4.8
中危

fcdd28b9804876a31715fb5d70471924f2c92873520af6e6eaf58c38aed2bae5

d53520d59d4a03404e4807921eae4c6e.exe

分析耗时

108s

最近分析

文件大小

17.5MB
静态报毒 动态报毒
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
未检测 暂无反病毒引擎检测结果
静态指标
This executable is signed
This executable has a PDB path (1 个事件)
pdb_path e:\DUOWAN_BUILD\build\Build_Src\yymixer\yymixer_3.6.0.0_fb\packages\tool\setupv2\bin\YYMixerSetup.pdb
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1620928336.54475
GlobalMemoryStatusEx
success 1 0
The file contains an unknown PE resource name possibly indicative of a packer (1 个事件)
resource name ZIP
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (2 个事件)
Time & API Arguments Status Return Repeated
1620928336.48175
NtAllocateVirtualMemory
process_identifier: 1176
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00a20000
success 0 0
1620927975.407021
NtAllocateVirtualMemory
process_identifier: 1424
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00000000041d0000
success 0 0
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Foreign language identified in PE resource (8 个事件)
name ZIP language LANG_CHINESE offset 0x000cf240 filetype 7-zip archive data, version 0.3 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x010974b5
name RT_ICON language LANG_CHINESE offset 0x0117e798 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0117e798 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0117e798 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0117e798 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0117e798 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_GROUP_ICON language LANG_CHINESE offset 0x0117ec00 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000004c
name RT_VERSION language LANG_CHINESE offset 0x0117ec4c filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000238
Creates a shortcut to an executable file (1 个事件)
file C:\Users\Public\Desktop\Google Chrome.lnk
Drops an executable to the user AppData folder (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\duowan\yymixer\Check\YYVirtualCam.ax
The binary likely contains encrypted or compressed data indicative of a packer (3 个事件)
entropy 7.850259314779818 section {'size_of_data': '0x00036e00', 'virtual_address': '0x0008e000', 'entropy': 7.850259314779818, 'name': '.data', 'virtual_size': '0x000408c0'} description A section with a high entropy has been found
entropy 7.999609497156091 section {'size_of_data': '0x010b0200', 'virtual_address': '0x000cf000', 'entropy': 7.999609497156091, 'name': '.rsrc', 'virtual_size': '0x010b00fc'} description A section with a high entropy has been found
entropy 0.9645563976816763 description Overall entropy of this PE file is high
Checks for the Locally Unique Identifier on the system for a suspicious privilege (43 个事件)
Time & API Arguments Status Return Repeated
1620928338.82575
LookupPrivilegeValueW
system_name:
privilege_name: SeTakeOwnershipPrivilege
success 1 0
1620928338.82575
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.84075
LookupPrivilegeValueW
system_name:
privilege_name: SeTakeOwnershipPrivilege
success 1 0
1620928338.84075
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.84075
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.84075
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.85675
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.85675
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.85675
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.87275
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.87275
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.87275
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.87275
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.87275
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.87275
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.87275
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.88775
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.88775
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.88775
LookupPrivilegeValueW
system_name:
privilege_name: SeTakeOwnershipPrivilege
success 1 0
1620928338.88775
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.90375
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.90375
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.90375
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.91975
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.91975
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.91975
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.91975
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.91975
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.91975
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.93475
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.93475
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.93475
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.93475
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.93475
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.93475
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.93475
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.95075
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.95075
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.95075
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.95075
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.95075
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.96575
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620928338.96575
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Creates a windows hook that monitors keyboard input (keylogger) (1 个事件)
Time & API Arguments Status Return Repeated
1620927918.907021
SetWindowsHookExW
thread_identifier: 0
callback_function: 0x00000000ff35ae10
module_address: 0x00000000ff2b0000
hook_identifier: 13 (WH_KEYBOARD_LL)
success 1966509 0
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2017-05-10 14:45:37

