3.3
中危

0a10309fcf649bcbfac3635685a48a79b214d755d6399195ab651eb5cd346915

0a10309fcf649bcbfac3635685a48a79b214d755d6399195ab651eb5cd346915.exe

分析耗时

135s

最近分析

378天前

文件大小

30.2KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.59
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanDownloader:Win32/Upatre.2dba4896 20190527 0.3.0.5
Avast Win32:Agent-ASSU [Trj] 20240214 23.9.8494.0
Baidu Win32.Trojan-Downloader.Waski.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20231026 1.0
Kingsoft malware.kb.a.1000 20230906 None
McAfee Downloader-FSH 20240214 6.0.6.653
Tencent Trojan.Win32.Downloader.wc 20240214 1.0.0.1
静态指标
检查进程是否被调试器调试 (2 个事件)
Time & API Arguments Status Return Repeated
1727545322.344
IsDebuggerPresent
failed 0 0
1727545322.749875
IsDebuggerPresent
failed 0 0
行为判定
动态指标
分配可读-可写-可执行内存(通常用于自解压) (2 个事件)
Time & API Arguments Status Return Repeated
1727545322.422
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00401000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2108
success 0 0
1727545322.811875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00401000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1640
success 0 0
在文件系统上创建可执行文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\ieupdate.exe
投放一个二进制文件并执行它 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\ieupdate.exe
将可执行文件投放到用户的 AppData 文件夹 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\ieupdate.exe
一个进程创建了一个隐藏窗口 (1 个事件)
Time & API Arguments Status Return Repeated
1727545322.594
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\ieupdate.exe
filepath_r: C:\Users\ADMINI~1\AppData\Local\Temp\ieupdate.exe
parameters:
show_type: 0
success 1 0
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (2 个事件)
section {'name': '.text', 'virtual_address': '0x00001000', 'virtual_size': '0x00001093', 'size_of_data': '0x00001200', 'entropy': 6.830787879047037} entropy 6.830787879047037 description 发现高熵的节
entropy 0.3103448275862069 description 此PE文件的整体熵值较高
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
生成一些 ICMP 流量
文件已被 VirusTotal 上 65 个反病毒引擎识别为恶意 (50 out of 65 个事件)
ALYac Trojan.GenericKD.1462270
APEX Malicious
AVG Win32:Agent-ASSU [Trj]
Acronis suspicious
AhnLab-V3 Trojan/Win32.Dapato.R92734
Alibaba TrojanDownloader:Win32/Upatre.2dba4896
Antiy-AVL Trojan[Downloader]/Win32.Waski.a
Arcabit Trojan.Generic.D164FFE
Avast Win32:Agent-ASSU [Trj]
Avira TR/Crypt.XPACK.37185
Baidu Win32.Trojan-Downloader.Waski.a
BitDefender Trojan.GenericKD.1462270
BitDefenderTheta Gen:NN.ZexaF.36744.bqY@aCnUAwhi
Bkav W32.AIDetectMalware
CAT-QuickHeal TrojanDownloader.Upatre.A4
ClamAV Win.Malware.Bublik-10004834-0
CrowdStrike win/malicious_confidence_100% (W)
Cylance unsafe
Cynet Malicious (score: 100)
DeepInstinct MALICIOUS
DrWeb Trojan.DownLoader9.2612
ESET-NOD32 Win32/TrojanDownloader.Waski.A
Elastic malicious (high confidence)
Emsisoft Trojan.GenericKD.1462270 (B)
F-Secure Trojan:W32/Agent.DUQN
FireEye Generic.mg.e25c5f91498e3333
Fortinet W32/Waski.A!tr
GData Win32.Trojan-Downloader.Upatre.BK
Google Detected
Gridinsoft Trojan.Win32.Agent.vb!s1
Ikarus Trojan-Downloader.Win32.Upatre
Jiangmin TrojanDropper.Injector.atem
K7AntiVirus Trojan-Downloader ( 0048f6391 )
K7GW Trojan-Downloader ( 0048f6391 )
Kaspersky Trojan-Spy.Win32.Zbot.rbnd
Kingsoft malware.kb.a.1000
Lionic Trojan.Win32.Generic.m01v
MAX malware (ai score=81)
Malwarebytes Generic.Malware.AI.DDS
MaxSecure Trojan.Upatre.Gen
McAfee Downloader-FSH
MicroWorld-eScan Trojan.GenericKD.1462270
Microsoft TrojanDownloader:Win32/Upatre.J
NANO-Antivirus Trojan.Win32.Waski.crhest
Panda Trj/Genetic.gen
Rising Downloader.Waski!1.A489 (CLASSIC)
Sangfor Suspicious.Win32.Save.a
SentinelOne Static AI - Malicious PE
Skyhigh BehavesLike.Win32.Downloader.nm
Sophos Troj/Zbot-HEQ
连接到不再响应请求的 IP 地址(合法服务通常会保持运行) (2 个事件)
dead_host 149.154.59.7:443
dead_host 103.224.212.223:443
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2013-12-18 17:17:39

