3.2
中危

0898235485dede55387d73941835104b6523b91967ae1974d8e880b8895de850

0898235485dede55387d73941835104b6523b91967ae1974d8e880b8895de850.exe

分析耗时

271s

最近分析

387天前

文件大小

40.0KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.68
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Malware-gen 20200409 18.4.3895.0
Baidu Win32.Trojan.Kryptik.my 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200410 2013.8.14.323
McAfee Upatre-FACH!CFDA50F0468E 20200410 6.0.6.653
Tencent Malware.Win32.Gencirc.10b4c6b5 20200410 1.0.0.1
静态指标
查询计算机名称 (2 个事件)
Time & API Arguments Status Return Repeated
1727545316.515375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545316.796875
GetComputerNameW
computer_name: TU-PC
success 1 0
检查进程是否被调试器调试 (2 个事件)
Time & API Arguments Status Return Repeated
1727545316.453375
IsDebuggerPresent
failed 0 0
1727545316.764875
IsDebuggerPresent
failed 0 0
行为判定
动态指标
连接到动态 DNS 域 (1 个事件)
domain checkip.dyndns.org
分配可读-可写-可执行内存(通常用于自解压) (2 个事件)
Time & API Arguments Status Return Repeated
1727545316.484375
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00bb1000
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 844
success 0 0
1727545316.780875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00871000
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 920
success 0 0
查找外部 IP 地址 (1 个事件)
domain checkip.dyndns.org
在文件系统上创建可执行文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\cadvahin.exe
将可执行文件投放到用户的 AppData 文件夹 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\cadvahin.exe
网络通信
与未执行 DNS 查询的主机进行通信 (4 个事件)
host 114.114.114.114
host 176.36.251.208
host 67.221.195.6
host 69.163.81.211
生成一些 ICMP 流量
文件已被 VirusTotal 上 61 个反病毒引擎识别为恶意 (50 out of 61 个事件)
ALYac Gen:Trojan.Ipatre.1
APEX Malicious
AVG Win32:Malware-gen
Acronis suspicious
Ad-Aware Gen:Trojan.Ipatre.1
AhnLab-V3 Trojan/Win32.Upatre.R160586
Antiy-AVL Trojan[Downloader]/Win32.Upatre.ehbg
Arcabit Trojan.Ipatre.1
Avast Win32:Malware-gen
Avira TR/Dldr.Upatre.NK
Baidu Win32.Trojan.Kryptik.my
BitDefender Gen:Trojan.Ipatre.1
BitDefenderTheta Gen:NN.ZexaF.34106.cu1@aS9CqnaG
CAT-QuickHeal Trojan.Kadena.B4
ClamAV Win.Downloader.Upatre-5744092-0
Comodo TrojWare.Win32.TrojanDownloader.Upatre.BLM@5tms2h
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.0468e7
Cylance Unsafe
Cyren W32/Upatre.CJ.gen!Eldorado
DrWeb Trojan.Upatre.6791
ESET-NOD32 a variant of Win32/Kryptik.DRXQ
Emsisoft Gen:Trojan.Ipatre.1 (B)
Endgame malicious (high confidence)
F-Prot W32/Upatre.CJ.gen!Eldorado
F-Secure Trojan.TR/Dldr.Upatre.NK
FireEye Generic.mg.cfda50f0468e7451
Fortinet W32/Kryptic.ABGK!tr
GData Win32.Trojan.Kryptik.CI
Ikarus Trojan.Upatre
Invincea heuristic
Jiangmin TrojanDownloader.Upatre.ruf
K7AntiVirus Trojan ( 004c9c831 )
K7GW Trojan ( 004c9c831 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=89)
Malwarebytes Trojan.Upatre
MaxSecure Trojan.Upatre.Gen
McAfee Upatre-FACH!CFDA50F0468E
McAfee-GW-Edition BehavesLike.Win32.IBryte.nm
MicroWorld-eScan Gen:Trojan.Ipatre.1
Microsoft TrojanDownloader:Win32/Upatre
NANO-Antivirus Trojan.Win32.Upatre.evxvxh
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM07.1.777D.Malware.Gen
Rising Trojan.Kryptik!1.A0CC (RDMK:cmRtazresfyZtBenkJqUn4HYB1qd)
SUPERAntiSpyware Trojan.Agent/Gen-Upatre
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Troj/Upatre-RD
连接到不再响应请求的 IP 地址(合法服务通常会保持运行) (2 个事件)
dead_host 176.36.251.208:443
dead_host 67.221.195.6:443
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2013-11-13 09:35:01

