2.2
中危

03c95013b313b79c3eddb09f4c072de67d421f93ae9fe3a796318501d71e2a97

cce80730c33f507a5a6ad9d36d146d91.exe

分析耗时

27s

最近分析

文件大小

486.4KB
静态报毒 动态报毒 ADWARELINKURY AGEN AI SCORE=100 AIDETECT ARTEMIS CLOUD CONFIDENCE DCG6PHS6R8U DIEP EJALLH ENESTEDEL EQ4@AMOWB2O F116KT FILECODER GENERICKD HGIASOGA IESU KCLOUD MALWARE2 MALWARE@#1XB4DN0SQFSPB MULTIPLE DETECTIONS PCLOCK SCORE STATIC AI SUSGEN SUSPICIOUS SFX TDFS TEERAC UNSAFE XPTP ZBOT ZEDLAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!CCE80730C33F 20210312 6.0.6.653
Alibaba TrojanSpy:Win32/Teerac.514ff562 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Malware-gen 20210312 21.1.5827.0
Tencent Win32.Trojan-spy.Zbot.Tdfs 20210312 1.0.0.1
Kingsoft Win32.Troj.Generic_a.a.(kcloud) 20210312 2017.9.26.565
CrowdStrike win/malicious_confidence_60% (D) 20210203 1.0
行为判定
动态指标
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 48 AntiVirus engines on VirusTotal as malicious (48 个事件)
Bkav W32.AIDetect.malware2
MicroWorld-eScan Trojan.GenericKD.5609280
FireEye Generic.mg.cce80730c33f507a
McAfee Artemis!CCE80730C33F
Cylance Unsafe
Sangfor Spyware.Win32.Zbot.8
K7AntiVirus Trojan ( 0055e3ef1 )
Alibaba TrojanSpy:Win32/Teerac.514ff562
K7GW Trojan ( 0055e3ef1 )
Cybereason malicious.0c33f5
BitDefenderTheta Gen:NN.ZedlaF.34608.eq4@amOwb2o
Cyren W32/Trojan.IESU-6219
Symantec Trojan.Gen
APEX Malicious
Avast Win32:Malware-gen
Kaspersky Trojan-Spy.Win32.Zbot.xptp
BitDefender Trojan.GenericKD.5609280
NANO-Antivirus Trojan.Win32.Inject.ejallh
Paloalto generic.ml
Tencent Win32.Trojan-spy.Zbot.Tdfs
Ad-Aware Trojan.GenericKD.5609280
Sophos ML/PE-A
Comodo Malware@#1xb4dn0sqfspb
VIPRE Trojan.Win32.Generic!BT
TrendMicro Ransom_PCLOCK.F116KT
McAfee-GW-Edition BehavesLike.Win32.AdwareLinkury.gc
Emsisoft Trojan.GenericKD.5609280 (B)
SentinelOne Static AI - Suspicious SFX
ESET-NOD32 multiple detections
Avira HEUR/AGEN.1116903
MAX malware (ai score=100)
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Microsoft Ransom:Win32/Teerac.Q
GData Trojan.GenericKD.5609280
Cynet Malicious (score: 90)
VBA32 Trojan.Inject
ALYac Trojan.GenericKD.5609280
TrendMicro-HouseCall Ransom_PCLOCK.F116KT
Rising Ransom.Enestedel!8.E513 (CLOUD)
Yandex Trojan.Injector!DcG6phs6r8U
Ikarus Trojan.Win32.Filecoder
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Injector.DIEP!tr
Webroot W32.Ransom.Gen
AVG Win32:Malware-gen
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_60% (D)
Qihoo-360 Win32/Trojan.Zbot.HgIASOgA
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2016-08-15 03:15:49

