3.4
中危

0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1

0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe

分析耗时

104s

最近分析

386天前

文件大小

210.7KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN BACKDOOR URELAS
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.81
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Kryptik-NJO [Trj] 20200501 18.4.3895.0
Baidu Win32.Trojan.Urelas.b 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200503 2013.8.14.323
McAfee Trojan-FFDV!BF1EC9FA99D5 20200503 6.0.6.653
Tencent Malware.Win32.Gencirc.10b30b17 20200503 1.0.0.1
静态指标
检查进程是否被调试器调试 (2 个事件)
Time & API Arguments Status Return Repeated
1727545300.5315
IsDebuggerPresent
failed 0 0
1727545303.12525
IsDebuggerPresent
failed 0 0
观察到命令行控制台输出 (11 个事件)
Time & API Arguments Status Return Repeated
1727545303.343875
WriteConsoleW
console_handle: 0x00000007
buffer: C:\Users\Administrator\AppData\Local\Temp>
success 1 0
1727545303.343875
WriteConsoleW
console_handle: 0x00000007
buffer: del
success 1 0
1727545303.343875
WriteConsoleW
console_handle: 0x00000007
buffer: "C:\Users\Administrator\AppData\Local\Temp\0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe"if exist "C:\Users\Administrator\AppData\Local\Temp\0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe" goto Repeat
success 1 0
1727545303.389875
WriteConsoleW
console_handle: 0x00000007
buffer: C:\Users\Administrator\AppData\Local\Temp>
success 1 0
1727545303.389875
WriteConsoleW
console_handle: 0x00000007
buffer: rmdir
success 1 0
1727545303.389875
WriteConsoleW
console_handle: 0x00000007
buffer: "C:\Users\Administrator\AppData\Local\Temp"
success 1 0
1727545303.405875
WriteConsoleW
console_handle: 0x0000000b
buffer: 另一个程序正在使用此文件,进程无法访问。
success 1 0
1727545303.405875
WriteConsoleW
console_handle: 0x00000007
buffer: C:\Users\Administrator\AppData\Local\Temp>
success 1 0
1727545303.405875
WriteConsoleW
console_handle: 0x00000007
buffer: del
success 1 0
1727545303.405875
WriteConsoleW
console_handle: 0x00000007
buffer: "C:\Users\ADMINI~1\AppData\Local\Temp\sanfdr.bat"
success 1 0
1727545303.421875
WriteConsoleW
console_handle: 0x0000000b
buffer: 找不到批处理文件。
success 1 0
行为判定
动态指标
在 PE 资源中识别到外语 (4 个事件)
name RT_MENU language LANG_KOREAN filetype None sublanguage SUBLANG_KOREAN offset 0x0001eb80 size 0x0000003e
name RT_DIALOG language LANG_KOREAN filetype None sublanguage SUBLANG_KOREAN offset 0x0001edb0 size 0x00000246
name RT_DIALOG language LANG_KOREAN filetype None sublanguage SUBLANG_KOREAN offset 0x0001edb0 size 0x00000246
name RT_VERSION language LANG_KOREAN filetype None sublanguage SUBLANG_KOREAN offset 0x0002e130 size 0x000002b0
在文件系统上创建可执行文件 (2 个事件)
file C:\Users\Administrator\AppData\Local\Temp\sanfdr.bat
file C:\Users\Administrator\AppData\Local\Temp\huter.exe
投放一个二进制文件并执行它 (2 个事件)
