3.4
中危

648fa862ce3d2230c2754a31f45d20b74f70d8648a9ad5897ba0d6a35627b592

d1a2a3ef3ed6f8d5e78511e65c3f560c.exe

分析耗时

76s

最近分析

文件大小

625.0KB
静态报毒 动态报毒 AI SCORE=83 ARTEMIS CLOUD CONFIDENCE EQBR GDSDA GENERICKD GENKRYPTIK HIGH CONFIDENCE HRMMRM ICEDID KRYPTIK LFFMA NU0@AKFBIJNI R002C0DHB20 SCORE SLEPAK SUSGEN TROJANBANKER TWPT UMAL UNSAFE WQMK WWYHQ@0 ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!D1A2A3EF3ED6 20200823 6.0.6.653
Alibaba TrojanBanker:Win32/IcedID.bdc05119 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_60% (W) 20190702 1.0
Avast Win32:Malware-gen 20200823 18.4.3895.0
Tencent Win32.Trojan-banker.Icedid.Wqmk 20200823 1.0.0.1
Baidu 20190318 1.0.0.2
Kingsoft 20200823 2013.8.14.323
静态指标
This executable has a PDB path (1 个事件)
pdb_path c:\listclimb\AlwaysBuy\experienceSupport\GovernWrote\Bothbefore\completehopeFlower.pdb
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1619910868.287269
GlobalMemoryStatusEx
success 1 0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (4 个事件)
Time & API Arguments Status Return Repeated
1619910868.240269
NtProtectVirtualMemory
process_identifier: 2996
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x000d9000
success 0 0
1619910868.240269
NtAllocateVirtualMemory
process_identifier: 2996
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x02410000
success 0 0
1619910868.240269
NtAllocateVirtualMemory
process_identifier: 2996
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x02420000
success 0 0
1619910868.240269
NtAllocateVirtualMemory
process_identifier: 2996
region_size: 24576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x02430000
success 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Generates some ICMP traffic
File has been identified by 49 AntiVirus engines on VirusTotal as malicious (49 个事件)
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.34335134
FireEye Generic.mg.d1a2a3ef3ed6f8d5
McAfee Artemis!D1A2A3EF3ED6
Cylance Unsafe
Zillya Trojan.Slepak.Win32.60
K7AntiVirus Trojan ( 0056c5491 )
Alibaba TrojanBanker:Win32/IcedID.bdc05119
K7GW Trojan ( 0056c5491 )
CrowdStrike win/malicious_confidence_60% (W)
Arcabit Trojan.Generic.D20BE99E
BitDefenderTheta Gen:NN.ZexaF.34186.Nu0@aKFbIjni
Symantec Trojan Horse
ESET-NOD32 a variant of Win32/GenKryptik.EQBR
TrendMicro-HouseCall TROJ_GEN.R002C0DHB20
Paloalto generic.ml
Kaspersky Trojan-Banker.Win32.IcedID.twpt
BitDefender Trojan.GenericKD.34335134
NANO-Antivirus Trojan.Win32.Slepak.hrmmrm
ViRobot Trojan.Win32.Z.Icedid.640000
Avast Win32:Malware-gen
Tencent Win32.Trojan-banker.Icedid.Wqmk
Ad-Aware Trojan.GenericKD.34335134
Emsisoft Trojan.GenericKD.34335134 (B)
Comodo TrojWare.Win32.UMal.wwyhq@0
F-Secure Trojan.TR/Kryptik.lffma
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R002C0DHB20
Sophos Mal/Generic-S
Jiangmin Trojan.Banker.IcedID.ou
MaxSecure Trojan.Malware.104933079.susgen
Avira TR/Kryptik.lffma
MAX malware (ai score=83)
Antiy-AVL Trojan/Win32.GenKryptik
Microsoft Trojan:Win32/IcedId.VSC!MTB
AegisLab Trojan.Win32.IcedID.7!c
ZoneAlarm Trojan-Banker.Win32.IcedID.twpt
GData Trojan.GenericKD.34335134
Cynet Malicious (score: 85)
ALYac Trojan.IcedID.gen
Malwarebytes Trojan.MalPack
APEX Malicious
Rising Trojan.GenKryptik!8.AA55 (CLOUD)
Ikarus Trojan-Banker.IcedID
Fortinet W32/GenKryptik.EQBR!tr
Webroot W32.Trojan.Gen
AVG Win32:Malware-gen
Panda Trj/GdSda.A
Qihoo-360 Win32/Trojan.abe
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2015-05-08 21:30:58