Imports

Library KERNEL32.dll:
0x42f000 GetLastError
0x42f004 SetLastError
0x42f008 GetCurrentProcess
0x42f00c DeviceIoControl
0x42f010 SetFileTime
0x42f014 CloseHandle
0x42f018 CreateDirectoryW
0x42f01c RemoveDirectoryW
0x42f020 CreateFileW
0x42f024 DeleteFileW
0x42f028 CreateHardLinkW
0x42f02c GetShortPathNameW
0x42f030 GetLongPathNameW
0x42f034 MoveFileW
0x42f038 GetFileType
0x42f03c GetStdHandle
0x42f040 WriteFile
0x42f044 ReadFile
0x42f048 FlushFileBuffers
0x42f04c SetEndOfFile
0x42f050 SetFilePointer
0x42f054 SetFileAttributesW
0x42f058 GetFileAttributesW
0x42f05c FindClose
0x42f060 FindFirstFileW
0x42f064 FindNextFileW
0x42f068 GetVersionExW
0x42f070 GetFullPathNameW
0x42f074 FoldStringW
0x42f078 GetModuleFileNameW
0x42f07c GetModuleHandleW
0x42f080 FindResourceW
0x42f084 FreeLibrary
0x42f088 GetProcAddress
0x42f08c GetCurrentProcessId
0x42f090 ExitProcess
0x42f098 Sleep
0x42f09c LoadLibraryW
0x42f0a0 GetSystemDirectoryW
0x42f0a4 CompareStringW
0x42f0a8 AllocConsole
0x42f0ac FreeConsole
0x42f0b0 AttachConsole
0x42f0b4 WriteConsoleW
0x42f0bc CreateThread
0x42f0c0 SetThreadPriority
0x42f0d4 SetEvent
0x42f0d8 ResetEvent
0x42f0dc ReleaseSemaphore
0x42f0e0 WaitForSingleObject
0x42f0e4 CreateEventW
0x42f0e8 CreateSemaphoreW
0x42f0ec GetSystemTime
0x42f108 GetCPInfo
0x42f10c IsDBCSLeadByte
0x42f110 MultiByteToWideChar
0x42f114 WideCharToMultiByte
0x42f118 GlobalAlloc
0x42f11c GetTickCount
0x42f124 GetExitCodeProcess
0x42f128 GetLocalTime
0x42f12c MapViewOfFile
0x42f130 UnmapViewOfFile
0x42f134 CreateFileMappingW
0x42f138 OpenFileMappingW
0x42f13c GetCommandLineW
0x42f148 GetTempPathW
0x42f14c MoveFileExW
0x42f150 GetLocaleInfoW
0x42f154 GetTimeFormatW
0x42f158 GetDateFormatW
0x42f15c GetNumberFormatW
0x42f160 RaiseException
0x42f164 GetSystemInfo
0x42f168 VirtualProtect
0x42f16c VirtualQuery
0x42f170 LoadLibraryExA
0x42f178 IsDebuggerPresent
0x42f184 GetStartupInfoW
0x42f18c GetCurrentThreadId
0x42f194 InitializeSListHead
0x42f198 TerminateProcess
0x42f19c RtlUnwind
0x42f1a0 EncodePointer
0x42f1a8 TlsAlloc
0x42f1ac TlsGetValue
0x42f1b0 TlsSetValue
0x42f1b4 TlsFree
0x42f1b8 LoadLibraryExW
0x42f1c0 GetModuleHandleExW
0x42f1c4 GetModuleFileNameA
0x42f1c8 GetACP
0x42f1cc HeapFree
0x42f1d0 HeapAlloc
0x42f1d4 HeapReAlloc
0x42f1d8 GetStringTypeW
0x42f1dc LCMapStringW
0x42f1e0 FindFirstFileExA
0x42f1e4 FindNextFileA
0x42f1e8 IsValidCodePage
0x42f1ec GetOEMCP
0x42f1f0 GetCommandLineA
0x42f1fc GetProcessHeap
0x42f200 SetStdHandle
0x42f204 HeapSize
0x42f208 GetConsoleCP
0x42f20c GetConsoleMode
0x42f210 SetFilePointerEx
0x42f214 DecodePointer

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 50537 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.