file C:\Users\Administrator\AppData\Local\Temp\huter.exe
file C:\Users\Administrator\AppData\Local\Temp\sanfdr.bat
将可执行文件投放到用户的 AppData 文件夹 (2 个事件)
file C:\Users\Administrator\AppData\Local\Temp\huter.exe
file C:\Users\Administrator\AppData\Local\Temp\0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe
一个进程创建了一个隐藏窗口 (1 个事件)
Time & API Arguments Status Return Repeated
1727545303.0625
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\sanfdr.bat
filepath_r: C:\Users\ADMINI~1\AppData\Local\Temp\sanfdr.bat
parameters:
show_type: 0
success 1 0
检查适配器地址以检测虚拟网络接口 (1 个事件)
Time & API Arguments Status Return Repeated
1727545305.15625
GetAdaptersAddresses
family: 2
flags: 16
success 0 0
网络通信
与未执行 DNS 查询的主机进行通信 (5 个事件)
host 114.114.114.114
host 8.8.8.8
host 218.54.47.76
host 218.54.47.74
host 194.54.47.77
从磁盘删除已执行的文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\sanfdr.bat
文件已被 VirusTotal 上 57 个反病毒引擎识别为恶意 (50 out of 57 个事件)
ALYac Gen:Variant.Jaik.34843
APEX Malicious
AVG Win32:Kryptik-NJO [Trj]
Acronis suspicious
Ad-Aware Gen:Variant.Jaik.34843
AhnLab-V3 Trojan/Win32.Swisyn.C711142
Antiy-AVL Trojan[Backdoor]/Win32.AGeneric
Arcabit Trojan.Jaik.D881B
Avast Win32:Kryptik-NJO [Trj]
Avira BDS/Backdoor.Gen7
Baidu Win32.Trojan.Urelas.b
BitDefender Gen:Variant.Jaik.34843
BitDefenderTheta Gen:NN.ZexaF.34108.nm1@a8ExEEmO
Bkav W32.AIDetectVM.malware
ClamAV Win.Malware.Urelas-6717394-0
Comodo TrojWare.Win32.Urelas.SH@5674sp
CrowdStrike win/malicious_confidence_100% (D)
Cylance Unsafe
Cyren W32/S-d223fbae!Eldorado
DrWeb Trojan.DownLoader13.4595
ESET-NOD32 a variant of Win32/Urelas.AE
Emsisoft Gen:Variant.Jaik.34843 (B)
Endgame malicious (high confidence)
F-Prot W32/S-d223fbae!Eldorado
F-Secure Backdoor.BDS/Backdoor.Gen7
FireEye Generic.mg.bf1ec9fa99d56eb7
Fortinet W32/Urelas.U!tr
GData Gen:Variant.Jaik.34843
Ikarus Trojan.Win32.Urelas
Invincea heuristic
Jiangmin Backdoor.Generic.ably
K7AntiVirus Trojan ( 004952aa1 )
K7GW Trojan ( 004952aa1 )
Kaspersky Backdoor.Win32.Plite.bhuv
MAX malware (ai score=82)
Malwarebytes Trojan.Urelas
MaxSecure Trojan.Malware.121218.susgen
McAfee Trojan-FFDV!BF1EC9FA99D5
McAfee-GW-Edition BehavesLike.Win32.Gupboot.dt
MicroWorld-eScan Gen:Variant.Jaik.34843
Microsoft Trojan:Win32/Urelas.AA
NANO-Antivirus Trojan.Win32.Dwn.drcuqv
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM10.1.F8BC.Malware.Gen
Rising Trojan.Urelas!1.BE13 (RDMK:cmRtazroMXxODlqkfdFUM8O8tYdi)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Troj/Urelas-Q
Tencent Malware.Win32.Gencirc.10b30b17
Trapmine malicious.high.ml.score
连接到不再响应请求的 IP 地址(合法服务通常会保持运行) (4 个事件)
dead_host 218.54.47.76:11120
dead_host 218.54.47.74:11150
dead_host 218.54.47.76:11170
dead_host 194.54.47.77:11150
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2015-04-28 09:10:10