Imports

Library KERNEL32.dll:
0x105a0c8 CreateFileMappingA
0x105a0cc MapViewOfFile
0x105a0d0 UnmapViewOfFile
0x105a0d4 OpenEventA
0x105a0d8 GetConsoleOutputCP
0x105a0dc WriteConsoleA
0x105a0e0 SetStdHandle
0x105a0e4 GetConsoleMode
0x105a0e8 GetConsoleCP
0x105a0ec LCMapStringW
0x105a0f0 LCMapStringA
0x105a0f4 GetStringTypeA
0x105a0fc LoadLibraryW
0x105a100 HeapReAlloc
0x105a104 HeapSize
0x105a108 HeapAlloc
0x105a10c VirtualFree
0x105a110 HeapFree
0x105a114 HeapCreate
0x105a118 HeapDestroy
0x105a11c SetHandleCount
0x105a128 GetEnvironmentStrings
0x105a134 GetTickCount
0x105a13c IsValidCodePage
0x105a140 GetACP
0x105a144 IsDebuggerPresent
0x105a150 TerminateProcess
0x105a154 OutputDebugStringW
0x105a158 GetFileType
0x105a15c WriteConsoleW
0x105a160 OutputDebugStringA
0x105a164 GetStdHandle
0x105a168 DebugBreak
0x105a16c ExitProcess
0x105a170 GetSystemInfo
0x105a174 VirtualAlloc
0x105a178 RaiseException
0x105a17c RtlUnwind
0x105a180 IsBadReadPtr
0x105a184 HeapValidate
0x105a188 GetStartupInfoA
0x105a18c GetCommandLineA
0x105a190 FlushFileBuffers
0x105a194 SetFilePointer
0x105a198 WriteFile
0x105a19c CreateFileA
0x105a1a0 GetCurrentProcess
0x105a1a4 GetModuleHandleW
0x105a1a8 InterlockedIncrement
0x105a1ac GetCurrentThread
0x105a1b0 GetLocaleInfoA
0x105a1b4 GetOEMCP
0x105a1b8 GetCPInfo
0x105a1bc GlobalFlags
0x105a1c0 lstrcmpA
0x105a1c4 FormatMessageA
0x105a1c8 SetEvent
0x105a1cc CloseHandle
0x105a1d0 CompareStringA
0x105a1d4 MultiByteToWideChar
0x105a1d8 LoadLibraryA
0x105a1dc lstrcmpW
0x105a1e0 GetCurrentThreadId
0x105a1e4 GlobalAddAtomA
0x105a1e8 GlobalFindAtomA
0x105a1ec GlobalDeleteAtom
0x105a1f0 GetVersionExA
0x105a1f4 GetCurrentProcessId
0x105a1f8 TlsGetValue
0x105a1fc LocalReAlloc
0x105a200 TlsSetValue
0x105a204 GlobalAlloc
0x105a208 GlobalReAlloc
0x105a20c GlobalLock
0x105a210 TlsFree
0x105a214 GlobalHandle
0x105a218 GetWindowsDirectoryA
0x105a21c GlobalUnlock
0x105a220 GlobalFree
0x105a224 TlsAlloc
0x105a228 LocalAlloc
0x105a22c LocalFree
0x105a230 LoadResource
0x105a234 LockResource
0x105a238 SizeofResource
0x105a23c FindResourceA
0x105a240 FreeLibrary
0x105a244 InterlockedDecrement
0x105a248 GetModuleFileNameW
0x105a24c EnterCriticalSection
0x105a250 LeaveCriticalSection
0x105a254 DeleteCriticalSection
0x105a25c WideCharToMultiByte
0x105a260 lstrlenA
0x105a264 GetModuleHandleA
0x105a268 GetProcAddress
0x105a26c GetAtomNameA
0x105a270 GlobalGetAtomNameA
0x105a274 GetLastError
0x105a278 SetLastError
