0.9
低危

25ebbfb0e7a67b69d9a9609773eb38483f26a72f8052a06c880f32bd05f84ad6

25ebbfb0e7a67b69d9a9609773eb38483f26a72f8052a06c880f32bd05f84ad6.exe

分析耗时

194s

最近分析

365天前

文件大小

38.8KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER ULISE
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.71
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanDownloader:Win32/Upatre.5097ca31 20190527 0.3.0.5
Avast MSIL:Crypt-SP [Trj] 20190911 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Kingsoft None 20190911 2013.8.14.323
McAfee Generic-FANY!BB8259A8C6BB 20190911 6.0.6.653
Tencent None 20190911 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
文件已被 VirusTotal 上 56 个反病毒引擎识别为恶意 (50 out of 56 个事件)
ALYac Gen:Variant.Ulise.45106
APEX Malicious
AVG MSIL:Crypt-SP [Trj]
Acronis suspicious
Ad-Aware Gen:Variant.Ulise.45106
AhnLab-V3 Trojan/Win32.ZBot.R120530
Alibaba TrojanDownloader:Win32/Upatre.5097ca31
Antiy-AVL Trojan/Win32.Bublik
Arcabit Trojan.Ulise.DB032
Avast MSIL:Crypt-SP [Trj]
Avira TR/Downloader.Gen7
BitDefender Gen:Variant.Ulise.45106
CAT-QuickHeal TrojanPWS.Zbot.Gen
ClamAV Win.Downloader.Upatre-5744087-0
Comodo TrojWare.Win32.TrojanDownloader.Waski.EA@5ixvig
CrowdStrike win/malicious_confidence_100% (W)
Cybereason malicious.8c6bb2
Cylance Unsafe
Cyren W32/A-5ce1ad06!Eldorado
DrWeb Trojan.DownLoad3.30891
ESET-NOD32 Win32/TrojanDownloader.Waski.A
Emsisoft Gen:Variant.Ulise.45106 (B)
Endgame malicious (high confidence)
F-Prot W32/A-5ce1ad06!Eldorado
FireEye Generic.mg.bb8259a8c6bb2585
Fortinet W32/Krptik.AIX!tr
GData Gen:Variant.Ulise.45106
Ikarus Trojan-Spy.Zbot
Invincea heuristic
Jiangmin Trojan/Bublik.ghx
K7AntiVirus Trojan-Downloader ( 0048f6391 )
K7GW Trojan-Downloader ( 0048f6391 )
Kaspersky HEUR:Trojan.Win32.Generic
Lionic Trojan.Win32.Generic.4!c
MAX malware (ai score=81)
McAfee Generic-FANY!BB8259A8C6BB
McAfee-GW-Edition Artemis!Trojan
MicroWorld-eScan Gen:Variant.Ulise.45106
Microsoft TrojanDownloader:Win32/Upatre.A
NANO-Antivirus Trojan.Win32.DownLoad3.cqkedt
Paloalto generic.ml
Panda Generic Malware
Qihoo-360 HEUR/QVM08.0.CFF9.Malware.Gen
Rising Downloader.Waski!8.184 (TFE:5:jaYWn8408dM)
SentinelOne DFI - Malicious PE
Sophos Troj/Agent-AEYI
Symantec Downloader
Trapmine malicious.high.ml.score
TrendMicro TROJ_UPATRE.SM37
TrendMicro-HouseCall TROJ_UPATRE.SM37
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2013-11-26 05:43:22

PE Imphash

3c3860f73173dbf372ef20d69edbdd5c

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00004ace 0x00004c00 6.553504878987927
.rdata 0x00006000 0x0000260c 0x00002800 5.611754225350586
.data 0x00009000 0x00000918 0x00000400 2.4213582238164157
.rsrc 0x0000a000 0x00001104 0x00001200 5.568891993515904