PE Imphash

5f1929a8ca007a58d8921624c4dd5b88

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00027000 0x00027000 4.6046328170555535
.rsrc 0x00028000 0x00008000 0x00008000 4.625324832326918
.reloc 0x00030000 0x00003000 0x00003000 3.4877635781628054

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x0001e718 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MENU 0x0001eb80 0x0000003e LANG_KOREAN SUBLANG_KOREAN None
RT_DIALOG 0x0001edb0 0x00000246 LANG_KOREAN SUBLANG_KOREAN None
RT_DIALOG 0x0001edb0 0x00000246 LANG_KOREAN SUBLANG_KOREAN None
RT_STRING 0x0001eff8 0x00000096 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x0001f090 0x00000076 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x0001f090 0x00000076 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_VERSION 0x0002e130 0x000002b0 LANG_KOREAN SUBLANG_KOREAN None
RT_MANIFEST 0x0002e3e0 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library KERNEL32.dll:
0x411020 GetSystemDirectoryW
0x411024 DeleteFileW
0x411028 GetModuleFileNameW
0x41102c GetTickCount
0x411030 GetVersionExW
0x411034 ReadFile
0x411038 CreateFileW
0x41103c DeviceIoControl
0x411040 GetTempPathA
0x411044 GetModuleFileNameA
0x411048 HeapAlloc
0x41104c GetProcessHeap
0x411050 HeapFree
0x411054 MultiByteToWideChar
0x411058 HeapReAlloc
0x41105c LCMapStringW
0x411060 HeapSize
0x411064 CreateFileA
0x411068 GetFileAttributesW
0x41106c LoadLibraryW
0x411070 WriteConsoleW
0x411074 FlushFileBuffers
0x41107c SetStdHandle
0x411080 CreateThread
0x411084 CreateEventW
0x411088 CloseHandle
0x41108c OpenEventW
0x411090 GetTempPathW
0x411094 GetStringTypeW
0x411098 IsValidCodePage
0x41109c GetOEMCP
0x4110a0 GetACP
0x4110a4 GetCPInfo
0x4110a8 RaiseException
0x4110ac SetFilePointer
0x4110b4 GetCurrentProcessId
0x4110bc HeapCreate
0x4110c4 GetCurrentThreadId
0x4110c8 ExitProcess
0x4110cc Sleep
0x4110d0 GetCommandLineW
0x4110d4 HeapSetInformation
0x4110d8 GetStartupInfoW
0x4110dc GetLastError
0x4110e0 TerminateProcess
0x4110e4 GetCurrentProcess
0x4110f0 IsDebuggerPresent
0x4110f4 EncodePointer
0x4110f8 DecodePointer
0x411108 RtlUnwind
0x41110c WriteFile
0x411110 WideCharToMultiByte
0x411114 GetConsoleCP
0x411118 GetConsoleMode
0x41111c GetProcAddress
0x411120 GetModuleHandleW
0x411124 GetStdHandle
0x411130 SetHandleCount
0x411134 GetFileType
0x41113c TlsAlloc
0x411140 TlsGetValue
0x411144 TlsSetValue
0x411148 TlsFree
0x411150 SetLastError
0x411154 SetEndOfFile
Library USER32.dll:
0x411168 LoadIconW
0x41116c RegisterClassExW
0x411170 CreateWindowExW
0x411174 DefWindowProcW
0x411178 BeginPaint
0x41117c LoadAcceleratorsW
0x411180 LoadStringW
0x411184 LoadCursorW
0x411188 wsprintfW
0x41118c PostQuitMessage
0x411190 EndPaint
Library ADVAPI32.dll:
0x411000 RegQueryValueExW
0x411004 RegSetValueExW
0x411008 RegCloseKey
0x41100c RegOpenKeyExW
Library SHELL32.dll:
0x41115c ShellExecuteA
0x411160 ShellExecuteW
Library WS2_32.dll:
0x411198 WSAStartup
0x41119c htonl
0x4111a0 gethostbyaddr
0x4111a4 socket
0x4111a8 gethostbyname
0x4111ac inet_addr
0x4111b0 htons
0x4111b4 connect
0x4111b8 closesocket
0x4111bc send
0x4111c0 recv
0x4111c4 WSAGetLastError
Library IPHLPAPI.DLL:

L!This program cannot be run in DOS mode.
4.pOpOpOkUWOk``OkT
Oy7m}OpO
OkQuOkdqOkcqORichpO
PEC2NO
.reloc
WjdhmA
WjmVjk3VD$
\$$\$(t$,
jlt$(D$4D$8
_^[334
fD$DD$FSPQm
D$DVP3
D$LPSS
EULHPA
3M3^D3
ESVW3j>fE3
f;uh2A
j@h&yA
3@M_^3[1
ESVW3h
uHPEPPSh<3A
f;u+u0hL3A
f;u*Wh\3A
j^rSPfZi
M_^33[/
3VPfPg
t(PVP.
M_^3[-
3VfWPe
3VfWPe
tKHt1Ht
@;rMSMP9u
3@M_^3[)
t)3FVh
@;rMSMP9u
3@M_^3[ (
PfP3Ea
3VfSPo`
jQXfl+
9tthptA
f;u+t"VSh
f9uAhL6A
jdY3Pd
3@M_^3[#
3VfhjSP\
hSP3}\
3j>fEESP[
3j>fxzSP[
f;ul3A
EPSW;uh
f;uffpuA
f;uf:6fpuA
M_^3[-
f3VPRY
ftfpuA
VRhp6A
EEEEEEfEE3j
EEPMMQh
_GBPuD
f;u+t#}
_^[]3EEUREEEPh
f;u+uSj'
_^3[]U
E3VWfME
EEEEfEE
]U@HPA
fMMMMMfM^xZj
]U$HPA
EEEEEEfE
@uVW+OO
MQRE_&
|_[^]U
^3[]Whl7A
tVMQVj
3Eou2}
_^[]_^[]
3hUQSWj
~PFJWP
u VVjRVV
GWVjRj
MMMMfMM
3VW|7A
EEEEfEEx
u-;u)NwA
3M_^3[
M_^3[S
u+u'S~
E^[]U
M_^3[.
VW(,4t
0_^[M3
M_^3[;
U SW3j
3Y}]9]
;tV;|BMx
YYt"Mx
39]fD~
;t3f9>
}f9;u
jEPhHPA
;Ew[PuV4
E+)E$V,
}O;]rOt
u+WuV1
M+;rP})E
YYt)EF
YY]jXh9A
fu3_[]
f_^]UW}
CB;r]}
]8u S
jEPhHPA
YYuf-u
[u-VgX
RPjjEUHZ
M]EUVW
Yu)jAXf;w
E;ErDE9Eu
3;Er0w
QuuuWY
u>9ur9w
`p33_^[
U]/UVu
USV3;u
;r3_^[]
U SW3j
3Y}]9]
;t5;|"Mx
ffffffE
YM_3[>
3PPPPP
t4+t$+t
ItQht@lt
3F tBP
itnnt$o
PWP5D]A
PW5P]A
PW5L]A
|j0XfQfW
t-RPWSG
j0O,Yt
j OWYt
`pM_^3[
1 B0RA
;r" TA
;r= TA
at0rt#wt
f9>tf>=uu
f> t3f9>t
Y]3u;5A
+SVWHPA
1E3PeuEEEEd
Y__^[]Q
:E_^[]E
9csmu)=
URPQQh v@
t;T$4t
;v.4v\
UVWS33333[_^]
33333USVWj
_^[]Ul$
Yt$WV!
jXEU;u
Ht%CT1
\3_[^j
W>+~,WPVYPU
Y/V|Yt
Y}3u;5A
tVPV%YY3BU
4V.YYE
W34809}
;u;8!
4 3,9E
P4UM`8
DQP C@
,PVEP$
3+4H;M
(PVHP$
(PVHP$
r3VVhU
QH++PPVh
(P+P5P$
\,+48;E
0?DY1$
8+0[M_3^
DDDDDDDDDDDDDD
8csmu*x
YYuTVWh-@
3]j hH;A
3PPPPPpVBO
@Y<v*V5O
^SSSSSyj
;tFtA3
S^`N`H
j$Y~\d9
QY^`[_^]
3Y[_^5bA
3PPPPP
UQV3W}
ft;uf t
Bf8\tf8"u8
ft$9Uu
UQQSVWh
V33SfjA
[]YY?sJM
_[^SVW
j@j ^VE,
H3H/5~A
;rSWf9M
YYt:V5UA
P YF,t
YYt0V5UA
E3E3;u
<at,<rt"<wt
F> t>=unF> tj
WPWPWv
whu;5YA
8]tEMap<u
TM_^3[j
M`}_hu
PCY^hS=L
Y%u UA
3W;to=^A
t4V0;t(W8jYt
Fpt"~l
lVYYYEE
f;rJvf;
f;rJvf;
f;rJvf;
Jvf;rgQ
Pf;rSPf;
t4+t$HHt
ItUhtDlt
HHt$HHt
itxnt*o
PSP5D]A
PS5P]A
PS5L]A
t-RPWS0
0@@If8
u69t.EPq
`pM_^3[
EU_^j
VSY@UA
t.VBYt"V6
Yt.VYt"V
]39}~0N
YYtG;}|fE
YYM_^3[
VW3,]A
YYu,9E
tAt2t$
E`p;39]
VW38kA
F$|3@_^
Z3G}39
tCHt(Ht K
Y+t7+t*+t
3t(;t$;t
t$;t)i
^0_^[E
uEPuuu
uEuPuuu
$ MeHMu
tWWW6#
JWWW6o
[+PD=P6<
EUSSSSSj
9}t(9}t
tDft?f;t8EP