0x105a27c GetTempPathA
0x105a280 VirtualProtect
0x105a288 GetModuleFileNameA
0x105a290 Sleep
0x105a294 GetStringTypeW
Library USER32.dll:
0x105a2e0 ShowOwnedPopups
0x105a2e4 IsWindowVisible
0x105a2e8 InvalidateRect
0x105a2ec UpdateWindow
0x105a2f0 BringWindowToTop
0x105a2f8 GetDesktopWindow
0x105a2fc GetActiveWindow
0x105a300 GetWindowDC
0x105a304 GetDC
0x105a308 LoadMenuA
0x105a30c SetMenuItemBitmaps
0x105a310 ModifyMenuA
0x105a314 InsertMenuItemA
0x105a318 GetSubMenu
0x105a31c GetMenuItemInfoA
0x105a320 GetMenuState
0x105a324 GetMenuItemID
0x105a328 GetMenuItemCount
0x105a32c EnableMenuItem
0x105a330 CheckMenuItem
0x105a334 IsMenu
0x105a338 CreatePopupMenu
0x105a33c GrayStringA
0x105a340 DrawTextExA
0x105a344 FillRect
0x105a348 LoadBitmapA
0x105a34c GetSysColorBrush
0x105a350 ValidateRect
0x105a354 CreateWindowExA
0x105a358 GetClassInfoA
0x105a35c LoadIconA
0x105a360 GetClientRect
0x105a364 MapWindowPoints
0x105a368 GetSysColor
0x105a36c DispatchMessageA
0x105a370 GetFocus
0x105a374 SetActiveWindow
0x105a378 SetFocus
0x105a37c AdjustWindowRectEx
0x105a380 EqualRect
0x105a384 DeferWindowPos
0x105a388 BeginDeferWindowPos
0x105a38c CopyRect
0x105a390 EndDeferWindowPos
0x105a394 GetTopWindow
0x105a398 GetWindow
0x105a39c GetCapture
0x105a3a0 WinHelpA
0x105a3a4 TrackPopupMenu
0x105a3a8 GetDlgItem
0x105a3ac GetWindowTextA
0x105a3b0 GetKeyState
0x105a3b4 DestroyWindow
0x105a3b8 GetDlgCtrlID
0x105a3bc SetWindowsHookExA
0x105a3c0 GetClassLongA
0x105a3c4 GetClassNameA
0x105a3c8 SetPropA
0x105a3cc GetPropA
0x105a3d0 CallWindowProcA
0x105a3d4 RemovePropA
0x105a3d8 SetMenu
0x105a3dc GetMenu
0x105a3e0 GetMessageTime
0x105a3e4 GetMessagePos
0x105a3e8 SetWindowLongA
0x105a3ec SetWindowPos
0x105a3f0 OffsetRect
0x105a3f4 IntersectRect
0x105a3f8 IsIconic
0x105a3fc GetWindowPlacement
0x105a400 GetWindowRect
0x105a404 GetSystemMetrics
0x105a408 MessageBoxA
0x105a40c GetParent
0x105a410 GetLastActivePopup
0x105a414 IsWindowEnabled
0x105a418 EnableWindow
0x105a420 TabbedTextOutA
0x105a424 PostMessageA
0x105a428 SendMessageA
0x105a42c IsWindow
0x105a430 UnhookWindowsHookEx
0x105a434 PeekMessageA
0x105a438 PostQuitMessage
0x105a43c SystemParametersInfoA
0x105a440 FrameRect
0x105a444 DefWindowProcA
0x105a448 ReleaseDC
0x105a44c GetWindowLongA
0x105a450 SetForegroundWindow
0x105a454 EnumWindows
0x105a458 GetWindowTextLengthA
0x105a45c CallNextHookEx
0x105a460 DrawTextA
0x105a464 GetForegroundWindow
0x105a468 GetClassInfoExA
