0.9
低危

10caf0e8ca6e58dd31ac4903462e524116962cb98c1cdb0184df1c1b5a40abf2

10caf0e8ca6e58dd31ac4903462e524116962cb98c1cdb0184df1c1b5a40abf2.exe

分析耗时

193s

最近分析

373天前

文件大小

71.0KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN IPATRE
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.63
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Heim 20190903 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20190904 2013.8.14.323
McAfee Trojan-FEOI!E6636BC26AFB 20190903 6.0.6.653
Tencent None 20190904 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 48 个反病毒引擎识别为恶意 (48 个事件)
ALYac Gen:Trojan.Ipatre.1
APEX Malicious
AVG Win32:Heim
Acronis suspicious
Ad-Aware Gen:Trojan.Ipatre.1
AhnLab-V3 Trojan/Win32.Inject.R121051
Antiy-AVL Trojan/Win32.AGeneric
Arcabit Trojan.Ipatre.1
Avast Win32:Heim
Avira TR/AD.Yarwi.yogmp
BitDefender Gen:Trojan.Ipatre.1
Comodo TrojWare.Win32.TrojanDownloader.Waski.FG@5t41v3
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.26afbb
Cylance Unsafe
Cyren W32/Upatre.HD.gen!Eldorado
DrWeb Trojan.Matsnu.150
ESET-NOD32 a variant of Win32/Kryptik.CNAC
Emsisoft Gen:Trojan.Ipatre.1 (B)
Endgame malicious (high confidence)
F-Prot W32/Upatre.HD.gen!Eldorado
F-Secure Trojan.TR/AD.Yarwi.yogmp
FireEye Generic.mg.e6636bc26afbb8cb
Fortinet W32/Kryptik.CKUG!tr
GData Gen:Trojan.Ipatre.1
Ikarus Trojan-Spy.Zbot
Invincea heuristic
Jiangmin Trojan.Generic.aiqao
K7AntiVirus Trojan ( 0051918c1 )
K7GW Trojan ( 0051918c1 )
MAX malware (ai score=87)
Malwarebytes Trojan.Downloader
McAfee Trojan-FEOI!E6636BC26AFB
McAfee-GW-Edition BehavesLike.Win32.Generic.lt
MicroWorld-eScan Gen:Trojan.Ipatre.1
Microsoft TrojanDownloader:Win32/Upatre.AH
NANO-Antivirus Trojan.Win32.Matsnu.feiqfl
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM20.1.A79D.Malware.Gen
Rising Downloader.Upatre!8.B5 (TFE:2:DHEOoIHxX7S)
SentinelOne DFI - Malicious PE
Sophos Troj/Agent-AJNX
Symantec Packed.Generic.493
TrendMicro TROJ_UPATRE.SM37
TrendMicro-HouseCall TROJ_UPATRE.SM37
VBA32 Trojan.FakeAV.01657
Yandex Trojan.Agent!JZEXscOT9EE
Zillya Trojan.Kryptik.Win32.933451
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2014-09-10 02:23:21

PE Imphash

9b21591001195f47e99c2e03a9dbadc9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00007abe 0x00008000 5.357370975395869
.rdata 0x00009000 0x000018c1 0x00002000 1.8639837727278072
.data 0x0000b000 0x00000b75 0x00001000 4.389164658623499
.rsrc 0x0000c000 0x00003ade 0x00004000 4.288402987941884