PE Imphash

8b4c9a264e863960b1c7f7e1b55093ea

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00002b10 0x00002c00 6.353124246500171
.rdata 0x00004000 0x00000a2e 0x00000c00 4.267369576271253
.data 0x00005000 0x00000354 0x00000200 1.6200108990318556
.rsrc 0x00006000 0x00004a88 0x00004c00 4.808147752251347
.reloc 0x0000b000 0x00000238 0x00000400 3.1326170554811865

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00006330 0x00004228 LANG_POLISH SUBLANG_DEFAULT None
RT_DIALOG 0x00006210 0x0000010a LANG_POLISH SUBLANG_DEFAULT None
RT_STRING 0x0000aa28 0x0000005c LANG_POLISH SUBLANG_DEFAULT None
RT_ACCELERATOR 0x00006320 0x00000010 LANG_POLISH SUBLANG_DEFAULT None
RT_GROUP_ICON 0x0000a558 0x00000014 LANG_POLISH SUBLANG_DEFAULT None
RT_VERSION 0x0000a570 0x000002a8 LANG_POLISH SUBLANG_DEFAULT None
RT_MANIFEST 0x0000a818 0x0000020c LANG_POLISH SUBLANG_DEFAULT None

Imports

Library USER32.dll:
0x404090 EndDialog
0x404094 DialogBoxParamA
0x404098 DestroyWindow
0x40409c DefWindowProcA
0x4040a0 SendMessageA
0x4040a4 PostMessageA
0x4040a8 BeginPaint
0x4040ac GetClientRect
0x4040b0 DrawTextA
0x4040b4 EndPaint
0x4040b8 PostQuitMessage
0x4040bc CreateWindowExA
0x4040c0 ShowWindow
0x4040c4 UpdateWindow
0x4040c8 LoadIconA
0x4040cc LoadCursorA
0x4040d0 RegisterClassExA
0x4040d4 LoadStringA
0x4040d8 GetMessageA
0x4040dc TranslateMessage
0x4040e0 DispatchMessageA
Library KERNEL32.dll:
0x404000 GetStartupInfoA
0x404004 GetModuleHandleA
0x404008 lstrlenA
0x404010 LoadLibraryA
0x404014 LoadResource
0x404018 LockResource
0x40401c FindResourceA
Library MSVCRT.dll:
0x404024 __p__commode
0x404028 _adjust_fdiv
0x40402c __setusermatherr
0x404030 _initterm
0x404034 __getmainargs
0x404038 __p__fmode
0x40403c exit
0x404040 _XcptFilter
0x404044 _exit
0x404048 ??2@YAPAXI@Z
0x40404c fputs
0x404050 strlen
0x404054 fprintf
0x404058 __set_app_type
0x40405c _except_handler3
0x404060 _controlfp
0x404064 _acmdln
0x404068 fputc
0x40406c fflush
0x404070 fgetc
0x404074 fclose
0x404078 _iob
0x40407c free
0x404080 malloc
0x404084 memmove
0x404088 memcmp