PE Imphash

9bdeb3d243b47ce5aa03f899f7f8334d

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00001093 0x00001200 6.830787879047037
.rdata 0x00003000 0x00000398 0x00000400 5.206140001184645
.data 0x00004000 0x000005a0 0x00000600 4.85618875841454
.rsrc 0x00005000 0x00001d10 0x00001e00 5.356416101558986

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00005238 0x00001ac0 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x00006cf8 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MANIFEST 0x000050f0 0x00000148 LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library USER32.dll:
0x40303c UpdateWindow
0x403040 ShowWindow
0x403044 PostQuitMessage
0x403048 DefWindowProcW
0x40304c DispatchMessageW
0x403050 TranslateMessage
0x403054 GetMessageW
0x403058 CreateWindowExW
0x40305c RegisterClassExW
0x403060 PostMessageW
Library KERNEL32.dll:
0x403000 CreateFileW
0x403004 HeapAlloc
0x403008 GetCommandLineA
0x40300c GetStartupInfoA
0x403010 GetModuleHandleA
0x403014 ExitProcess
0x403018 GetModuleHandleW
0x40301c FindFirstFileA
0x403020 FindClose
0x403024 GetSystemTime
0x403028 ReadFile
0x40302c GetProcessHeap
0x403030 CloseHandle
0x403034 GetFileSize

