件)
Time & API Arguments Status Return Repeated
1619803340.834
CreateProcessInternalW
thread_identifier: 1128
thread_handle: 0x0000010c
process_identifier: 2404
current_directory:
filepath: C:\Windows\System32\notepad.exe
track: 1
command_line:
filepath_r: C:\Windows\system32\notepad.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619803340.834
NtAllocateVirtualMemory
process_identifier: 2404
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0x00000104
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x000f0000
success 0 0
1619803340.834
NtAllocateVirtualMemory
process_identifier: 2404
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 4 (PAGE_READWRITE)
process_handle: 0x00000104
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00100000
success 0 0
1619803340.834
WriteProcessMemory
process_identifier: 2404
buffer: Q¹0d‹‹@ ‹@ ‹‹‹@‰$‹$YÃVWR¾§ÆgNè„Yƒøv· ¿Zwf;Ït ¿Ntf;ÏuƒÂƒè…Àt‹ÎÁá‹þÁïϾ:Ï3ñBHué_‹Æ^ÃU‹ìQQ‹MSVW…Ét;¸MZf9u1‹A<Át*8PEu"‹@xƒeüÁ‹x‹X$‹p ‹@ùÙñ‰Eø…Àu 3À_^[ÉËM‹Eü‹†ÑèOÿÿÿ;E t ÿEü‹Eü;Eøràë׋Eü·C‹‡EëÊU‹ìQSW3ÿWWjWjh@ÿuÿV‹Øƒûÿu3Àë&WWWS‰}üÿV0W‹}EüPWÿu SÿV SÿV3À9}ü”À_[ÉÅÉtè•…Àt3Éf‰ÃU‹ììV‹ð…äüÿÿP3ÀPPjPÿVl…À…Žj\Xf‰Eü3Àj.f‰EþXjvf‰EðXf‰EòjbXf‰EôjsXf‰Eö3Àf‰EøUü…äüÿÿèÖ‹U è΍UðèÆÿu…ìþÿÿÿuPÿVxƒÄ …äüÿÿPÿV…ìþÿÿPèÂ@P…ìþÿÿP…äüÿÿPèîþÿÿƒÄ^ÉÃU‹ìì,j:XjZf‰EÜXjof‰EÞXjnf‰EàXjef‰EâXjIf‰EäXjdf‰EæXjef‰EèXjnf‰EêXjtf‰EìXjif‰EîXjff‰EðXjif‰EòXf‰EôjeXf‰EöjrXf‰Eø3Àf‰Eú…Ôýÿÿ謍UÜè÷EÿPÆEÿèPEÿP…ÔýÿÿPè?þÿÿƒÄÉÃU‹ìQƒeüV‹ðEüPÿuèþYY…Àtƒ}ütÿuüPÿu è þÿÿƒÄ …Àt3À@ë3À^ÉÃU‹ììSV‹ð‹Ï…øýÿÿè'‹Èè(þÿÿ3ÛS…øýÿÿPÿVWÿV8] uWÿu‹Æè~ÿÿÿYY‹Øë €} u5SWÿuÿWÿV(3ۃøÿ‹Ï•Ãèªþÿÿƒûu9]u WÿV(ƒÈPWÿV,3À@ë3À^[ÉÃU‹ìƒìSVWèsüÿÿ‹ø…ÿ„"h"¿ŠWèÌüÿÿ‹ØYY…Û„ jh0h„jÿӋð…ö„ñh¼Û«½W‰~`‰^@è•üÿÿhÒ¼‰W‰F$è‡üÿÿh|QgjW‰F(èyüÿÿhëI”W‰F,èküÿÿh•å©—W‰F0è]üÿÿh¥°(W‰F4èOüÿÿh)·W‰F8èAüÿÿh[uŠðW‰FDè3üÿÿƒÄ@‹Øhd†óuW‰^ è üÿÿh¢¦aëW‰F èüÿÿhÕOd"W‰Fèüÿÿhy.ÔW‰Fèöûÿÿh±÷W‰FèèûÿÿheóW÷W‰FèÚûÿÿh¯4P“W‰FèÌûÿÿh{=#W‰F<è¾ûÿÿƒÄ@hOû~ W‰Fè­ûÿÿhà=!6W‰FHèŸûÿÿhh‰#W‰è’ûÿÿ‰FLhÍeWè„ûÿÿhÓ1ÆVW‰FPèvûÿÿh7œ½W‰FTèhûÿÿh£-ãW‰FXèZûÿÿ‰F\ƒÄ8EðPÇEðshelÇEôl32ÿӋø…ÿt"hÀåz°W‰~dè,ûÿÿhêêºW‰FlèûÿÿƒÄ‰FpEøPÇEøuserfÇEü32ÆEþÿV ‹ø…ÿtAhqV°0W‰~hèìúÿÿhkV°0W‰FxèÞúÿÿh&cj—W‰FtèÐúÿÿh<cj—W‰F|èÂúÿÿƒÄ ‰†€‹Æë3À_^[ÉÃU‹ìƒì\V‹uW3ÿ;÷„îSè¤ýÿÿ‹Ø;ßu WÿDéՍ†‰EüPëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPF‰Eø‰E9>tYÿ¶¶ŽQP¾ ‹Ãè¾üÿÿ‰}3ÿƒÄ 9>t1jDE¤WPèjEèWPèüƒÄEèPE¤PWWj WWWWÿuÿS$9¾(t†lP†,Pÿu‹Ãè½úÿÿƒÄ 9¾tëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPÿuøÿSWÿSD[_3À^ÉÂU‹ìƒì SW3ÿWWjWjh€ÿu‰}øÿV‹Øƒûÿu3Àë>WSÿV‰Eô;Çt+jh0PWÿV@‰Eø;ÇtWMüQÿuô‰}üPSÿV‹Eü‹M ‰SÿV‹Eø_[É÷f‰f…ÒtV‹ð+ñƒÁ·f‰f…Òuñ^ÃU‹ìQQ‹E‰Eü‹EüE‰Eø‹Eü;Eøt‹EüŠM ˆ‹Eü@‰Eüëç‹EÉÃfƒ8V‹ðt ƒÆfƒ>u÷+ò· f‰ ƒÂf…Éuñ^ËD$Š@„Éuù+D$HÅÉu3ÀÃfƒ9‹Át ƒÀfƒ8u÷+ÁÑøÃ…Ét èÚÿÿÿ…ÀtDAþë fƒù\t ƒè·f…Éuï3ÀÃ
process_handle: 0x00000104
base_address: 0x000f0000
success 1 0
1619803340.834
WriteProcessMemory
process_identifier: 2404
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\a4e5aac24c36ad5bcf0d935f07232006.exeC:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe"C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\a4e5aac24c36ad5bcf0d935f07232006.exe" winsEt lSBSafubszRzcBvQ = cREAteobjEcT("wscriPt.shEll") lSBsafuBsZRZcBvQ.ruN """%ls""", 0, False