Imports

Library WININET.dll:
0x47b404 HttpSendRequestExW
0x47b408 InternetCrackUrlW
0x47b40c InternetWriteFile
0x47b410 HttpOpenRequestW
0x47b414 HttpQueryInfoW
0x47b418 HttpSendRequestW
0x47b41c InternetReadFile
0x47b420 HttpEndRequestW
0x47b424 InternetSetOptionW
0x47b428 InternetConnectW
0x47b42c InternetCloseHandle
0x47b430 InternetOpenW
Library KERNEL32.dll:
0x47b074 MoveFileExW
0x47b078 DeleteFileW
0x47b07c RemoveDirectoryW
0x47b080 CreateMutexW
0x47b084 GetModuleFileNameW
0x47b088 GetCommandLineW
0x47b08c CreateProcessW
0x47b090 WideCharToMultiByte
0x47b094 FindClose
0x47b098 FindNextFileW
0x47b09c FindFirstFileW
0x47b0a0 WinExec
0x47b0a4 MultiByteToWideChar
0x47b0ac TerminateProcess
0x47b0b0 OpenProcess
0x47b0b4 SizeofResource
0x47b0b8 LoadResource
0x47b0bc FindResourceW
0x47b0c0 FreeResource
0x47b0c4 Process32NextW
0x47b0c8 Module32FirstW
0x47b0cc Process32FirstW
0x47b0d4 LockResource
0x47b0d8 Sleep
0x47b0dc OpenEventW
0x47b0e0 RaiseException
0x47b0e4 FindResourceExW
0x47b0e8 MoveFileW
0x47b0ec FreeLibrary
0x47b0f0 GetProcAddress
0x47b0f4 LoadLibraryW
0x47b0f8 LocalFree
0x47b0fc GetCurrentProcess
0x47b100 DuplicateHandle
0x47b104 CopyFileW
0x47b108 Module32NextW
0x47b10c lstrcmpiW
0x47b110 GetDiskFreeSpaceExW
0x47b114 CreateDirectoryW
0x47b118 GetPriorityClass
0x47b11c lstrlenW
0x47b124 VirtualAlloc
0x47b128 DebugBreak
0x47b12c IsBadReadPtr
0x47b13c GetFileAttributesW
0x47b140 SetFilePointerEx
0x47b148 OutputDebugStringW
0x47b150 GetCurrentThreadId
0x47b154 LoadLibraryExW
0x47b15c SetLastError
0x47b160 GetTickCount
0x47b164 LoadLibraryA
0x47b168 GlobalUnlock
0x47b16c GlobalLock
0x47b170 GlobalAlloc
0x47b174 GlobalFree
0x47b178 GetLocalTime
0x47b184 SetEndOfFile
0x47b188 HeapFree
0x47b18c ExitThread
0x47b190 CreateThread
0x47b19c IsDebuggerPresent
0x47b1a4 GetStartupInfoW
0x47b1a8 HeapSize
0x47b1ac HeapReAlloc
0x47b1b0 VirtualFree
0x47b1b4 HeapCreate
0x47b1b8 HeapDestroy
0x47b1bc ExitProcess
0x47b1c0 GetStdHandle
0x47b1c4 GetModuleFileNameA
0x47b1c8 TlsGetValue
0x47b1cc TlsAlloc
0x47b1d0 TlsSetValue
0x47b1d4 TlsFree
0x47b1d8 GetCPInfo
0x47b1dc GetACP
0x47b1e0 GetOEMCP
0x47b1e4 IsValidCodePage
0x47b1e8 SetHandleCount
0x47b1ec GetFileType
0x47b1f0 GetStartupInfoA
0x47b1f4 RtlUnwind
0x47b1f8 GetConsoleCP
0x47b1fc HeapAlloc
0x47b200 GetConsoleMode
0x47b204 GetModuleHandleA
0x47b208 LCMapStringW
0x47b218 GetCurrentProcessId
0x47b21c LCMapStringA
0x47b224 InterlockedExchange
0x47b228 GetLocaleInfoW
0x47b22c GetLocaleInfoA
0x47b230 GetStringTypeA
0x47b234 GetStringTypeW
0x47b238 GetUserDefaultLCID
0x47b23c ResumeThread
0x47b240 WaitForSingleObject
0x47b244 SetFilePointer
0x47b248 WriteFile
0x47b24c ReadFile
0x47b250 CloseHandle
0x47b254 CreateFileW
0x47b258 CreateFileA
0x47b25c GetLastError
0x47b260 EnumSystemLocalesA
0x47b264 IsValidLocale
0x47b268 SetStdHandle
0x47b26c FlushFileBuffers
0x47b270 WriteConsoleA
0x47b274 GetConsoleOutputCP
0x47b278 WriteConsoleW
0x47b280 GetProcessHeap
0x47b284 CompareStringA
0x47b288 CompareStringW
0x47b294 GetModuleHandleW
Library USER32.dll:
0x47b2e4 SetClassLongW
0x47b2e8 LoadIconW
0x47b2ec GetParent
0x47b2f0 GetWindow
0x47b2f4 MonitorFromWindow
0x47b2f8 GetMonitorInfoW
0x47b300 InvalidateRect
0x47b304 UpdateLayeredWindow
0x47b308 EndPaint
0x47b30c BeginPaint
0x47b310 GetUpdateRect