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000a0ec 0x00000ea8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x0000af94 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MANIFEST 0x0000afa8 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library KERNEL32.DLL:
0x406008 GetModuleHandleA
0x40600c GetStartupInfoA
0x406010 GetCommandLineA
0x406014 GetVersionExA
0x406018 GetProcAddress
0x40601c TerminateProcess
0x406020 GetCurrentProcess
0x406024 WriteFile
0x406028 GetStdHandle
0x40602c GetModuleFileNameA
0x406040 WideCharToMultiByte
0x406044 GetLastError
0x40604c SetHandleCount
0x406050 GetFileType
0x406054 HeapDestroy
0x406058 HeapCreate
0x40605c VirtualFree
0x406060 HeapFree
0x406064 LoadLibraryA
0x40606c GetOEMCP
0x406070 GetCPInfo
0x406074 HeapAlloc
0x406078 VirtualAlloc
0x40607c HeapReAlloc
0x406080 RtlUnwind
0x406084 InterlockedExchange
0x406088 VirtualQuery
0x40608c HeapSize
0x406094 GetTickCount
0x406098 GetCurrentThreadId
0x40609c GetCurrentProcessId
0x4060a4 LCMapStringA
0x4060a8 MultiByteToWideChar
0x4060ac LCMapStringW
0x4060b0 GetStringTypeA
0x4060b4 GetStringTypeW
0x4060b8 GetLocaleInfoA
0x4060bc VirtualProtect
0x4060c0 GetSystemInfo
0x4060c4 GetACP
0x4060c8 ExitProcess
Library GDI32.dll:
0x406000 TextOutW
Library USER32.dll:
0x4060d0 CharLowerW
0x4060d4 CreateWindowExW
0x4060d8 DefWindowProcW
0x4060dc DispatchMessageW
0x4060e0 DrawTextW
0x4060e4 EndPaint
0x4060e8 GetMessageW
0x4060ec GetSystemMetrics
0x4060f0 GetWindowRect
0x4060f4 PostQuitMessage
0x4060f8 RegisterClassExW
0x4060fc TranslateMessage
0x406100 BeginPaint
0x406104 BringWindowToTop