process_handle: 0x00000104
base_address: 0x00100000
success 1 0
1619803341.209125
CreateProcessInternalW
thread_identifier: 2440
thread_handle: 0x000000d0
process_identifier: 708
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x000000cc
inherit_handles: 0
success 1 0
1619803341.647125
CreateProcessInternalW
thread_identifier: 2604
thread_handle: 0x0000010c
process_identifier: 2960
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619803341.647125
NtUnmapViewOfSection
process_identifier: 2960
region_size: 4096
process_handle: 0x00000104
base_address: 0x00400000
success 0 0
1619803341.647125
NtMapViewOfSection
section_handle: 0x00000114
process_identifier: 2960
commit_size: 1314816
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000104
allocation_type: 0 ()
section_offset: 0
view_size: 1314816
base_address: 0x00400000
success 0 0
1619803341.803125
NtGetContextThread
thread_handle: 0x0000010c
success 0 0
1619803341.803125
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2960
success 0 0
1619803342.881125
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 2960
success 0 0
1619803342.959125
CreateProcessInternalW
thread_identifier: 1272
thread_handle: 0x00000110
process_identifier: 2496
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe" 2 2960 10914562
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000120
inherit_handles: 0
success 1 0
1619803356.552875
CreateProcessInternalW
thread_identifier: 3216
thread_handle: 0x000002d8
process_identifier: 3212
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x000002dc
inherit_handles: 0
success 1 0
1619803356.865498
CreateProcessInternalW
thread_identifier: 3288
thread_handle: 0x0000010c
process_identifier: 3284
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619803356.865498
NtUnmapViewOfSection
process_identifier: 3284
region_size: 4096
process_handle: 0x00000104
base_address: 0x00400000
success 0 0
1619803356.865498
NtMapViewOfSection
section_handle: 0x00000114
process_identifier: 3284
commit_size: 1314816
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000104
allocation_type: 0 ()
section_offset: 0
view_size: 1314816
base_address: 0x00400000
success 0 0
1619803357.506498
NtGetContextThread
thread_handle: 0x0000010c
success 0 0
1619803357.506498
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3284
success 0 0
1619803357.694498
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3284
success 0 0
1619803357.740498
CreateProcessInternalW
thread_identifier: 3348
thread_handle: 0x00000110
process_identifier: 3344
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe" 2 3284 10929375
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000120
inherit_handles: 0
success 1 0
1619803359.287125
CreateProcessInternalW
thread_identifier: 3456
thread_handle: 0x00000128
process_identifier: 3452
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000012c
inherit_handles: 0
success 1 0
1619803359.647
CreateProcessInternalW
thread_identifier: 3528
thread_handle: 0x0000010c
process_identifier: 3524