0x47b314 SetCapture
0x47b318 ReleaseCapture
0x47b320 CloseClipboard
0x47b324 MapWindowPoints
0x47b328 IsWindow
0x47b32c SendMessageW
0x47b330 SetActiveWindow
0x47b334 EmptyClipboard
0x47b338 OpenClipboard
0x47b33c UnregisterClassA
0x47b340 GetClipboardData
0x47b344 ShowWindow
0x47b348 GetClientRect
0x47b34c GetWindowRect
0x47b350 SetWindowPos
0x47b354 SetWindowTextW
0x47b35c SetClipboardData
0x47b360 SetClipboardViewer
0x47b364 GetActiveWindow
0x47b368 CallWindowProcW
0x47b36c CreateWindowExW
0x47b370 RegisterClassExW
0x47b374 DefWindowProcW
0x47b378 GetClassInfoExW
0x47b37c KillTimer
0x47b380 SetTimer
0x47b384 ScreenToClient
0x47b388 ClientToScreen
0x47b38c DestroyWindow
0x47b390 CharNextW
0x47b394 PeekMessageW
0x47b398 GetMessageW
0x47b39c TranslateMessage
0x47b3a0 DispatchMessageW
0x47b3a4 GetCursor
0x47b3a8 SetCursor
0x47b3ac DestroyCursor
0x47b3b0 LoadImageW
0x47b3b4 GetKeyState
0x47b3b8 GetWindowLongW
0x47b3bc SetWindowLongW
0x47b3c0 IsZoomed
0x47b3c4 EnumWindows
0x47b3cc GetClassNameW
0x47b3d0 GetDC
0x47b3d4 ReleaseDC
0x47b3d8 PostMessageW
0x47b3dc PostQuitMessage
0x47b3e0 GetSystemMenu
0x47b3e4 EnableMenuItem
0x47b3e8 MessageBoxW
0x47b3ec LoadCursorW
Library GDI32.dll:
0x47b048 CreateDIBSection
0x47b04c SelectObject
0x47b050 CreateRoundRectRgn
0x47b054 CreateCompatibleDC
0x47b058 DeleteDC
0x47b05c EnumFontFamiliesW
0x47b060 DeleteObject
0x47b064 BitBlt
Library ADVAPI32.dll:
0x47b000 RegQueryValueExW
0x47b004 RegEnumKeyExW
0x47b008 RegQueryInfoKeyW
0x47b00c RegCreateKeyExW
0x47b010 RegDeleteValueW
0x47b014 RegDeleteKeyW
0x47b018 GetTokenInformation
0x47b01c OpenProcessToken
0x47b020 RegCloseKey
0x47b024 RegSetValueExW
0x47b028 RegCreateKeyW
0x47b02c RegOpenKeyExW
0x47b030 RegOpenKeyW
0x47b034 SetSecurityInfo
0x47b038 SetEntriesInAclW
Library SHELL32.dll:
0x47b2ac SHFileOperationW
0x47b2b8
0x47b2bc DragFinish
0x47b2c0 DragAcceptFiles
0x47b2c8 ShellExecuteW
Library ole32.dll:
0x47b540 CoCreateInstance
0x47b544 CoUninitialize
0x47b548 CoInitialize
0x47b54c CoTaskMemAlloc
0x47b550 CoTaskMemRealloc
0x47b558 CoTaskMemFree
Library OLEAUT32.dll:
0x47b2a0 VariantInit
0x47b2a4 VarUI4FromStr
Library VERSION.dll:
0x47b3f4 GetFileVersionInfoW
0x47b3f8 VerQueryValueW
Library SHLWAPI.dll:
0x47b2d0 PathFindFileNameW
0x47b2d4 PathRemoveFileSpecW
0x47b2d8 PathAppendW
0x47b2dc PathFileExistsW
Library gdiplus.dll:
0x47b438 GdipDrawLine
0x47b43c GdipDrawRectangle
0x47b440 GdipFillRectangle
0x47b444 GdipDrawString
0x47b448 GdipDrawImageRect
0x47b450 GdipSetClipRect
0x47b454 GdipSetClipRegion
0x47b458 GdipSaveGraphics
0x47b45c GdipRestoreGraphics
0x47b460 GdipCloneBrush
0x47b464 GdipCloneRegion
0x47b46c GdipDeleteRegion
0x47b470 GdipCloneImage
0x47b484 GdipGetPropertyItem
0x47b49c GdipGetImageHeight
0x47b4a0 GdipGetImageWidth
0x47b4a4 GdipDisposeImage
0x47b4a8 GdipFree
0x47b4ac GdipAlloc
0x47b4b0 GdipCreateFont
0x47b4b4 GdipMeasureString
0x47b4c4 GdipCreateFromHDC
0x47b4d0 GdipDeleteFont
0x47b4dc GdipDeleteGraphics
0x47b4ec GdipCreateSolidFill
0x47b4f4 GdipCreateMatrix
0x47b504 GdipDeletePen
0x47b508 GdipCreatePen1
0x47b50c GdipDeleteBrush
0x47b510 GdipDeleteMatrix
0x47b518 GdipGraphicsClear
0x47b530 GdiplusShutdown
0x47b538 GdiplusStartup

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 57874 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.