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000d536 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x0000d520 0x00000016 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ANICURSOR 0x0000c720 0x00000e00 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ANICURSOR 0x0000c720 0x00000e00 LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library uxtheme.dll:
0x409000 DrawThemeBackground
0x409004 GetThemeTextMetrics
0x409008 DrawThemeEdge
0x40900c GetThemeFont
0x409010 GetThemeInt
0x409014 OpenThemeData
0x409018 GetThemeEnumValue
0x40901c GetThemeColor
0x409020 GetThemeSysSize
0x409024 SetWindowTheme
Library cmdial32.dll:
0x40902c InetDialHandler
0x409030 CmCustomHangUp
0x409034 CmCustomDialDlg
0x409038 AutoDialFunc
Library cryptdll.dll:
0x409040 MD5Update
0x409044 CDLocateRng
0x409048 MD5Init
0x40904c CDBuildVect
0x409050 MD5Final
Library user32.dll:
0x409058 IsDialogMessageA
0x40905c DrawIcon
0x409060 GetMessageW
0x409064 PostMessageW
0x409068 GetClassInfoA
0x40906c MessageBoxW
0x409070 CreateDesktopW
0x409074 wsprintfA
0x409078 DispatchMessageA
0x40907c CharToOemA
0x409080 LoadCursorA
0x409084 PeekMessageA
0x409088 LoadImageA
0x40908c GetCaretPos
0x409090 DialogBoxParamW
0x409094 IsCharLowerA
Library kernel32.dll:
0x40909c GetModuleHandleA
0x4090a0 OpenMutexW
0x4090ac SleepEx
0x4090b0 GetDriveTypeA
0x4090b4 OpenMutexW
0x4090b8 OpenMutexW
0x4090bc OpenMutexW
0x4090c0 OpenMutexW
0x4090c4 OpenMutexW
0x4090c8 OpenMutexW
0x4090cc DeviceIoControl
0x4090d0 CreateEventW
0x4090d4 FoldStringW
0x4090d8 OpenMutexW
0x4090dc CreateDirectoryA
0x4090e0 GetACP
0x4090e4 OpenMutexW
0x4090e8 OpenMutexW
0x4090ec OpenMutexW
0x4090f0 FindFirstVolumeW
0x4090f4 OpenMutexW
0x4090f8 GetProcessHeap
0x4090fc GetLastError
0x409100 OpenMutexW
0x409104 CopyFileW
0x409108 GetTickCount
0x40910c FindFirstFileA
0x409110 GetCurrentProcess
0x409114 GetLocalTime
0x409118 CompareStringW
0x40911c HeapAlloc
0x409120 ReplaceFileW
0x409124 FindNextVolumeW
0x409128 CreateSemaphoreW
0x40912c GetDiskFreeSpaceW
0x409130 GetProcAddress
0x409134 DeleteFileA
0x409138 lstrcpynW
0x40913c SearchPathA
0x409140 GetStringTypeW
Library dciman32.DLL:
0x409148 DCIDestroy
0x40914c DCIBeginAccess
0x409150 DCIEnum