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619803359.647
NtUnmapViewOfSection
process_identifier: 3524
region_size: 4096
process_handle: 0x00000104
base_address: 0x00400000
success 0 0
1619803359.647
NtMapViewOfSection
section_handle: 0x00000114
process_identifier: 3524
commit_size: 1314816
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000104
allocation_type: 0 ()
section_offset: 0
view_size: 1314816
base_address: 0x00400000
success 0 0
1619803359.725
NtGetContextThread
thread_handle: 0x0000010c
success 0 0
1619803359.725
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3524
success 0 0
1619803359.819
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3524
success 0 0
1619803359.834
CreateProcessInternalW
thread_identifier: 3592
thread_handle: 0x00000110
process_identifier: 3588
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe" 2 3524 10931500
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000120
inherit_handles: 0
success 1 0
1619803361.099875
CreateProcessInternalW
thread_identifier: 3700
thread_handle: 0x00000128
process_identifier: 3696
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000012c
inherit_handles: 0
success 1 0
1619803361.350498
CreateProcessInternalW
thread_identifier: 3772
thread_handle: 0x0000010c
process_identifier: 3768
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619803361.350498
NtUnmapViewOfSection
process_identifier: 3768
region_size: 4096
process_handle: 0x00000104
base_address: 0x00400000
success 0 0
1619803361.350498
NtMapViewOfSection
section_handle: 0x00000114
process_identifier: 3768
commit_size: 1314816
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000104
allocation_type: 0 ()
section_offset: 0
view_size: 1314816
base_address: 0x00400000
success 0 0
1619803361.381498
NtGetContextThread
thread_handle: 0x0000010c
success 0 0
1619803361.381498
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3768
success 0 0
1619803361.725498
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 3768
success 0 0
1619803361.756498
CreateProcessInternalW
thread_identifier: 3832
thread_handle: 0x00000110
process_identifier: 3828
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe" 2 3768 10933406
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000120
inherit_handles: 0
success 1 0
1619803365.115373
CreateProcessInternalW
thread_identifier: 3940
thread_handle: 0x00000160
process_identifier: 3936
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000164
inherit_handles: 0
success 1 0
1619803365.45875
CreateProcessInternalW
thread_identifier: 4012
thread_handle: 0x0000010c
process_identifier: 4008
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619803365.45875
NtUnmapViewOfSection
process_identifier: 4008
region_size: 4096
process_handle: 0x00000104
base_address: 0x00400000
success 0 0
1619803365.45875
NtMapViewOfSection
section_handle: 0x00000114
process_identifier: 4008
commit_size: 1314816
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000104
allocation_type: 0 ()
section_offset: 0
view_size: 1314816
base_address: 0x00400000
success 0 0