L!This program cannot be run in DOS mode.
`.rdata
@.data
6)i)i@BB@
GKYJ#B
@P CEi)B
)BPCjE60
ejiBPei)
B&e6v5j 6
6C3E6P
) i@)B
6@j3603
C6B@@P)i3iE3e
@ej0jE
EiCBP036C@@@
6C@636
e))C)C
3CPPeiP
ei)CBCj36i
P3C6)6
i)3Ce@je
03@3e30
iPPEjB
)@C)j0))iB@ 6j
6 B@j3P
@P5xE@
@0j6j
B)BBPEEe B
WuWWPPPPj
t(=P0@
MQ3PPPUR
iBEPj)C06e
)3E@CiP) 3PC0i0E
@PC0i )E
[uSAVWAf9
GGEGGEM;r
EC0C3@
3UV3W}
FG3@_^]
36 BC)j@@@
C6CEe0B B))
>@=oBb
>n8s'H
_.8 e@f_
JxEY*7
){^B&e+7c
sU]sih|K
R=#t3m4v5j-yih1T
.E:liC
YB 0\v'@
y1S+C?i5
c@\Q7)@{
<C?.*W)
v5j% Ek
1T#jpiC?
#rc6v_iy
&qE")]
i!1c_suXkG
,(Ct;m6v6+Q
Bw36F-=9
E<SK&e5?
?.&oS`C)5o
SS@&eg c<
)A)iI>eB&e`paA{&
@Ne66k
72+c&bi)
sU_ ]jaw{
`Lj)M'
0Hd ?o1q
+PeB&eY
L{m&CKN
6Ei)Es$67/p,F93b@{?
3e0jje
@jP EeBi e
Iu[[_[+S
ej@3)@
3 P))EEe
jB@6) 0
0Ee)E3
e@36 P
PC E0j
0B00B
33B@e@CB
e)6j3i
<"u>"u
4J(?"8`
&B.8$FCX,ST$
=BFS7U
$1P 7E`
"E/9?- 0@
_NH.1\>.
!2OZRB!
8)Y8Z#+H&
PostMessageW
RegisterClassExW
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
PostQuitMessage
ShowWindow
UpdateWindow
USER32.dll
GetSystemTime
ReadFile
CreateFileW
CloseHandle
GetFileSize
FindClose
FindFirstFileA
GetModuleHandleW
KERNEL32.dll
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetProcessHeap
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo></assembly>(
xxxyyy
---------F:--SH------------*
. . . . . . . . F:1". F:1". . ,
1". . . . . . . ,
0!0!0!0!0!0!0!0!1"0!1"1"0!0!1"0!0!0!0!0!0!0!.
1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"0!
3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#2#
I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;4$
Heepil
What do :
180000
static
button
C:\Users\elodier\AppData\Local\Temp\Rar$EX00.373\Avis_de_Paiement.exe
C:\660fe985b1b6342af9faafd62f5e615f61b7b11fc29b8ba7c635d11c6488287a
C:\msZkhMT_.exe
C:\efIYPscs.exe
C:\A7atEPm_.exe
C:\_Vt8IrHn.exe
C:\jqQ8ecyI.exe
C:\_9mImphK.exe
C:\P6tyK8cV.exe
C:\Uh5tuOV3.exe
C:\Bz6wa25P.exe
C:\HCAZZiAG.exe
C:\ojo37qik.exe
C:\0IJo6BVh.exe
C:\RN8YuDK2.exe
C:\zNBwNC_2.exe
C:\bNZhk7AC.exe
C:\3x3iz78F.exe
C:\ry9lExBi.exe
C:\iZ2SSWTq.exe
C:\fv7pAzdk.exe
C:\9UeqLU98.exe
C:\_ZQC5HCO.exe
C:\VP4Dt7N1.exe
C:\AD5Shdcj.exe
C:\NJYAvQsg.exe
C:\TZyxApDm.exe
C:\2D8kQHao.exe
C:\UMDtJwCv.exe
C:\8L1rS5vN.exe
C:\VFNexoRa.exe
C:\Um_brvz2.exe
C:\VqPuc51R.exe
C:\Zmu4g31N.exe
C:\At9A_yTM.exe
C:\KkpBCx9Z.exe
C:\6cfd515f99bd132579585a90627d1afaefa6b013884c95a74ad3569572685a05
C:\Ou2VZ9Ac.exe
C:\u7CTnXKf.exe
C:\QO38kzht.exe
C:\C4NP0EFY.exe
C:\b1dde2138362e32be02b16788b58f49c0aecb40b9067c9de333d464a2c38630e
C:\e8df29f6e56d84d63e5171a0d54d64b3fd0eb7a352807e13aa9e1ecbe6d3c44a
C:\wIQqEp5O.exe
C:\HHVyg36n.exe
C:\UbQ1wy2y.exe
C:\ggyiZL3V.exe
C:\ffschTmr.exe
C:\_L5GkRfi.exe
C:\iMxfLo39.exe
C:\gthIGyWx.exe
C:\TcH_WfM2.exe
C:\I_wmv3ap.exe
C:\psaLJx05.exe
C:\fefGJWFZ.exe
C:\3k3Ohgfs.exe
C:\bliCWp9L.exe
C:\XcnaVWnM.exe
C:\qUdJjKKY.exe
C:\ws5Q_Rlq.exe
C:\S3TseAuN.exe
C:\oIAF7eLS.exe
C:\v32QNd5Y.exe
C:\hPiknmlR.exe
C:\RxIaJa2_.exe
C:\NL1SaLVI.exe
C:\6PuG0mJu.exe
C:\k3jlUHj7.exe
C:\j9XBqkye.exe
C:\9rs3DQ5M.exe
C:\n3AImC5l.exe
C:\4waIw7z7.exe
C:\HfYCiYv_.exe
C:\fnltoJma.exe
C:\SBjjvefG.exe
C:\oiK_kOBE.exe
C:\be6OcXLu.exe
C:\b0FAKHUA.exe
C:\ZYBJkqs0.exe
C:\YIdIrtlk.exe
C:\xoCwStV_.exe
C:\eZWc8KZv.exe
C:\E2Wp_IUs.exe
C:\fbTxPYyg.exe
C:\ZTxx1vN8.exe
C:\_FwCifOF.exe
C:\0hyt4PUM.exe
C:\S3JipkKw.exe
C:\1ksRaOIk.exe
C:\JO283qnl.exe
C:\uKZYowas.exe
C:\3f12b5aa06e1b19f558079e50b763b9e725e6cc860012b44a04aba79838e3e5d
C:\rmt_QUZ0.exe
C:\Wcn_Meu6.exe
C:\8jFYFKJm.exe
C:\TXWGzJmA.exe
C:\s6bE5WzF.exe
C:\xfLbwd6W.exe
C:\780515a3c95c3d371ef059420ba2270f00774a5dffaa19902d45fa7da1bf46a3
C:\ca90f510ef3d6af086aad2ea43b4b8dd7c22a902bbc16cb5c4c1c2067d090e66
C:\ca96a05166e3ac3d74357825285d8120e7237247ce085770bc3c489cb16e4e9e
C:\cpOPz7dU.exe
C:\Jt4xpxiB.exe
C:\BU3DNBn3.exe
C:\o6KdHG5v.exe
C:\IFcwA5h_.exe
C:\ndlEhXE0.exe
C:\0Irp3jFY.exe
C:\2B3Txo2b.exe
C:\tk_6nnrp.exe
C:\2z6tpYwu.exe
C:\15BFdcO4.exe
C:\xSwXmhEJ.exe
C:\YMHKZ5BK.exe
C:\4F0fBGqo.exe
C:\LQpPBbWH.exe
C:\Qxc2aoGs.exe
C:\82GSCuRz.exe
C:\v4rEUVKK.exe
C:\ea8e0crM.exe
C:\MTq61dsl.exe
C:\iurb6oJ0.exe
C:\9d415e6509223fba287d2cb3b34fd20c178655c9d4f7938d9d98063755c09cb3
C:\0bba21c32efc3a1c6c0f0dd7606e771b0a0fe4ee7d5797001f791b1cd6c8c242
C:\01e2d9bc629c8cc04ccc83f2ff685b7aac5436054c1e53d59a9d2cdb7bd27657
C:\kkRFelKE.exe
C:\Oa3Pr4Sz.exe
C:\59j54jW8.exe
C:\nn_Olfzx.exe
C:\L3oRAvdy.exe
C:\C4s3ZgUL.exe
C:\WcniqMmH.exe
C:\01u_0vDt.exe
C:\Mc11O6zC.exe
C:\gcg9WPH7.exe