L!This program cannot be run in DOS mode.
`.rdata
@.data
By 5%@
zertur.pdb
OpenThemeData
GetThemeSysSize
GetThemeColor
GetThemeTextMetrics
GetThemeFont
GetThemeInt
GetThemeEnumValue
DrawThemeEdge
DrawThemeBackground
SetWindowTheme
uxtheme.dll
AutoDialFunc
CmCustomHangUp
InetDialHandler
CmCustomDialDlg
cmdial32.dll
MD5Update
CDLocateRng
MD5Final
CDBuildVect
MD5Init
cryptdll.dll
PeekMessageA
DialogBoxParamW
IsCharLowerA
wsprintfA
IsDialogMessageA
GetClassInfoA
CharToOemA
CreateDesktopW
LoadImageA
LoadCursorA
PostMessageW
MessageBoxW
DrawIcon
GetMessageW
DispatchMessageA
GetCaretPos
user32.dll
CreateSemaphoreW
CompareStringW
GetModuleHandleA
SleepEx
SearchPathA
lstrcpynW
CreateEventW
GetLocalTime
InterlockedDecrement
GetProcAddress
FindFirstVolumeW
FoldStringW
GetDriveTypeA
DeleteFileA
CreateDirectoryA
GetTickCount
GetProcessHeap
FindNextVolumeW
GetStringTypeW
FindFirstFileA
GetCurrentProcess
HeapAlloc
GetDiskFreeSpaceW
DeviceIoControl
ReplaceFileW
GetLastError
GetACP
GetCurrentDirectoryW
CopyFileW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
OpenMutexW
kernel32.dll
DCIDestroy
DCIEnum
DCIBeginAccess
dciman32.DLL
6V!&}m
1H@`:t
#_#WVn
y+5xRuu
I(%nX8%
/AIwr|
[d^t{}
3))4a&t
P?:vv>x
Ms>]Con
_N<ub+r
) 4Oc<
t3JtTAluNjeh$~]PE
([>GzA
VCk~8W~`
&]TVCdie#4C
{|b4qXv
T;(o4_uu"-
Kk?0xb`8
LoadLibraryExW
kernel32.DLL
HeapCreate
WriteProcessMemory
vifjkyei
lifnbkajcuvjzys
egpnyseewiu
txaqnmpuzyojzw
mouvminniondwldz
drfghpjjo
qpltxwbt
esvrosvhg
fyozlynhir
vayqgvqckyfk
znayrpodynbdmpec
cbxohnwvqooogu
zmhgbqto
PsC!)b\:
bL*?tc*Az+
FQHjR9
wo}[%y)
zE#0k|F
WJnJj=KsQ
s|ZNuc
Qw|Z-ScA
wlJSyS1/U
\:yC!V{-G
D=-XIw
<B`e./
B%g[t!
QZ9a0P
"PrpRV
I4c"j@S=K;SH2w
nc,Zt=*ctwV!)bQ
VCa|S\
e44o=x
A|Y]DX7
NvS\aRbVS>2x|JY
}MGNylv*
)J;;Q"mxV2,/st
^(L_oU
~6T\R)^-y+
b->1L-
v'ijAl
L;A2RmC
0_J]\n
B]HvKY
S'DkvJAX
;cz]1Y
.d`>+/s
CNgg$NO&
"Q3TH0
YxtIGACH
y}&\JS&b
5C66}W8WM)o
82z]w4i~M(
E41`"?W$.
!p&#P.'
~\:HLJ@
L*ozsq0
'u+)^,<
yu`>+{
L*526z0
|ZF$9=;D">N,R0
nLT2BDD
R0bh~JKL*
T2PIsxV)j
pNTfSx
r5ps)0
+J(V4Z
5P.3^<
Y{1zN,0
N,n|bjd
_Ym=/|<LdV
3GFsH
} a.U3
;[*EG>9q3
L^<?. A#5Q5RZ2
!+&i35
e1o%h&
M&d%9.4$
mZADit~C
.#,t0n
}?xN=E{
<[>\:\
fs0Afu
BThvBT
!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#!#
!!!!!!!!!!!!!!!!! #!!!!!!!! # # #!$!!!! #!!!!!!!!!!!!!!!!!!!!
""%"%"%"%"%"%"%"%"%"%"%"%nq"%"%"%"%"%"%"%"%"%"%"%"%"
"#&#&#&#&#&#&#&#&"%"%###&ss#&#&#&#&#&#&#&#&#&#&#&#&"
"*-*-*-*-*-*-*-*-*-*-tt*-*-####'**-*-*-*-*-*-*-!!
#&////////////////QL////.1//////////////////#&
*-585858585858585858fi5858{x585858585858585858585858*-
14:<:<:<:<:<:<:<:<gl:<gl:<:<1414:<:<:<:<:<:<:<:<14
:<??????????????????~??????????????????:<
??FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF??
HJJJFFFFFFJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJFFFFFFFFFFFFJJJJJJHJ
HJHJvovovovovovovovovovovovovovovovovovovovovovovovovovovovoHJOQ
q2PFV
Foy~pD='Z!
J8~2rJkA
"TX3bG0Z
!+::$Sl`8EJjpZ
8KNAbBMZ
6"$>9_Z
!Xl71eP-,
M1YW,-_
e[ub\X
N21"8'qA{=VbfUG!2
x0]Hay6ao
zls~j+Mc
j},Tn_
p}M("A0-F|GM{cFy<
yA?pK$PX
ZuunEj+F
UExHNO@
"RKwR#!C:,
,:.p~DO
u'0&DX
!s|O;;!*
tiOA)$MrPCx!{^
Q->R2l
4N zlF
$[?(#==
beBhnd
j$GXjRrxg
<\CjQ6,
XT6Bw|oF#
,rf$G9
-?Rswe
=D(F|^
/DvxZo3L
4Mr rZ6W
*~&17#
8McQf;oj#*r3
B@@GNNDwKqKN?h+
f\W:Gs'N?,Vwg
oMO(pSf-G[e$A
.} 5g.71rW
;zH+M}YpX
T'>7A0o~
-{U(w_
+"<"?&(0`+$\=2|Q(Q:
,I9~ Zy#A
]')q_7wP'nb
Bq!MBf p9[P'nhyva-
RGQg:op}W3
&317WQ
%ieMq2UJ|% ?bcM;Y)-y~^e
XgAOBG
#->1S*b2J
jr>__j
u911hK{
J\`W^5Y&
]8PA0K5z
^BB0J;X'vAk8%U
fQ?T%p
V9~"N396
I{T)zG
@n~sYGN8++Nm+
5@^6J)kt
Mt8r#&J
dLj~%{O@UJ
aI\/@^DAnh*@
#lg&L`}E
zi(zENg/
Ji9oI}
C>2XQUob4r
^Mk}rF%&:f
lz"al&XW
F/|-?Fh
4RH)+fb
s)5u:Q
Cm~OFOW
y@)aOr2)
=An&o2@
pX;0(''!q4
5hywXWg>
j4p"L<
W9_;/jb5}
<,u=-w},
+N4G.G
As<7q3JZ\2M
[@JpaPkX
5ejKI#
2 *>W=mhGeG
l{-f}hF>J:dh
$LP<9rk
L2P4:CG
7__)ZNG
/,W!X%X!
"!TYb)
)F?Z+@
t92^CGTM4xu
] ]D*Y
97._:ORw+
inn3GQ
YO^QB}T,=0
877NoL&1wa
Q+. Ne*n\
`['=y|=K
(>z=E$MsP=
f r0I4=uI
hzp~2mc}pG`%U9dU[,<lm+cTc}
\fGZm}c
*p_=Uk?n
)]7;,R$R
pqT(%p9
MusGQS\C|89F_
<|"/~[WXi,r'cM
Y"J=NOeDp
7Ae ,;(
fH"CDF
(j+p3#]~^h{"9?|D!_S_0M|NkETG=[-%%b"j+
$C-KOZa
PuxJ7r*t1\)
^=9o~+Gy
gG;Q+{_g)
}6.QvM!
U-YjnjLS%)!]/^M9@zMzr=2
\1Fyvn(E
KfQHiis$ZKn
jOByT3u
=SPLr`g
\;eE}{~,qf*'AsN
L{d7Hh;
Ry.@ju)?Y-9'
3x5MMf}
>'SGvv?5O?&yYb8
3LWd#d
;:HlE_T
ypdh.DLL
C:\QwaT7PJk.exe
C:\n_wfUILy.exe
C:\3TdYuwEZ.exe
C:\I2Dhhdq1.exe
C:\95ec35b6a3a6e7626ac9a18865a6ec0b8704d4c055945537bcb710b084a18a29
C:\Users\luser\Desktop\P0F6d3Pr.exe
C:\71efa20f09fc6cff1567fed064576aea889a1716ea3538d5f94aa8d066d41489
C:\326a22345a7af0355b713232733e55ddec273501f4cb6e0a9f67d145f3ac4109
C:\68b971f35f2a41d8d2b1415f87a946a7570735db131562172c2d6d988925932e
C:\CQxvOcpB.exe
C:\ypk7lG5_.exe
C:\5e1cba38bffd6e21a38e04902db5ebec7be094f81aa37cf625859992c851fa10
C:\cfd212aee9e24bddf6cba79d5dfcc3f881ee1ca8e6aca870b4c9f369f6a8629c
C:\JdGPQFUz.exe
C:\Users\Johnny Cage\Desktop\qr8DVZ9gsn.exe
C:\29dmwldq.exe
C:\AO0JcZvM.exe
C:\251761b5f43098075a82db13e69102e062eabc6d36ae89c18c3b96e82cefeb92
C:\0ac5fb070e026e4e92e315db51a87b3d6064097080a1e16207130c79f4a1b751
C:\3bc97de0cfe8afb29574a23074351e20ff0b798b545c075c154a21c334876b7b
C:\2cb2a534cf2c0e942720f88c80af7d1dd6f0d5f9f46e10a7c5f29b2773e89869
C:\Users\Lisa\Desktop\HvYSXQUN.exe
C:\00f6743c57728ff9fc813a6b03b97959b9b8a1197af525b625d214a6b244a463