1619803365.59975
NtGetContextThread
thread_handle: 0x0000010c
success 0 0
1619803365.59975
NtSetContextThread
thread_handle: 0x0000010c
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5503936
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 4008
success 0 0
1619803365.80275
NtResumeThread
thread_handle: 0x0000010c
suspend_count: 1
process_identifier: 4008
success 0 0
1619803365.83375
CreateProcessInternalW
thread_identifier: 4076
thread_handle: 0x00000110
process_identifier: 4072
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe" 2 4008 10937484
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000120
inherit_handles: 0
success 1 0
1619803371.834498
CreateProcessInternalW
thread_identifier: 1712
thread_handle: 0x000001b8
process_identifier: 2620
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x000001bc
inherit_handles: 0
success 1 0
1619803373.678498
CreateProcessInternalW
thread_identifier: 3224
thread_handle: 0x0000010c
process_identifier: 3232
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Roaming\appdata\ggsgjr.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000104
inherit_handles: 0
success 1 0
1619803373.678498
NtUnmapViewOfSection
process_identifier: 3232
region_size: 4096
process_handle: 0x00000104
base_address: 0x00400000
success 0 0
1619803373.787498
NtMapViewOfSection
section_handle: 0x00000114
process_identifier: 3232
commit_size: 1314816
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000104
allocation_type: 0 ()
section_offset: 0
view_size: 1314816
base_address: 0x00400000
success 0 0
1619803374.240498
NtGetContextThread
thread_handle: 0x0000010c
success 0 0
File has been identified by 56 AntiVirus engines on VirusTotal as malicious (50 out of 56 个事件)
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Delf.FareIt.Gen.7
FireEye Generic.mg.a4e5aac24c36ad5b
McAfee Fareit-FVZ!A4E5AAC24C36
Cylance Unsafe
Zillya Trojan.Injector.Win32.750844
Sangfor Malware
K7AntiVirus Trojan ( 0056ac361 )
Alibaba Trojan:Win32/DelfInject.ali2000015
K7GW Trojan ( 0056ac361 )
Cybereason malicious.a432b1
Arcabit Trojan.Delf.FareIt.Gen.7
Cyren W32/Trojan.SPUY-3827
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Trojan-gen
Kaspersky HEUR:Trojan.Win32.Kryptik.gen
BitDefender Trojan.Delf.FareIt.Gen.7
NANO-Antivirus Trojan.Win32.Kryptik.hoepkb
Paloalto generic.ml
AegisLab Trojan.Win32.Kryptik.4!c
Tencent Win32.Trojan.Kryptik.Lohp
Ad-Aware Trojan.Delf.FareIt.Gen.7
Sophos Mal/Generic-S
Comodo Malware@#10fesv1xwczoc
F-Secure Trojan.TR/Injector.qvlpn
DrWeb Trojan.PWS.Stealer.28890
VIPRE Trojan.Win32.Generic!BT
TrendMicro TrojanSpy.Win32.LOKI.SMAD1.hp
McAfee-GW-Edition BehavesLike.Win32.Fareit.dc
Emsisoft Trojan.Delf.FareIt.Gen.7 (B)
SentinelOne Static AI - Suspicious PE
Webroot W32.Trojan.Gen
Avira TR/Injector.qvlpn
Antiy-AVL Trojan/Win32.Kryptik
Microsoft PWS:Win32/Fareit.AQ!MTB
ZoneAlarm HEUR:Trojan.Win32.Kryptik.gen
GData Trojan.Delf.FareIt.Gen.7
Cynet Malicious (score: 100)
AhnLab-V3 Suspicious/Win.Delphiless.X2094
BitDefenderTheta Gen:NN.ZelphiF.34670.5GW@aKo2!pii