Vuy39E
B(;r3_^[]
SVWHPA
1E3PEd
Y_^[]USVWUj
P(RP$R
t:|$,t
;t$,v-4v
UQPXY]Y[
S3VW;|[;
t6<0t0=
u}uyG,j@j GYYEta
FGIuX^_]
Y+t"+t
+tY+uC(}
Uw\]Yp
u>OdMGd
uwdSUY
t?P5lA
3M_^3[3e
ft'Ou"+
jPfDJXdf
tCHt(Ht }
Y+t7+t*+t
3t(;t$;t
^0|_^[E
uEPuuu
uEuPuuu
$ MeHMu~
tWWW6#
JWWW6#
[+PD=P6
EVSSSSSvj
9}t(9}t
M$m39]
MfMf;u!f;t
E`p3^_[
H8]tMapUj
E`p3^[_
S3VW;~E
@;u+H;}
39](SSu
]9]tWuu
};~Bj3X
3;t?uWuuu
t"SS9] u
EYe_^[M38U
Mifu(Eu$u u
UQQHPA
ES3VW]9]
39] SSu
ESEYe_^[M3
M<eu$Eu
a_6Z_v R_v$J_v(B_v,:_v02_v4*_v
_vD^vH^vL^vP^vT^vX^v\^v`^vd^vh^vl^vp^vt^vx^v|^@
P[YF0;
P[Yv4;5^A
PX[YF ;
PF[YF$;
P4[YF8;
P"[YF<;
PZYFD;
PZYFH;
PZYvL;5^A
VZY^]UV3PPPPPPPPU
rustnM
tR:QuMPt<:Qu7Pt&:Qu!Pt
@FA;r3^[
+UV3PPPPPPPPU
^0egVu
f;v6;t
Map_^[;t&;w Kgj"^0f8]tE`py
<E`p0M
YUY]Vu
UY3MW0u
L1$!_^[u
Map^[3PPj
E`p]Ex
tAMap8+
;t+3_^[
EPQEPEj
RQMQVp
Map^[UWVSM
WVS3D$
bad allocation
CorExitProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
UTF-16LE
UNICODE
Unknown exception
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
(null)
`h````
xpxxxx
`h`hhh
xppwpp
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__eabi
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
218.54.47.76
sanfdr.bat
:Repeat
if exist "
" goto Repeat
rmdir "
%d.%d.%d.%d
218.54.47.74
218.54.47.76
218.54.47.76
ExitProcess
GetTempPathW
OpenEventW
CloseHandle
CreateEventW
CreateThread
GetFileAttributesW
GetSystemWindowsDirectoryW
GetSystemDirectoryW
DeleteFileW
GetModuleFileNameW
GetTickCount
GetVersionExW
ReadFile
CreateFileW
DeviceIoControl
GetTempPathA
GetModuleFileNameA
HeapAlloc
GetProcessHeap
HeapFree
MultiByteToWideChar
KERNEL32.dll
LoadStringW
LoadAcceleratorsW
LoadIconW
LoadCursorW
RegisterClassExW
CreateWindowExW
DefWindowProcW
BeginPaint
EndPaint
PostQuitMessage
wsprintfW
USER32.dll
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
ADVAPI32.dll
ShellExecuteW
ShellExecuteA
SHELL32.dll
WS2_32.dll
GetAdaptersAddresses
IPHLPAPI.DLL
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetProcAddress
GetModuleHandleW
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
SetStdHandle
IsProcessorFeaturePresent
FlushFileBuffers
WriteConsoleW
LoadLibraryW
CreateFileA
HeapSize
LCMapStringW
HeapReAlloc
SetEndOfFile
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
218.54.47.74
wwwwwwwwwwwwwwwpxpx