L!This program cannot be run in DOS mode.
lOlOlO6
OlOmOlO
OlO3OlOcOlOOlOOlOOlORichlO
`.rdata
@.data
tMAMd5
WWQQQQh
3RRRWiF
cWZ3@#
E4SZ8@
um4VZdh
WY3Hmh0
RQPUVMAMdH
sSY3NM`@
;d5MAMI
QPVSW}
R?WYZ+
5MAMdSY
Q@55MAMd+WZ
UtEhVZU
E06PLMo|EhWZM
D^[_Q;
+#O;u<
YYj`h@t@
f8MZuH<
XPuVVP
;ru,hd+@
;r3_^UV3F95
@<Yv"P
^[]VW39=
t.t$<"u
u_^S39
3Y]_^[5@
@B8\t8"u&
_[UQQSVW39=
3_^[QQ@
SUVW=H`@
SSS+S@PVSSD$4
t#SSUPt$$VSS
_^][YY
;rSVWD$
_^3[Dj
33@hh,@
+SVWEePEEEEd
Y_^[QVC20XC00U
33333]^]
]_^[]UL$
VWumhx@
_^[W|$
tAt2t$
Wj@3Y@
t6SUW
VPVPV5@
@;rD3Ar
@;rM^U
@;vAAy
YYUWVu
DDDDDDDDDDDDDD
W3;u4DP
^_UQQM
MOI;|9M
3@_^[U
WI <}}
MLD3#um
#Mj _^{
;]r;]u&
]#\D\D
_^[USVWUj
t.;t$$t(4v
EtVMf9MZ
_^[S\$
1VtYt(CH;r
PSWSvSU
PSWSUX
Yu3^_][
=N@uNVEP
E3E35@@
3;tMu
eWV8x@
VSVWVV|h
u8SS3FVh
?P4YE;t@E
t!SS9]
u5Y9]t
E;tSSu
me}VSW
33M;u#u
Y;t1uSW
EPWu u
u9]t#WY
u5EP3GWh
V~YEn]
3@3UWVu
DDDDDDDDDDDDDD
MQP5p`@
WWWWVSWu
YYE;t2WWVPVSWu
ULSVWj
MQ@Puu
e_^[SVt$
F3w9=@
SNYu+Vj
_^[Vt$
SVEuuPE
SVWVhEP|}D$
3PjMS
uVV^@[}
;Et39D
EVVhu}uPPEu38
leteiteF
CreaoduleSiztCurll
KEadFig
DireGetM
ShSHELg
adFiteW
terntModn
ClositPrf
Rexecu
trcmdleW`$
tpQuternUEtpOpSendAQetQu
nnecptio
SetOEestW
MternInteetOpRequ
MenReNET.nW
AUeryOEHttpptioenW
nfoWnW
eryIQrnetjEx
3D3g0s0
0f2n2C1k10000
31162?2L0Y0t1100d
10>033
221111
MjMtt?E
3QQVE-UU-|E
SWVuEU
SYMEUUUM
VUM>?E
jMQ5Aj
u>tt+#5AE;
t|\^_[33
]`2EL3UDM
6UIQQUMQQ
E0uttttt
BQE-EjP
EUE[^_
l+J;uJ
WVSdwt
U]VYM?
qeUM.?E
CorExitProcess
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- This application cannot run using the active version of the Microsoft .NET Runtime
Please contact the application's support team for more information.
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
Program:
A buffer overrun has been detected which has corrupted the program's
internal state. The program cannot safely continue execution and must
now be terminated.
Buffer overrun detected!
A security error of unknown cause has been detected which has
corrupted the program's internal state. The program cannot safely
continue execution and must now be terminated.
Unknown security failure detected!
KERNEL32.DLL
GDI32.dll
USER32.dll
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetSystemPowerStatus
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetACP
ExitProcess
TextOutW
CharLowerW
CreateWindowExW
DefWindowProcW
DispatchMessageW
DrawTextW
EndPaint
GetMessageW
GetSystemMetrics
GetWindowRect
PostQuitMessage
RegisterClassExW
TranslateMessage
BeginPaint
BringWindowToTop
%%%%%%%%%|]O-++%
~810000++++%
zmK??>>~\000--0+-+%
}zoXEDC????>m]100-0---+%
[gYYWWWRRxmEEDC???>_~101-/---+%
*YYYYWRRRW~FCD???>>@~1011-/--+|%
`YYYYWRWMEECDD??>>>000-/-NO%
gZYYWYRRREEDD@??>>_~%
}ZYYYWRWREEXmz%
[ZYYYWgx]r%
)r\1321---3%
p;_11300----%
r1131-0---%
}x^ME@
11123-/-,%
a`ZZWWWRMKE
>r>13322-/-%!!!F`YZWXRMM#
>>>141332/JP%"##6xWWWMR?
%...5WXWM
%6666[R#
7hO%779:M
D]]114220-/P%9:::k
@D@I_843122//P%<<<<U:
6DD@@@|443332/2J%==LLL
.KID@@@8n444433/22%SSSSU
!EI@@@88O4843332,,%TTVVVB
MDD8888H44]]h|%viiii{$
(ljlls
}bpppppycvsssstpq%&vvvvvvvvvvvvvvvuuuut%yevvwvwvw%&%eA%eG%dQ%eA%y&f%y&d%yb'%%%%%%%%%%%%%%%%%%%%%%%%%%%
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PA
telige
xtiv.e#
n.atom
htxe0/#
%shtsalo
\%ndad
ledoco
s/adnofe
erUpapen
Ws/opga
don.te
((((( H
h(((( H
H
Ytozmuqda
Hawuqyiqo
z`szt{clefiu}s|p|
C:\642ab9380f44920840319626e759ce548db47c9f61b164aa37ad6097d6801d7b
C:\D8rBeHLY.exe
C:\2db9079885d9290b1ef561ff7d34f679c5d9b1f89f61f2ae3ef8b3696b510810
C:\b873bd4e8f0988968b57242c5e42ff2a8bc130d92648917c5ac18fae4e5bf372
C:\JrU22UUl.exe
C:\q_aNZbiB.exe
C:\f8d5df7c0771d75e1a5f9688230f1bdc07828c27add384dda094ac3b8666335d
C:\k5T7M1Po.exe
C:\uF6sAB4K.exe
C:\FTLQyooB.exe
C:\14e8e4045aad167fbb851da5d1676b6e7399b6cf8e1f2f304ed0676575ffb543
C:\8fed3d11d3e9a79244fd3d32f5a3dbf24f551557fb69683cca324304a7c6f4de
C:\0SuITBIL.exe
C:\0ba8c643249633e96f897eab83f2ba93d2eca579ecfa9386b904d412d754b6ef
C:\a668bbc1aa810af01155ec3c0210444074a4b3cb2cb9af91c5a26794af1c9b65
C:\Wj1kEKkM.exe
C:\srFgClFN.exe
C:\adeca1a93f994ad654c6317186261d846384c398b868e29752ced577e16ae242
C:\df289dc50dd24612c626d7b9411e54780c6f61e8bc88f587a1b7582ac7ad35de
c:\7tpric\br2x0j.exe
C:\tidbc8\aukhvt.exe
C:\c0a4afd405f09a247916fdb81811b512b58ea99268e18670fd0f6355703e1fd1
C:\1003d4d6c0c037cf878bf392c7bc87dbf9299c2da3d2a671ad7db3c44d67819d
C:\3ae221961a68c6d28d67c1be35a5cff9454ca80d1c47b13db56d0047a5c62d5b
C:\NjqoQx0u.exe
C:\Users\admin\Downloads\important_document.exe
C:\lTU0XNej.exe
C:\957790e48f6b904dfe4b72db29093341b6f0c00799d46013679b763cb1f1d16b
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\sample.exe
C:\Users\admin\Downloads\factura.exe
C:\Users\admin\Downloads\invoice.exe
C:\Users\admin\Downloads\invoice.exe
C:\8fdec1975e6f2d02e5bff4e783a1de9635c03abdc60fc72c24a3d636237fcc0a
C:\kikQcQsU.exe
C:\935796e586a068989854fd9ef7805c9d6ced9badd705344bd8962d152d9c4fe1
C:\kDLQSJye.exe

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 58485 8.8.8.8 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.