ALYac Trojan.GenericKD.34190501
MAX malware (ai score=100)
VBA32 TScope.Trojan.Delf
Malwarebytes Trojan.MalPack.DLF
ESET-NOD32 a variant of Win32/Injector.EMRE
TrendMicro-HouseCall TrojanSpy.Win32.LOKI.SMAD1.hp
Rising Trojan.Injector!1.C99D (CLASSIC)
Yandex Trojan.Injector!gauR6lQGEv4
Ikarus Trojan.Win32.Injector
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (3 个事件)
dead_host 172.217.24.14:443
dead_host 172.217.160.110:443
dead_host 172.217.27.142:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x46d150 VirtualFree
0x46d154 VirtualAlloc
0x46d158 LocalFree
0x46d15c LocalAlloc
0x46d160 GetVersion
0x46d164 GetCurrentThreadId
0x46d170 VirtualQuery
0x46d174 WideCharToMultiByte
0x46d178 MultiByteToWideChar
0x46d17c lstrlenA
0x46d180 lstrcpynA
0x46d184 LoadLibraryExA
0x46d188 GetThreadLocale
0x46d18c GetStartupInfoA
0x46d190 GetProcAddress
0x46d194 GetModuleHandleA
0x46d198 GetModuleFileNameA
0x46d19c GetLocaleInfoA
0x46d1a0 GetCommandLineA
0x46d1a4 FreeLibrary
0x46d1a8 FindFirstFileA
0x46d1ac FindClose
0x46d1b0 ExitProcess
0x46d1b4 WriteFile
0x46d1bc RtlUnwind
0x46d1c0 RaiseException
0x46d1c4 GetStdHandle
Library user32.dll:
0x46d1cc GetKeyboardType
0x46d1d0 LoadStringA
0x46d1d4 MessageBoxA
0x46d1d8 CharNextA
Library advapi32.dll:
0x46d1e0 RegQueryValueExA
0x46d1e4 RegOpenKeyExA
0x46d1e8 RegCloseKey
Library oleaut32.dll:
0x46d1f0 SysFreeString
0x46d1f4 SysReAllocStringLen
0x46d1f8 SysAllocStringLen
Library kernel32.dll:
0x46d200 TlsSetValue
0x46d204 TlsGetValue
0x46d208 LocalAlloc
0x46d20c GetModuleHandleA
Library advapi32.dll:
0x46d214 RegQueryValueExA
0x46d218 RegOpenKeyExA
0x46d21c RegCloseKey
Library kernel32.dll:
0x46d224 lstrcpyA
0x46d228 WriteFile
0x46d22c WaitForSingleObject
0x46d230 VirtualQuery
0x46d234 VirtualProtect
0x46d238 VirtualAlloc
0x46d23c Sleep
0x46d240 SizeofResource
0x46d244 SetThreadLocale
0x46d248 SetFilePointer
0x46d24c SetEvent
0x46d250 SetErrorMode
0x46d254 SetEndOfFile
0x46d258 ResetEvent
0x46d25c ReadFile
0x46d260 MulDiv
0x46d264 LockResource
0x46d268 LoadResource
0x46d26c LoadLibraryA
0x46d278 GlobalUnlock
0x46d27c GlobalReAlloc
0x46d280 GlobalHandle
0x46d284 GlobalLock
0x46d288 GlobalFree
0x46d28c GlobalFindAtomA
0x46d290 GlobalDeleteAtom
0x46d294 GlobalAlloc
0x46d298 GlobalAddAtomA
0x46d29c GetVersionExA
0x46d2a0 GetVersion
0x46d2a4 GetTickCount
0x46d2a8 GetThreadLocale
0x46d2ac GetSystemInfo
0x46d2b0 GetStringTypeExA
0x46d2b4 GetStdHandle
0x46d2b8 GetProcAddress
0x46d2bc GetModuleHandleA
0x46d2c0 GetModuleFileNameA
0x46d2c4 GetLocaleInfoA
0x46d2c8 GetLocalTime
0x46d2cc GetLastError
0x46d2d0 GetFullPathNameA
0x46d2d4 GetDiskFreeSpaceA
0x46d2d8 GetDateFormatA
0x46d2dc GetCurrentThreadId
0x46d2e0 GetCurrentProcessId
0x46d2e4 GetCPInfo
0x46d2e8 GetACP
0x46d2ec FreeResource
0x46d2f0 InterlockedExchange
0x46d2f4 FreeLibrary
0x46d2f8 FormatMessageA
0x46d2fc FindResourceA
0x46d300 EnumCalendarInfoA
0x46d30c CreateThread
0x46d310 CreateFileA
0x46d314 CreateEventA
0x46d318 CompareStringA
0x46d31c CloseHandle
Library version.dll:
0x46d324 VerQueryValueA
0x46d32c GetFileVersionInfoA