C:\WQXtkAaG.exe
C:\FIyX0_ni.exe
C:\DUNqCHfm.exe
C:\Users\John\AppData\Local\Temp\cnolVocwQ.exe
C:\Users\admin\Downloads\72afd7be6f56e58ecc080960e283dddf.virus.exe
C:\6f856ec09f65089e35ae98e962d5e0b2a28b5bab3c02d81eb20f9251dda3d02d
C:\Users\admin\Downloads\ieupdate.exe
C:\1928d3377c8e903f0b3d1e47eba1d7a40d3c42ae945a0035470141d2f30da30f
C:\d3c262e3bf88715bae7677cdf0e5ce5128498f11912d5b65c30c2eca7a9f18b0
C:\b04a40ae3db127f85298c10745164c7fc46d99333945d5a924715b624c23fc56
C:\Users\admin\Downloads\ieupdate.exe
C:\f9ee58c34f6def11485c0ea7034ff25d34b3d438895c8e9b7780cd7a2f3cf580
C:\2f4401f06e648de07207882f752607a512d8811f70277ac7c2bf567b34e199a2
C:\Users\Virtual\AppData\Local\Temp\7b8e4806a91a34b1acdca389e859b44a0b7b026d42a2db15158b072f5bb0b180.exe
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\569ff617b5c454e5e5ef086375d09f0c3c2d9c8a3d003b1545bdd26d469133d3
C:\088e62e1e4b648b97a052633f57313045afd5a9172442f4738ebec09cafabffb
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\c3c0106d67d0686eb167e1f163335113b55054fcc920202bbecba8f914da88bd
C:\Users\admin\Downloads\ieupdate.exe
C:\eba11c25a442e9e1f6a87bbcfe14c003d138b3409e8c85678713ca738b3f00c1
C:\Users\admin\Downloads\ieupdate.exe
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\admin\Downloads\2e42b8596781c20d_ieupdate.exe
C:\ced89e03e1fe7e0b936b133842f613c92b7370e2eb829c44bd932e41098d8770
C:\Users\admin\Downloads\ieupdate.exe
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\admin\Downloads\c4735781a656a254_ieupdate.exe
C:\f58571e9063ed670fb6654ed525aacf0f68f1db1086381e9c06b7c24c9a8f12b
C:\8a881439e778cece7b553806760cf0d9c52878dd934c9f02214a879dffd415b8
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\d1bb7be554c0d5ee14e868678fb526e5ec5293f778c003cfa22c377edbbea729
C:\Users\admin\Downloads\ieupdate.exe
C:\ee9c1819b488d1546bafb36689aa8d65f61aae0b2292816ad793bdc2e6c6e9b4
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\72e732e0563a3a203297f8ddb3499025a80303561b6260072a37c7b0b3afbcbc
C:\a3568152784b7966bc48c1df29296a9cbdfbd251d0daccfde1ca22755a32ca24
C:\Users\admin\Downloads\ieupdate.exe
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\8a55e0d0f7e3343342a6792786446ac16f06952a82710b512a0515230c9fcc77
C:\Users\admin\Downloads\ieupdate.exe
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\e82a87197fa5c0e9e461d772c6ef8bdb7a512e3e7a867ced3fbb6cc821978c2b
C:\484baa88054b6a6a62504e192ec54ca8a602f90006bfacf21631024aaf9d1837
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\admin\Downloads\c0b9bbd990d22f95_ieupdate.exe
C:\Users\Petra\AppData\Local\Temp\ieupdate.pe32
C:\Users\admin\Downloads\f86a227287ca6873_ieupdate.exe
C:\99264fce61eb005bed2f91c63c2d7694a34509ee8e2788b0100ea667e559e3bb
C:\Users\admin\Downloads\ieupdate.exe
C:\4dad762006f2ea63a121d25bb721aa11e25e52fa1d5ec58a369a5d878f279859
C:\3dd095e47a91bdce884a4bdafe7b838fd137b4d5ba366c3c25ba4cbbff0cc7f1
C:\Users\admin\Downloads\ieupdate.exe
C:\77c54d806e1518eaf3e64a8c203b162cb2d620d99188193f888dfe9f37008392
C:\Users\admin\Downloads\ieupdate.exe
C:\0641317538799b8fbb64a6b69c4f26f042cb1bb721b2c2f265b94843a9d23644
C:\d1e8ea1b3d0eb3ea3acbf012a9b3fd3eaa45bf3b1bec50130f7a1154719c8461
C:\Users\admin\Downloads\ieupdate.exe
C:\87e9254fd2588e53f9915e33c06b8004413f53c9f47ae7883c24d48ef92d43e8
C:\52b3b271f2fa228d214af370449948c0c9bb3976ed987d62dbe4641140b3f707
C:\9d5211ada6b25afe91dd03ea63d0e9b99a144f0ff4557cdb6fe203a392683dc5
C:\Users\admin\Downloads\ieupdate.exe
C:\defca363c2aac3d26e7694fd311a2ca0fde9458a298a045228f6d462953c6dfd
C:\Users\admin\Downloads\ieupdate.exe
C:\54df1c8abc36813a2ad57fb299445fc103214e8f16f18513d1beadc8f36f4b13
C:\a2fc900cd8683411d14e1dda7e3bc54aa622e198df8860e5adab94ff796ad91b
C:\Users\admin\Downloads\ieupdate.exe
C:\039267e690fe9ca2d5190cc56644e9e55449fdfd401b535dfbf4b80c0f109838
C:\oyZxnRlG.exe
C:\92ceb09585fdc7686e7f850593c331828a62af4dd0aaf12f89546176029d8409
C:\2bb55a366e6864dab1479277d78986952e20c8cdb35503ee87829f99a790cbec
C:\f57a29017cf7ee89adc31d5838c0ee26f2a47f7b35af3082f8bf336dc19db3ab
C:\146f5004270b454155f0a1dee6e3b954a8e5b042fc90c3d9d0a812116e0be986
C:\2c51f9ada8b17dfd8781d5504de62ffbc471b6b35c80857620d7cc3c8752a1ff
C:\342e1d9edcdc5491ae0667aca318f8aed4e6a5aaf8e53f244953a6b259f98e21
C:\28d58a32318945908a23445fafd8996ee210598c6dc0c4f2ff812a7ed2c46b73
C:\de50db5656eef1a14fea6f0ff1eb5930bf57d962480d5d9db74464ab154c7748
C:\Users\admin\Downloads\ieupdate.exe

