2.0
低危

00ac9e17eb65f8b33b967f57aa4bf6a5d8e047b15349208c8ada4672bb14c0dd

00ac9e17eb65f8b33b967f57aa4bf6a5d8e047b15349208c8ada4672bb14c0dd.exe

分析耗时

34s

最近分析

386天前

文件大小

6.1KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER PPATRE
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.53
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Downloader-WID [Trj] 20200310 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200310 2013.8.14.323
McAfee Upatre-FACV!CA4FEFA79449 20200309 6.0.6.653
Tencent Malware.Win32.Gencirc.10b0ce11 20200310 1.0.0.1
静态指标
行为判定
动态指标
在文件系统上创建可执行文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\hfdfjdk.exe
投放一个二进制文件并执行它 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\hfdfjdk.exe
将可执行文件投放到用户的 AppData 文件夹 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\hfdfjdk.exe
一个进程创建了一个隐藏窗口 (2 个事件)
Time & API Arguments Status Return Repeated
1727545274.593875
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\hfdfjdk.exe
filepath_r: C:\Users\ADMINI~1\AppData\Local\Temp\hfdfjdk.exe
parameters:
show_type: 0
success 1 0
1727545292.437875
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\ckjienn.exe
filepath_r: C:\Users\ADMINI~1\AppData\Local\Temp\ckjienn.exe
parameters:
show_type: 0
failed 0 0
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
尝试创建或修改系统证书 (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob
文件已被 VirusTotal 上 54 个反病毒引擎识别为恶意 (50 out of 54 个事件)
ALYac Trojan.Ppatre.Gen.1
APEX Malicious
AVG Win32:Downloader-WID [Trj]
Acronis suspicious
Ad-Aware Trojan.Ppatre.Gen.1
AhnLab-V3 Trojan/Win32.Zbot.R83549
Antiy-AVL Trojan[Downloader]/Win32.Waski.a
Arcabit Trojan.Ppatre.Gen.1
Avast Win32:Downloader-WID [Trj]
Avira TR/ATRAPS.Gen
BitDefender Trojan.Ppatre.Gen.1
BitDefenderTheta Gen:NN.ZexaCO.34098.amX@auanUXn
Bkav W32.AIDetectVM.malware
CAT-QuickHeal Trojan.Mauvaise.SL1
ClamAV Win.Downloader.Ppatre-7170342-0
Comodo TrojWare.Win32.TrojanDownloader.Small.CDC@8mzsfr
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.794492
Cyren W32/Upatre.KJ.gen!Eldorado
DrWeb Trojan.DownLoad3.28161
ESET-NOD32 a variant of Win32/TrojanDownloader.Small.PRL
Emsisoft Trojan.Ppatre.Gen.1 (B)
Endgame malicious (high confidence)
FireEye Generic.mg.ca4fefa794492a1a
Fortinet W32/Tiny.NIV!tr
GData Trojan.Ppatre.Gen.1
Invincea heuristic
Jiangmin TrojanDownloader.Generic.akuo
K7AntiVirus Trojan-Downloader ( 0050fef41 )
K7GW Trojan-Downloader ( 00456a071 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=84)
Malwarebytes Trojan.Upatre.Generic
MaxSecure Trojan.Upatre.Gen
McAfee Upatre-FACV!CA4FEFA79449
McAfee-GW-Edition BehavesLike.Win32.Upatre.xt
MicroWorld-eScan Trojan.Ppatre.Gen.1
NANO-Antivirus Trojan.Win32.DownLoad3.dofdyx
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM20.1.C927.Malware.Gen
Rising Downloader.Upatre!8.B5 (TFE:3:OwGVhzpxRwT)
SUPERAntiSpyware Trojan.Agent/Gen-Downloader
SentinelOne DFI - Malicious PE
Sophos Troj/Upatre-XO
Tencent Malware.Win32.Gencirc.10b0ce11
Trapmine malicious.high.ml.score
TrendMicro TROJ_DLOADER.SM3
TrendMicro-HouseCall TROJ_DLOADER.SM3
VBA32 BScope.Trojan.Downloader
VIPRE Trojan-Downloader.Win32.Upatre.a (v)
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2013-09-05 18:47:20

PE Imphash

d0b8285184365a838ba34f4f2ef57766

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000039b 0x00000400 5.3814693047856625
.rdata 0x00002000 0x000003f8 0x00000400 4.392023104275022
.reloc 0x00003000 0x0000009c 0x00000200 1.4494397762050422