pxwwwwwwwwwwwwwxpxpxDDDDDDDDD@
pxDDDDDDDDDH
pxDDDDDDDDDH
pxDDDDDDDDDDDDDDpxpwwwwwwwwwwwwwwwp
wwwwwwwpxpxpxpxpxpxpxpxwwwwwwpxDDDpxDDDDDDpxpwwwwwwww
%%$$"#"#"#*+()''&&??<=9;7A63[4]5mm]5\]m]mm5\mm5555555\\\5\\\5m\55\\5ed:cOXY/P.Z0.0.QR00/ZPP0000000/0PPZR.BI@/DE0,
CWkV21TSav^8{
}>qooggggggg1`_fhsnHK{JLp
Gl-FjNw~ytMMMMMMUbbrrrrrxxxxxxxxrriUMMMMMMMMMUuzt
.#%-0%:?%9>%8=%7;
EG@DF@MO@LN2Kh2\g2]f2[I3')+*+)))*))()*+++,6J!54 CBAjYPQTVTSkllZTTXRTUiHceWda/
iu`_<bmt^}zy|yx~
{|yvrrwsqpon
PPPPPPPPPPPPPPPPPKMNNNNNNNNNNOLO
JHHGGGGGGGGHI
JEEEEEEEEEEFC
JEEEEEEEEEEFC
JEEEEEEEEEEFD
JEFEEEEEEEEEB
O%JEEEEEEEEEFFB
JJIIIIJIIIIJJ
O(@>=77A779?<8;$O'
)O6530./21+*-,4#4PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'H#P'Q'Q'Q'Q'
R&R&R'R&R&R&R&R&Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'R'
e)qjiPt
{rFpcq
S^EDIID:BI638?@=>>=======8,00-.(',0-0178
S(O$N!N!N!N!N"M"M"M"M"M"M"M"M"M"M"M"M"M"M"M"M"N"M"M"O$S)O"
QDf>.j~ro
*V=;?73?//87566-&*'!+3$357_
OO&F#C!C!C!C!C!C!C!C!C!C!
A E$R(
x(s o7|WRzW
PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
wwwwwwwwwwwwwwwpxpx
pxwwwwwwwwwwwwwxpxpxDDDDDDDDD@
pxDDDDDDDDDH
pxDDDDDDDDDH
pxDDDDDDDDDDDDDDpxpwwwwwwwwwwwwwwwp
wwwwwwwpxpxpxpxpxpxpxpxwwwwwwpxDDDpxDDDDDDpxpwwwwwwww
%%$$"#"#"#*+()''&&??<=9;7A63[4]5mm]5\]m]mm5\mm5555555\\\5\\\5m\55\\5ed:cOXY/P.Z0.0.QR00/ZPP0000000/0PPZR.BI@/DE0,
CWkV21TSav^8{
}>qooggggggg1`_fhsnHK{JLp
Gl-FjNw~ytMMMMMMUbbrrrrrxxxxxxxxrriUMMMMMMMMMUuzt
.#%-0%:?%9>%8=%7;
EG@DF@MO@LN2Kh2\g2]f2[I3')+*+)))*))()*+++,6J!54 CBAjYPQTVTSkllZTTXRTUiHceWda/
iu`_<bmt^}zy|yx~
{|yvrrwsqpon
PPPPPPPPPPPPPPPPPKMNNNNNNNNNNOLO
JHHGGGGGGGGHI
JEEEEEEEEEEFC
JEEEEEEEEEEFC
JEEEEEEEEEEFD
JEFEEEEEEEEEB
O%JEEEEEEEEEFFB
JJIIIIJIIIIJJ
O(@>=77A779?<8;$O'
)O6530./21+*-,4#4PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'H#P'Q'Q'Q'Q'
R&R&R'R&R&R&R&R&Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'R'
e)qjiPt
{rFpcq
S^EDIID:BI638?@=>>=======8,00-.(',0-0178
S(O$N!N!N!N!N"M"M"M"M"M"M"M"M"M"M"M"M"M"M"M"M"N"M"M"O$S)O"
QDf>.j~ro
*V=;?73?//87566-&*'!+3$357_
OO&F#C!C!C!C!C!C!C!C!C!C!
A E$R(
x(s o7|WRzW
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
kernel32.dll
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
a9dd'* T1]
Uru4<E
7*Idu9M;
w3_^[r#MV
S7(hu#j
>tg(xs
sGDUSH,
Tx2HzT
UIuYbvkQ
3cN!eE
rjxY(X
JD>FA
_^8UHP-XpT@
P ;!8