C:\6d6fd8bd6469ec0e5f225a5148375f4e775ac23e3267c5f69596a2606e1cbb94
C:\beab9f51dee076b414fb9b69c1bdea23394b1c5eb3c4c0484edbf97c52340822
C:\Documents and Settings\Administrator\Desktop\h0hD8DWe.exe
C:\a8f6fe990e3144ffc49eded86a73765e61be9616718e3a32434cd51ca7bee7c9
C:\7b76a4cc51929c1f6d25e09bbd4347ac8d0f22cd43b76b863f3a8918648deca6
C:\Ec75SZd2.exe
C:\d59ef14ccc0ecc96e0cb4e6fac02f1751e26474f7f4be301ed5bdb2b065e69ad
C:\6b1ec2df5eb6ad6f2875523d0764c2ad5de4212a3f34946fe3ebb3418c414ea7
C:\G7pNlS1i.exe
C:\f3949a710f56bcc2a6bac88e7d4e6357bb0d7bdf703f90f85a7695fc623ab33d
C:\YWiYWmT_.exe
C:\UG3qeRnt.exe
C:\f979f38e01699924de27668611105bf8d641627c6311d4db954e2f6cb8271df3
C:\Documents and Settings\luser\Desktop\mEVyQRkJ.exe
C:\hD0G9OvE.exe
C:\yw8bqvnp.exe
C:\Documents and Settings\Administrator\Desktop\p1QWlekG.exe
C:\PuJ75EDT.exe
C:\e97f6bbcc566c99b09ae6d560934f0edb93c50742d59035d4d960f3b107a0ae0
C:\dfad0afabc017ec343e97507602e60646f39433c122d4a835ec662d8419a2b1b
C:\444765aa13e014216ee9b93a935729f5c0ec89dde4e1ed5f5233dbbcc1c88065
C:\Users\john\AppData\Local\Temp\9282B68C8428FE13E1D07B9CA7161CF9.exe
C:\az6LxMN4.exe
C:\Documents and Settings\Administrator\Desktop\7QhtDtZC.exe
C:\7lRSZ5ph.exe
C:\c448714c553a5f44ce1f399c0a0e15e821e497cef9558d03ec84be339a12bdaf
C:\VHma2Q0U.exe
C:\Users\admin\Downloads\factura.exe
C:\DbPyNXYL.exe
C:\a639d3dd7518e7400b5ca60cca2e8362bb88cd2102cf283cdaed91995cde5910
C:\23da44c3f04222ccd48b7c7ebba0802ecfb4ca64f1e7500d07291222496135e4
C:\Users\admin\Downloads\important_document.exe
C:\a691293f4cdb1a4b637ef3f953cc099cac0693e9756a27b39ee2be804257103d
C:\d5442f2121e69e079f4364768b89c7f25a5613a3583fe65c1133127d5cfd09ad
C:\ead24f4d63fd66bea9de76c4673c995d570c1aff020bf4f8a431257857f83b42
C:\Users\admin\Downloads\important_document.exe
C:\Users\Petra\AppData\Local\Temp\tgizc.pe32
C:\18b116c102a414f1af1c86c91731fb25ecca9cb1d8b6357c9652bca668194499
C:\c9eb9f5238d2a295116175a14242e8bc740b23889e885839aedbac4c158fa8a0
C:\Users\admin\Downloads\sample.exe
C:\Users\admin\Downloads\invoice.exe
C:\Users\admin\Downloads\factura.exe
C:\5a8a886bb13186fb069e5c919ff5ee3d2fe3853ecff3d3173798dc6bf288550b
C:\32492280faa19cc68fb11ffac127a4659d80752c9b5b031c5622068ce1e195d9
C:\3ff69ec1a57ed2159ab4ffdf8a7c43040d55a7f53e8a447e22f51d2450a72d07
C:\442bc832cc087db1cec0fde8b96afac101eacdc5f9af452f2d2c16b920782106
C:\Users\Petra\AppData\Local\Temp\tgizc.pe32
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\important_document.exe
C:\x2S14ElV.exe
C:\ca82dd422d3d320eb125699fb4745487573feb3615e98675dc9f00bacc4258d0

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.