Process Tree


0a10309fcf649bcbfac3635685a48a79b214d755d6399195ab651eb5cd346915.exe, PID: 2108, Parent PID: 1848

default registry file network process services synchronisation iexplore office pdf

ieupdate.exe, PID: 1640, Parent PID: 2108

default registry file network process services synchronisation iexplore office pdf

TCP

Source Source Port Destination Destination Port
192.168.56.101 49165 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49166 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49167 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49169 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49170 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49171 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49175 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49176 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49177 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49179 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49180 103.224.212.223 foodpicsgo.com 443
192.168.56.101 49181 103.224.212.223 foodpicsgo.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 58485 8.8.8.8 53
192.168.56.101 57665 8.8.8.8 53
192.168.56.101 51758 8.8.8.8 53
192.168.56.101 52215 8.8.8.8 53
192.168.56.101 62361 8.8.8.8 53
192.168.56.101 62361 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 8.8.8.8 3

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 3109d93cbd0e1a22_ieupdate.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\ieupdate.exe
Size 30.4KB
Processes 2108 (0a10309fcf649bcbfac3635685a48a79b214d755d6399195ab651eb5cd346915.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 35ea9be90f539155b1fcee9e02a90c8c
SHA1 2703e7e10c394d35f51c138b68fb08626498b538
SHA256 3109d93cbd0e1a22d039b32ccc5f327c8bdf7f51e7c05f006736bebf0bdad56f
CRC32 426A0F24
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.