N,+Kj@
Q$a7!'
ZLlfGv_
;tYw8R
IRvs@f$]
t5n;*0
'7P(QCbz
Z;2F=2 +uQ
Q$RVnR2*
}&nH+6D^ |%
2&/+I\q^'"
'8ms9vbup
'Y0sNhNcD
AyfQq@IdMZh0loM
TDj(ok*0+R
fA_6Lk$me
`fQv[Pdg:@
KMJ9{@4-o
HWxApl
icaton er
s u.Th}e<cdc
%sy5|lntba6id|SDqLG5d,al
W'c,us
OagaBoxAw
k8l?ExitPIL6Ch
?GtMSl
`|VirtFAcMvL
"PD<H0MzI1
`t$$|$(3
r+|$(|$
USQWVRW
ZPR3C
Z^_Y[]
Y*M3MMB
MMM2M}
UUUUM3
]^_[USWV
;tYw8tR
tfEff}t
IIu^_[
t5;Et0
EEHERPu
HEuuEEZV~
^ZYY3@^_[
msvbvm
Nu3H^_[
Q@@Pu
Application error
Application corrupt.
The procedure %s could not be located in the DLL %s.
The ordinal %d could not be located in the DLL %s.
user32
MessageBoxA
wsprintfA
kernel32
ExitProcess
CloseHandle
OpenProcess
GetModuleHandleA
VirtualProtect
@I@@@@@@
UTF-16LE
UNICODE
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
AMicrosoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
KERNEL32.DLL
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
(null)
WUSER32.DLL
((((( H
h(((( H
H
CONOUT$
AStudio.exe
hoidyet
218.54.47.77
218.54.47.74
Software\Microsoft\Windows NT\CurrentVersion\Windows
TrayKey
ahnlab
%s.exe
\Hangame\KOREAN\HanUninstall.exe
\NEOWIZ\PMang\common\PMLauncher.exe
\Netmarble\Common\NetMarbleEndWeb.exe
\Program Files\AhnLab\V3Lite30\V3Lite.exe
\Program Files\ESTsoft\ALYac\AYLaunch.exe
\Program Files\naver\NaverAgent\NaverAgent.exe
WinSeven
WinVista
UnKnown
golfinfo.ini
golfset.ini
HGDraw.dll
1218.54.47.77
%s%s.exe
\\.\%s
\\.\PHYSICALDRIVE
%d.%d.%d.%d
A@@@@@@@@@@
'(,,--.000013
167888:=>=@?BDEIIIS^
;@Qbcbbo
!&'*+-
*//33565778;=?
x$&*++,--/046I
ssssss
sssssssss
YLFCEDECCCDCCECCDEEECIS@JIB
fkmknnnm
nnmmlnooi
Dialog
MS Shell Dlg
Check1
MfcLink
MfcLink1
Split1
msctls_progress32
Custom1
MfcPropertyGrid
Dialog
MS Shell Dlg
SysListView32
MfcShellTree
MfcButton
MfcButton1
msctls_updown32
msctls_trackbar32
MfcMaskedEdit
MfcShellList
hokdisu
OURTESTSERVER
TESTPAGEERROR
CANNOTPROC
NIKHHUSTDHDGHSFS
..11K
2c#"
'(,,--.000013
167888:=>=@?BDEIIIS^
;@Qbcbbo
!&'*+-
*//33565778;=?
x$&*++,--/046I
ssssss
sssssssss
YLFCEDECCCDCCECCDEEECIS@JIB
fkmknnnm
nnmmlnooi
VS_VERSION_INFO
StringFileInfo
041204b0
CompanyName
TODO: <
FileDescription
TODO: <
FileVersion
1.0.0.1
InternalName
GUP.exe
LegalCopyright
Copyright (C) 2015
OriginalFilename
GUP.exe
ProductName
TODO: <
ProductVersion
1.0.0.1
VarFileInfo
Translation