0x105a46c RegisterClassExA
0x105a470 ScreenToClient
0x105a474 ClientToScreen
0x105a478 RegisterClassA
0x105a47c InflateRect
0x105a480 PtInRect
0x105a488 UnpackDDElParam
0x105a48c ReuseDDElParam
0x105a490 DestroyMenu
0x105a494 TranslateAcceleratorA
0x105a498 LoadAcceleratorsA
0x105a49c ReleaseCapture
0x105a4a0 SetCursor
0x105a4a4 SetRectEmpty
0x105a4a8 ShowWindow
0x105a4ac SetWindowTextA
0x105a4b0 LoadCursorA
Library GDI32.dll:
0x105a034 SetWindowExtEx
0x105a038 LineTo
0x105a03c ScaleViewportExtEx
0x105a040 OffsetViewportOrgEx
0x105a044 SetTextColor
0x105a048 GetClipBox
0x105a04c IntersectClipRect
0x105a050 SetViewportExtEx
0x105a054 DeleteObject
0x105a058 ExtTextOutA
0x105a05c SetBkMode
0x105a060 SetBkColor
0x105a064 GetObjectA
0x105a068 GetStockObject
0x105a06c GetObjectType
0x105a070 CreateSolidBrush
0x105a074 CreatePatternBrush
0x105a078 CreateFontIndirectA
0x105a07c CreateBitmap
0x105a084 CreateCompatibleDC
0x105a088 GetDeviceCaps
0x105a08c SelectObject
0x105a090 PtVisible
0x105a094 RectVisible
0x105a098 BitBlt
0x105a09c GetPixel
0x105a0a0 TextOutA
0x105a0a4 GetTextExtentPoint32A
0x105a0a8 Escape
0x105a0ac DeleteDC
0x105a0b0 SaveDC
0x105a0b4 RestoreDC
0x105a0b8 SetMapMode
0x105a0bc SetViewportOrgEx
0x105a0c0 ScaleWindowExtEx
Library ole32.dll:
0x105a4cc StringFromCLSID
0x105a4d0 CoTaskMemFree
0x105a4d4 CoInitialize
0x105a4d8 CoUninitialize
0x105a4dc CoTaskMemAlloc
Library OLEAUT32.dll:
0x105a2a8 VariantInit
0x105a2ac VariantChangeType
0x105a2b0 VariantClear
Library SHLWAPI.dll:
0x105a2c4 UrlApplySchemeA
0x105a2c8 SHGetValueA
0x105a2cc UrlCreateFromPathA
0x105a2d0 PathFindFileNameA
Library urlmon.dll:
0x105a4e4 CoInternetCompareUrl
0x105a4ec URLDownloadToFileA
0x105a4f0 CoInternetCombineUrl
Library AVIFIL32.dll:
0x105a01c AVIFileInit
0x105a020 AVIStreamRelease
0x105a024 AVIFileExit
0x105a028 AVIStreamTimeToSample
Library SensApi.dll:
0x105a2d8 IsNetworkAlive
Library WINSPOOL.DRV:
0x105a4bc DocumentPropertiesA
0x105a4c0 OpenPrinterA
0x105a4c4 ClosePrinter
Library OLEACC.dll:
0x105a2a0 LresultFromObject
Library SHELL32.dll:
0x105a2b8 DragFinish
0x105a2bc DragQueryFileA
Library ADVAPI32.dll:
0x105a000 RegOpenKeyExA
0x105a004 RegCloseKey
0x105a008 OpenThreadToken
0x105a00c RevertToSelf
0x105a010 SetThreadToken
0x105a014 RegQueryValueExA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57874 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 50537 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.