L!This program cannot be run in DOS mode.
7!Ticg
`.rdata
@.data
@.reloc
h3PuVF8%
]U jdhR@
jdh(R@
hSVWe3
EEP58S@
EPEPEP
0u>"u:Fu
<"u>"u
> vFuj
u"4kU}IPGB
LJ|T`p
Lzp !{
^^pA0q
x^|O%I
Zd|E`{
SmQL`p
GkqINg
S&JDU@
R*KDJ^P&c
N-KDJ^
:7 P0L[U\
goI`,KEJ]
goI`)JA\\
goI`'VGTA
goI`&J@Q]
?*VNwAMJ^
ORdxGP^
N.IBT@
T&IGT@
T0I[PoIrp
N(JDT^
PV0VGPA
goI`*IDJY
goI`)JGV]
?+VNwILP^
T,VDPoIrp
R&MCJ[
:7 R/VDT^
PW0J[U_
goI`.IDSY
<*VNwOGJX
</VNwNBJ]
ORdxGTA
9`nxums?
`nxum]
e`nxum'?
{`nxum1?
aDIOCAF&](
d*f& \.
W6\5`N
]v<E8To@*%0x\_=Ww&
^}e3u$
nxqd5<5}uh
O2-1|docD^N
x.1\.1
kEK:Qy`
7.g*#yF
Pxud>"~
Mj `#x
]qhQvzHxudH:it
6(6gyxuswEot
>("'TD@
*#yh(jFeCak
-8(IYfD'
8In1+s
moSXxu
cHW-gDw
$kx1!h
I f(1.Ds^u
T+*q\5
v=i^Oh
Z1y5e2
LWJ9Hzdn
)(#2<*F1>2
/6(6!VgH4|tB&
9^s6\5F
@v7gKE`j2
>[1]=w
\5(pD9
/yY%jU
94$0rI]imE+g
IR^u0gk))-Q
t4^*%X
"ueyLCmBb
:Xz(1&
EtXD!Nz^9<<\W*]
_]E0<e
3B[exu$>m=;
ud/eyLCmh
MW^uT(#
e}h_NT
IQudH:
]57<2N
$(_gt)-EUQE
FMu^FF#
NMIIII
Uirt^_@
WP-PYu
44yw94y
PT00ht
HGGuHHH
Au^H9EtYES
@@PVHu
GPFY*uA^_S
NSOWIADVHAIWIYJWXCDCOMOSVBDBCYBGVGLEVNIR
SaveCurren
MZ4PXGAOURRWOVIBFKGJNCLLGWXYDNXLUCHAYHPXBVCXLMSOHCR
UHCOCRSROROAFVKWKTIPMNUIQDTIQXCQQDMRISPRMCNSAUQAX
ARMKTCCLRQSIYTINYSSNKBCXRIEWBYMVS
Second Name
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
RegisterClassExA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
PostQuitMessage
EndPaint
DrawTextA
GetClientRect
BeginPaint
PostMessageA
SendMessageA
DefWindowProcA
DestroyWindow
DialogBoxParamA
EndDialog
USER32.dll
FindResourceA
LockResource
LoadResource
LoadLibraryA
GetCurrentDirectoryA
lstrlenA
KERNEL32.dll
fflush
fclose
malloc
memmove
memcmp
fprintf
strlen
??2@YAPAXI@Z
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
MSVCRT.dll
_controlfp
GetModuleHandleA
GetStartupInfoA
-H8">#",{
GWF90+J(2.?
H"1EG0$4
+L4HD9-
button
static
listbox
qezA6I>
A2WN6&
@,JCVL:'
6/=-7+
>92&ID
b[QD/'
;5XJme6'3*D8J=PF
D@.!VG]Gi_4!2$/(_^
3 wOJC6L?haYH
PI+"QI4%-
MImfTHG9A53,3+;-<.F9kb
oh,#6'(!
55VSpm
0$2$1!/$1'/'/(0$/$1!2!5"1$.'1#2$0$3(.'/%.)-'2'3#2'0%2 0$1$/3
)' 4#-
3&5$.&+') )
8$7 6#2', ,
2!8"3"-
& ) +!)
0 5 xo[L=*,
/6$YK1!*
,<.;;:
<)/0 1"-!8%F406&:(."*,)*
/!*+!+/ 6!0 .
, 1)0 2 1"1"1!/"+
=&:+0!-"/"8*=,<)7(6!7%8%5 2 / 2 0"2"1"1#0!0
=%y}zz~~~
.".$1#1$/"-
<%yqK:6%0!9+@3G4=&=/;-0&2$1#.#1#1#/#/ 1#2$1#1
2$2#1#.%7(1
;)>'8(7*aZG@?/TI1&1$2#-$1$2$1#1$.%2$5">%9;:
(!3#2%3&4#22%2#,
;*?5=+G:QEA0um; 5#5%22#4%24#2%4$3#6$;9:
,#3&3%5%2%2%2&5#3B/ZKB89+F7PC@1RB1!4#.$5#5%4%2$2$2&3%4#=$999
0#;$;"6&2%5%6%5$3$C+8:D=8.XGG8A0D6>-8'1%9$4%9$8-6&5%6&5$9"6#8!999
7/<*8(4&3'7/3&3%5