Library gdi32.dll:
0x46d334 UnrealizeObject
0x46d338 StretchBlt
0x46d33c SetWindowOrgEx
0x46d340 SetWindowExtEx
0x46d344 SetWinMetaFileBits
0x46d348 SetViewportOrgEx
0x46d34c SetViewportExtEx
0x46d350 SetTextColor
0x46d354 SetStretchBltMode
0x46d358 SetROP2
0x46d35c SetPixel
0x46d360 SetMapMode
0x46d364 SetEnhMetaFileBits
0x46d368 SetDIBColorTable
0x46d36c SetBrushOrgEx
0x46d370 SetBkMode
0x46d374 SetBkColor
0x46d378 SetArcDirection
0x46d37c SelectPalette
0x46d380 SelectObject
0x46d384 SaveDC
0x46d388 RestoreDC
0x46d38c Rectangle
0x46d390 RectVisible
0x46d394 RealizePalette
0x46d398 PolyPolyline
0x46d39c PlayEnhMetaFile
0x46d3a0 PatBlt
0x46d3a4 MoveToEx
0x46d3a8 MaskBlt
0x46d3ac LineTo
0x46d3b0 IntersectClipRect
0x46d3b4 GetWindowOrgEx
0x46d3b8 GetWinMetaFileBits
0x46d3bc GetTextMetricsA
0x46d3c8 GetStockObject
0x46d3cc GetPixel
0x46d3d0 GetPaletteEntries
0x46d3d4 GetObjectA
0x46d3e0 GetEnhMetaFileBits
0x46d3e4 GetDeviceCaps
0x46d3e8 GetDIBits
0x46d3ec GetDIBColorTable
0x46d3f0 GetDCOrgEx
0x46d3f8 GetClipBox
0x46d3fc GetBrushOrgEx
0x46d400 GetBitmapBits
0x46d404 ExtCreatePen
0x46d408 ExcludeClipRect
0x46d40c DeleteObject
0x46d410 DeleteEnhMetaFile
0x46d414 DeleteDC
0x46d418 CreateSolidBrush
0x46d41c CreatePenIndirect
0x46d420 CreatePen
0x46d424 CreatePalette
0x46d42c CreateFontIndirectA
0x46d430 CreateDIBitmap
0x46d434 CreateDIBSection
0x46d438 CreateCompatibleDC
0x46d440 CreateBrushIndirect
0x46d444 CreateBitmap
0x46d448 CopyEnhMetaFileA
0x46d44c BitBlt
Library user32.dll:
0x46d454 CreateWindowExA
0x46d458 WindowFromPoint
0x46d45c WinHelpA
0x46d460 WaitMessage
0x46d464 ValidateRect
0x46d468 UpdateWindow
0x46d46c UnregisterClassA
0x46d470 UnionRect
0x46d474 UnhookWindowsHookEx
0x46d478 TranslateMessage
0x46d480 TrackPopupMenu
0x46d488 ShowWindow
0x46d48c ShowScrollBar
0x46d490 ShowOwnedPopups
0x46d494 ShowCursor
0x46d498 SetWindowsHookExA
0x46d49c SetWindowTextA
0x46d4a0 SetWindowPos
0x46d4a4 SetWindowPlacement
0x46d4a8 SetWindowLongA
0x46d4ac SetTimer
0x46d4b0 SetScrollRange
0x46d4b4 SetScrollPos
0x46d4b8 SetScrollInfo
0x46d4bc SetRect
0x46d4c0 SetPropA
0x46d4c4 SetParent
0x46d4c8 SetMenuItemInfoA
0x46d4cc SetMenu
0x46d4d0 SetKeyboardState
0x46d4d4 SetForegroundWindow
0x46d4d8 SetFocus
0x46d4dc SetCursor
0x46d4e0 SetClipboardData
0x46d4e4 SetClassLongA
0x46d4e8 SetCapture
0x46d4ec SetActiveWindow
0x46d4f0 SendMessageA
0x46d4f4 ScrollWindowEx
0x46d4f8 ScrollWindow
0x46d4fc ScreenToClient
0x46d500 RemovePropA
0x46d504 RemoveMenu
0x46d508 ReleaseDC
0x46d50c ReleaseCapture
0x46d518 RegisterClassA
0x46d51c RedrawWindow
0x46d520 PtInRect
0x46d524 PostQuitMessage
0x46d528 PostMessageA
0x46d52c PeekMessageA
0x46d530 OpenClipboard
0x46d534 OffsetRect
0x46d538 OemToCharA
0x46d53c MessageBoxA
0x46d540 MessageBeep
0x46d544 MapWindowPoints
0x46d548 MapVirtualKeyA
0x46d54c LoadStringA
0x46d550 LoadKeyboardLayoutA
0x46d554 LoadIconA
0x46d558 LoadCursorA
0x46d55c LoadBitmapA
0x46d560 KillTimer
0x46d564 IsZoomed
0x46d568 IsWindowVisible
0x46d56c IsWindowEnabled
0x46d570 IsWindow
0x46d574 IsRectEmpty
0x46d578 IsIconic