Imports

Library WININET.dll:
0x402050 InternetSetOptionW
0x402054 HttpSendRequestW
0x402058 InternetConnectW
0x40205c InternetReadFile
0x402060 HttpQueryInfoW
0x402064 HttpOpenRequestW
0x40206c InternetOpenW
Library KERNEL32.dll:
0x402000 HeapCreate
0x402004 GetModuleFileNameW
0x402008 DeleteFileW
0x40200c CloseHandle
0x402014 GetTempPathW
0x402018 lstrlenW
0x40201c lstrcmpW
0x402020 ExitProcess
0x402024 GetFileSize
0x402028 HeapAlloc
0x40202c GetModuleHandleW
0x402030 WriteFile
0x402034 ReadFile
0x402038 CreateFileW
Library USER32.dll:
0x402048 wsprintfW
Library SHELL32.dll:
0x402040 ShellExecuteW

L!This program cannot be run in DOS mode.
`.rdata
@.reloc
uEWuEV
_3^@[VP
BVMQuPu
VuVuh @
V~MA<u
tVVVVh @
EV;t=d @
0EPVVh
_EPEPju}
WEPju
tVEPEPh
E9ErVh
WPhD!@
VVVP(QL$
InternetOpenW
InternetQueryOptionW
InternetReadFile
InternetConnectW
HttpSendRequestW
InternetSetOptionW
HttpQueryInfoW
HttpOpenRequestW
WININET.dll
ExitProcess
GetFileSize
HeapAlloc
GetModuleHandleW
WriteFile
HeapCreate
ReadFile
GetModuleFileNameW
CreateFileW
lstrcmpW
lstrlenW
GetTempPathW
GetCurrentDirectoryW
CloseHandle
DeleteFileW
KERNEL32.dll
wsprintfW
USER32.dll
ShellExecuteW
SHELL32.dll
0"00060X0f0k0s0|000000?1f1o11111111
2$272>2E2[222222
3%3,3>3K3R3
hfdfjdk.exe
Updates downloader
mmile.com
text/*
application/*
/images/05m.exe
ckjienn.exe
C:\fGDUIX64.exe
C:\867bb45649adc9f5952e8944c0a4a2f256ed0875f52bd431212f5ade82d240f3
C:\Raiden\Goat\FTP\Sample\D51A58D008AF64EF65326DECFDB5FA3E.bin.exe
C:\dgqTx46K.exe
C:\fce84662f5d46bda5df7129302ad684cf69990bcf431e5722db2e9eb4a6c9462
C:\Users\admin\Downloads\hfdfjdk.exe
C:\3052c0aba106675f3b546a84bd4676a8fbe1a9081b2a453fab5ca86f0b77779f
C:\7358fc0c14a079eb87c639211736cab4b4e8f37999ddecbe3745eb3817b9ce52
C:\b7a72a21e77be22b0de0f57ea828f1c8e2484cb269bb400c89b3737ca5660496
C:\Users\admin\Downloads\hfdfjdk.exe
C:\1c716fbd106aa6871ada7e280cc97b605ad7d3243a0c53d0ac1fc17bad3579ae
C:\Users\admin\Downloads\hfdfjdk.exe
C:\461bca1e03689dbef4423aeff84fb72667cbbd9db2b456e77276d18839ffa4c8
C:\Users\Joe Cage\Desktop\7abRCVgArM.exe
C:\9aak3wXG.exe
C:\3pHVTHuA.exe
C:\Users\admin\Downloads\be246b6e0c880d1b5cf1838fb0e4e3f2.virus.exe
C:\01e5f8f1a43f7a68ebda552a450a5933073ce21b2bd6f749e3d05331b1f952bc
C:\75478c5edb9afacde0d6dfd4ca5b457f320f537c525b7447bb0960a3cae89e9c
C:\Users\RA491~1.VUL\AppData\Local\Temp\fb68a9b623c357daa19e610548b57e81.exe
C:\P4PxV4LO.exe
C:\638740c588ca10498bbc2b59a73cdc12f76941499f897321f83f51651c7e18ea
C:\Users\Virtual\AppData\Local\Temp\f9e710d271251d351d7157cefe7ec94321c9d941bc0cf5bcf560047cde6e6126.exe
C:\e4761b782fcafdc6bfaedf871fbe1ef1db078a4c98b019f70041bea13143d22e

Process Tree


00ac9e17eb65f8b33b967f57aa4bf6a5d8e047b15349208c8ada4672bb14c0dd.exe, PID: 2108, Parent PID: 1848

default registry file network process services synchronisation iexplore office pdf

hfdfjdk.exe, PID: 1640, Parent PID: 2108

default registry file network process services synchronisation iexplore office pdf

TCP

Source Source Port Destination Destination Port
192.168.56.101 49164 172.67.175.35 mmile.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name f30a524280a48055_hfdfjdk.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\hfdfjdk.exe
Size 6.3KB
Processes 2108 (00ac9e17eb65f8b33b967f57aa4bf6a5d8e047b15349208c8ada4672bb14c0dd.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4f0b1db4c00738230f798656932527bd
SHA1 9bf19a7f3438f15b750a1f2f3687282b5ddfdb8e
SHA256 f30a524280a480554993efcf4fb19cf47915404a1d30b6c03d829dcadf686983
CRC32 87ED1B84
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.