Process Tree


0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe, PID: 3028, Parent PID: 2600

default registry file network process services synchronisation iexplore office pdf

huter.exe, PID: 2660, Parent PID: 3028

default registry file network process services synchronisation iexplore office pdf

cmd.exe, PID: 2504, Parent PID: 3028

default registry file network process services synchronisation iexplore office pdf

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 40426a0da3faba5d_huter.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\huter.exe
Size 210.8KB
Processes 3028 (0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed
MD5 5bac4739ad0574c8040c5bb2b55105e3
SHA1 2dbb5ea4f38e223c86731cde379708b767b278a0
SHA256 40426a0da3faba5d8772a934e3112570c4bf4f557a68675192fc68aafd4f8cf2
CRC32 2EB56736
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 431451d6c5927b16_sanfdr.bat
Filepath C:\Users\Administrator\AppData\Local\Temp\sanfdr.bat
Size 365.0B
Processes 3028 (0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe) 2504 (cmd.exe)
Type ASCII text, with CRLF, CR line terminators
MD5 efab41ad62df03a50c2fa81ce454da63
SHA1 7f05f71a8c9847f5190aa5567a7ce9482580f5d7
SHA256 431451d6c5927b167d4a6be078004dad131f0d27d3cc70f45a7392e1dfc6f555
CRC32 EC33F95C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0590ce077a5b9dbc_0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe
Size 210.7KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed
MD5 bf1ec9fa99d56eb7aa2facf29e123869
SHA1 65a61862cd6687cd84c63f4441b48c169d4e1c03
SHA256 0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1
CRC32 C6A206DC
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 40afdaa0bdbd385e_golfinfo.ini
Filepath C:\Users\Administrator\AppData\Local\Temp\golfinfo.ini
Size 512.0B
Processes 3028 (0590ce077a5b9dbc099afc4ad25596c593ad0eedc293626f64ee0f1c108ed1b1.exe)
Type data
MD5 bd60c62717a862c75bbe8c97f365be39
SHA1 bf0957b47d8a44f51f9e9680c4e06710edc91b1b
SHA256 40afdaa0bdbd385e5c0f0c0899eb8dc107877ab9d815d7b8885bd4c3f1e34873
CRC32 EF3134AC
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.