0x46d57c IsDialogMessageA
0x46d580 IsChild
0x46d584 IsCharAlphaNumericA
0x46d588 IsCharAlphaA
0x46d58c InvalidateRect
0x46d590 IntersectRect
0x46d594 InsertMenuItemA
0x46d598 InsertMenuA
0x46d59c InflateRect
0x46d5a4 GetWindowTextA
0x46d5a8 GetWindowRect
0x46d5ac GetWindowPlacement
0x46d5b0 GetWindowLongA
0x46d5b4 GetWindowDC
0x46d5b8 GetTopWindow
0x46d5bc GetSystemMetrics
0x46d5c0 GetSystemMenu
0x46d5c4 GetSysColorBrush
0x46d5c8 GetSysColor
0x46d5cc GetSubMenu
0x46d5d0 GetScrollRange
0x46d5d4 GetScrollPos
0x46d5d8 GetScrollInfo
0x46d5dc GetPropA
0x46d5e0 GetParent
0x46d5e4 GetWindow
0x46d5e8 GetMessageTime
0x46d5ec GetMenuStringA
0x46d5f0 GetMenuState
0x46d5f4 GetMenuItemInfoA
0x46d5f8 GetMenuItemID
0x46d5fc GetMenuItemCount
0x46d600 GetMenu
0x46d604 GetLastActivePopup
0x46d608 GetKeyboardState
0x46d610 GetKeyboardLayout
0x46d614 GetKeyState
0x46d618 GetKeyNameTextA
0x46d61c GetIconInfo
0x46d620 GetForegroundWindow
0x46d624 GetFocus
0x46d628 GetDoubleClickTime
0x46d62c GetDlgItem
0x46d630 GetDesktopWindow
0x46d634 GetDCEx
0x46d638 GetDC
0x46d63c GetCursorPos
0x46d640 GetCursor
0x46d644 GetClipboardData
0x46d648 GetClientRect
0x46d64c GetClassNameA
0x46d650 GetClassInfoA
0x46d654 GetCaretPos
0x46d658 GetCapture
0x46d65c GetActiveWindow
0x46d660 FrameRect
0x46d664 FindWindowA
0x46d668 FillRect
0x46d66c EqualRect
0x46d670 EnumWindows
0x46d674 EnumThreadWindows
0x46d67c EndPaint
0x46d680 EnableWindow
0x46d684 EnableScrollBar
0x46d688 EnableMenuItem
0x46d68c EmptyClipboard
0x46d690 DrawTextA
0x46d694 DrawMenuBar
0x46d698 DrawIconEx
0x46d69c DrawIcon
0x46d6a0 DrawFrameControl
0x46d6a4 DrawFocusRect
0x46d6a8 DrawEdge
0x46d6ac DispatchMessageA
0x46d6b0 DestroyWindow
0x46d6b4 DestroyMenu
0x46d6b8 DestroyIcon
0x46d6bc DestroyCursor
0x46d6c0 DeleteMenu
0x46d6c4 DefWindowProcA
0x46d6c8 DefMDIChildProcA
0x46d6cc DefFrameProcA
0x46d6d0 CreatePopupMenu
0x46d6d4 CreateMenu
0x46d6d8 CreateIcon
0x46d6dc CloseClipboard
0x46d6e0 ClientToScreen
0x46d6e4 CheckMenuItem
0x46d6e8 CallWindowProcA
0x46d6ec CallNextHookEx
0x46d6f0 BeginPaint
0x46d6f4 CharNextA
0x46d6f8 CharLowerBuffA
0x46d6fc CharLowerA
0x46d700 CharUpperBuffA
0x46d704 CharToOemA
0x46d708 AdjustWindowRectEx
Library kernel32.dll:
0x46d714 Sleep
Library oleaut32.dll:
0x46d71c SafeArrayPtrOfIndex
0x46d720 SafeArrayGetUBound
0x46d724 SafeArrayGetLBound
0x46d728 SafeArrayCreate
0x46d72c VariantChangeType
0x46d730 VariantCopy
0x46d734 VariantClear
0x46d738 VariantInit
Library comctl32.dll:
0x46d748 ImageList_Write
0x46d74c ImageList_Read
0x46d75c ImageList_DragMove
0x46d760 ImageList_DragLeave
0x46d764 ImageList_DragEnter
0x46d768 ImageList_EndDrag
0x46d76c ImageList_BeginDrag
0x46d770 ImageList_Remove
0x46d774 ImageList_DrawEx
0x46d778 ImageList_Draw
0x46d788 ImageList_Add
0x46d790 ImageList_Destroy
0x46d794 ImageList_Create
0x46d798 InitCommonControls
Library comdlg32.dll:
0x46d7a0 GetSaveFileNameA
0x46d7a4 GetOpenFileNameA
Library kernel32.dll:
0x46d7ac MulDiv

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51379 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.