D)[MD:[IL8=-J5C2E<3'7,1(3%3&5&1&8-3&2'8$=$99;
/&7&6%6&7(8&6%7'8#E,F:A1?)<.5&3(5%3(5%/!6%5%3'9"9!898
6)B09*:*9*9)8(6
9'D*SHE0SE/
Q8='8'7%6%9)8*8,:+8)8)4(D2898
1%C39*8)8);*>,7':-9"wt~{fSM4<'<,si{qfJ48'7&F/}w~tm:);(:'9)<(9);(=(9)8(3'G5:99
;):)9'7'7&8&8'8*9*7&D1G5L;A2:*9':,9)@.G6A2F4@,8&:*C0:*A7G8A2B2B4>.9)B.9'@-A/;'9(A.A.@,<!H6898
/!6$8%9&8
6&7$7$6%705-3'OBUHS=T>TDOFPJOAQCSAU?UCSDUFQIOD[MWGRATDWETDVEWERBYKXHXJPAQ:_Q898
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.4.37"
processorArchitecture="X86"
name="Takenforex"
type="win32"/>
<description>Takenforex</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel
level="asInvoker"
uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
1-121:1S1]1y11111111
2+22292@2F2N2T2[2b2m2t2z222222222
3&363V3
I<h<<<<<<<
=X=^=y>?
k1v12N3Z3a3m333333333
434J4]4o4444444444
5.535;5@5\5b5k5r555555555555
646<6A6I6j6r6w6
666666666
7&7E7J7R7W7^7}7777777777777
8`9:::
33333333333333333
ing contextMenu
themes
Notepad++ style theme
plugins
Notepad++ plugin
-options
-verbose -v
gup.exe
updater
http://sourceforge.net/apps/mediawiki/notepad-plus/index.php?title=Plugin_Central
http://sourceforge.net/forum/?group_id=95717
http://npp-community.tuxfamily.org/
http://sourceforge.net/projects/notepad-plus/
doesn't exist.
Rndo Abil
ity Waning
nmultiInst -nosession -openSession
Session
About Takenforex
System
Takenforex Version 1.12
Copyright (C) 2014
VS_VERSION_INFO
StringFileInfo
048AC6B0
CompanyName
Takenforex
FileDescription
Takenforex
FileVersion
1.1.2.12
InternalName
Takenforex Internal
LegalCopyright
LegalTrademarks
OriginalFilename
ProductName
Takenforex
ProductVersion
VarFileInfo
Translation
Takenforex
Takenforex
Takenforex
C:\fe4e5ee61ff1b2b4f3b10beb84f2e334201a2f36879e8d7eb2d29ae0d6441985
C:\U5TFvbT9.exe
C:\97feed6354345d04a873aabbbe8342266b05c71e3b474d2d0fa5bb30ab77b445
C:\yLggcroA.exe
C:\EFyrciym.exe
C:\kXY_WA6n.exe
C:\609894a890a052955b1301b408e410e94a83266cb5e7f81104bde2147f2bd92d
C:\jfP4zBXi.exe
C:\rwG_CWjs.exe
C:\Users\Johnny Cage\Desktop\oUcewEw6R0.exe
C:\Users\admin\Downloads\file.exe
C:\Users\Petra\AppData\Local\Temp\cadvahin.pe32
C:\Users\admin\Downloads\92758eb380282b7d_cadvahin.exe
C:\c5a3887bee77577ebaf80727e3138f14c0d57f787f7fb1e7de7352e448c59247
C:\Users\admin\Downloads\cadvahin.exe
C:\7a7cd1206f3a151c6ab512ca5974b741e41cba6a3618bf82320eed9e1650cb6c
C:\ad6474d621e1cca708becdaefd1064e590d71ae77057c7b6637011b22bb5de86
C:\4946f2715bcb39135ed0da32ddb9bf963b7731f198dc363245517cd87f764e17
C:\989021907289c939699280a1ff1d5bede37948cd0d28d003eec9fadba8988bd8
C:\Users\admin\Downloads\cadvahin.exe
C:\Users\admin\Downloads\5171ad05cf090ac228419f1501a98ca19fd04a2c8e5594fb0d8c530d535a6f71.exe
C:\Users\admin\Downloads\2ad5b20d0e3aa2242bd982f1d7372c5441c282e2d13c3b22d4e760d15c6c868b.exe
C:\Users\admin\Downloads\f581a2113dcaad17eec49df78e8f5fb9c2a72690e9b70b7295f096529ac95458.exe
C:\7036e90a441e43ee82589dc2fd50c238280a6607cee3de384d74a998416d336a
C:\Users\admin\Downloads\cadvahin.exe
C:\Users\admin\Downloads\34abb99fcf98452151eaad562b01a2051f6735f5159089dbd447e2adf5642641.exe
C:\Users\admin\Downloads\063e09a071e8b80380ca1811a9fee8febb14c7d7f047156ca851466df11b8ec5.exe
C:\Users\Petra\AppData\Local\Temp\cadvahin.pe32
C:\Users\admin\Downloads\acdfec67f71e63d9_cadvahin.exe
C:\Users\admin\Downloads\cb55c6c5dfbfbb9f4d7b205d785e4cac00e900b60ec0355bf0510c0a36bacb27.exe
C:\Users\admin\Downloads\f11addc79dc5cd4a21555172dd7b399bf4b6b7fdc29ae71c3ca287b98f736cae.exe
C:\ac97b348d20887a5a01e21590850556148822394d87e3305644383269fdeaa0f
C:\Users\admin\Downloads\cadvahin.exe
C:\5814d49f7efced78f4e1a8b59be6250af50b1fe9157485c70822d542ee223858
C:\b9486bb1c3fa2d9a1ad0db2e11b4ffd30b90dff4c0e7e268e9208ce22d9666f9
C:\7c7687e373047f2c9d8896f58ee70f8ef384a539e89c7afe7578367063f154f8
C:\Users\admin\Downloads\cadvahin.exe
C:\8fdc885e1829a73c5769336531ac8c55cff5c6b6de71cb901feb7213ee4d76ff
C:\4cd7f285dfc6c02e88d4a32be47522cfb5122bf385907f2d4321d14a1f4bf6bc
C:\Users\admin\Downloads\cadvahin.exe

Process Tree


0898235485dede55387d73941835104b6523b91967ae1974d8e880b8895de850.exe, PID: 844, Parent PID: 1860

default registry file network process services synchronisation iexplore office pdf

cadvahin.exe, PID: 920, Parent PID: 844

default registry file network process services synchronisation iexplore office pdf

TCP

Source Source Port Destination Destination Port
192.168.56.101 49164 158.101.44.242 checkip.dyndns.org 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

Source Destination ICMP Type Data
69.163.81.211 192.168.56.101 3
69.163.81.211 192.168.56.101 3

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 628c6eb7d6b84ed9_cadvahin.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\cadvahin.exe
Size 40.2KB
Processes 844 (0898235485dede55387d73941835104b6523b91967ae1974d8e880b8895de850.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 3bd796805e626c5136123a54f2694d14
SHA1 409614ab3e826c70b437bcd5f774c0ef3e53cf99
SHA256 628c6eb7d6b84ed976403106055df48cebc2f5cf1a05437f7bc033d1fc3b5f19
CRC32 010B55CE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.