5.2
中危

1d2ef8cd1682b74a09a6a4f5f3caa932eadbcf798ecb183b3cafaade1a38c3b2

e769681f1b8ba93593fb4290d5290da0.exe

分析耗时

89s

最近分析

文件大小

316.0KB
静态报毒 动态报毒 100% AIDETECTVM CJWH CLOUD CONFIDENCE DARKKOMET DGGO EHIEXL GENCIRC GENERICKD GENERICRXAO HACKTOOL HEDL HIGH CONFIDENCE KLONE MALWARE1 MODERATE R002C0CGS20 REBHIP SCORE SPYRAT SUSPICIOUS PE UNSAFE VBINJECTIT VBNA 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee GenericRXAO-IH!E769681F1B8B 20200809 6.0.6.653
Alibaba Backdoor:Win32/DarkKomet.41a602c5 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Baidu 20190318 1.0.0.2
Avast Win32:Malware-gen 20200809 18.4.3895.0
Kingsoft 20200810 2013.8.14.323
Tencent Malware.Win32.Gencirc.10bc8f4d 20200810 1.0.0.1
静态指标
The file contains an unknown PE resource name possibly indicative of a packer (1 个事件)
resource name CUSTOM
One or more processes crashed (1 个事件)
Time & API Arguments Status Return Repeated
1619974784.835876
__exception__
stacktrace:
GetThreadDesktop+0xd7 GetWindowLongW-0x2c4 user32+0x16d3a @ 0x775a6d3a
GetClientRect+0xc5 CallWindowProcW-0xb user32+0x20d27 @ 0x775b0d27
CallWindowProcW+0x1b SetRectEmpty-0x38 user32+0x20d4d @ 0x775b0d4d
e769681f1b8ba93593fb4290d5290da0+0x68d6 @ 0x4068d6
e769681f1b8ba93593fb4290d5290da0+0x5fba @ 0x405fba
e769681f1b8ba93593fb4290d5290da0+0x6ae2 @ 0x406ae2
IID_IVbaHost+0x236f3 UserDllMain-0x41bc4 msvbvm60+0x51d33 @ 0x72991d33
e769681f1b8ba93593fb4290d5290da0+0x1862 @ 0x401862
IID_IVbaHost+0x239f4 UserDllMain-0x418c3 msvbvm60+0x52034 @ 0x72992034
IID_IVbaHost+0x23e5b UserDllMain-0x4145c msvbvm60+0x5249b @ 0x7299249b
IID_IVbaHost+0x24027 UserDllMain-0x41290 msvbvm60+0x52667 @ 0x72992667
IID_IVbaHost+0x3b77 UserDllMain-0x61740 msvbvm60+0x321b7 @ 0x729721b7
IID_IVbaHost+0x386d UserDllMain-0x61a4a msvbvm60+0x31ead @ 0x72971ead
IID_IVbaHost+0x36291 UserDllMain-0x2f026 msvbvm60+0x648d1 @ 0x729a48d1
IID_IVbaHost+0x418d8 UserDllMain-0x239df msvbvm60+0x6ff18 @ 0x729aff18
BASIC_CLASS_Release+0xfcaa IID_IVbaHost-0xff3d msvbvm60+0x1e703 @ 0x7295e703
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
e769681f1b8ba93593fb4290d5290da0+0x12f2 @ 0x4012f2
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1636064
registers.edi: 38535168
registers.eax: 2010725440
registers.ebp: 1636268
registers.edx: 0
registers.ebx: 40671894
registers.esi: 3585384613
registers.ecx: 62
exception.instruction_r: f3 a5 0b ca 75 05 5f 5e c2 0c 00 f3 a4 5f 5e c2
exception.symbol: RtlMoveMemory+0x1b RtlFindActivationContextSectionGuid-0x270 ntdll+0x63c5b
exception.instruction: movsd dword ptr es:[edi], dword ptr [esi]
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 408667
exception.address: 0x77d93c5b
success 0 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself) (6 个事件)
Time & API Arguments Status Return Repeated
1619974784.819876
NtAllocateVirtualMemory
process_identifier: 2420
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x004c0000
success 0 0
1619974784.819876
NtAllocateVirtualMemory
process_identifier: 2420
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x024c0000
success 0 0
1619974784.819876
NtAllocateVirtualMemory
process_identifier: 2420
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02730000
success 0 0
1619974784.819876
NtAllocateVirtualMemory
process_identifier: 2420
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x03580000
success 0 0
1619974784.819876
NtAllocateVirtualMemory
process_identifier: 2420
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x03590000
success 0 0
1619974784.819876
NtAllocateVirtualMemory
process_identifier: 2420
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x035a0000
success 0 0
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) (1 个事件)
Time & API Arguments Status Return Repeated
1619974784.304876
NtProtectVirtualMemory
process_identifier: 2420
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 32 (PAGE_EXECUTE_READ)
process_handle: 0xffffffff
base_address: 0x003f0000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.991905972242744 section {'size_of_data': '0x00046000', 'virtual_address': '0x00009000', 'entropy': 7.991905972242744, 'name': '.rsrc', 'virtual_size': '0x00045de1'} description A section with a high entropy has been found
entropy 0.8974358974358975 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 51 AntiVirus engines on VirusTotal as malicious (50 out of 51 个事件)
Bkav W32.AIDetectVM.malware1
MicroWorld-eScan Trojan.GenericKD.34250098
FireEye Generic.mg.e769681f1b8ba935
CAT-QuickHeal Trojan.Vbinjectit
McAfee GenericRXAO-IH!E769681F1B8B
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Backdoor:Win32/DarkKomet.41a602c5
K7GW Riskware ( 0040eff71 )
CrowdStrike win/malicious_confidence_100% (W)
Invincea heuristic
Symantec W32.Spyrat
TotalDefense Win32/VBNA.A!generic
APEX Malicious
Avast Win32:Malware-gen
ClamAV Win.Trojan.Agent-1755246
Kaspersky Backdoor.Win32.DarkKomet.hedl
BitDefender Trojan.GenericKD.34250098
NANO-Antivirus Trojan.Win32.DarkKomet.ehiexl
Paloalto generic.ml
Rising Backdoor.DarkKomet!8.13E (CLOUD)
Endgame malicious (high confidence)
TACHYON Backdoor/W32.DarkKomet.323584.E
Sophos Mal/Generic-S
F-Secure Trojan.TR/Dropper.Gen
TrendMicro TROJ_GEN.R002C0CGS20
Trapmine malicious.moderate.ml.score
Emsisoft Trojan.GenericKD.34250098 (B)
SentinelOne DFI - Suspicious PE
Jiangmin Backdoor.DarkKomet.jui
Avira TR/Dropper.Gen
Antiy-AVL Trojan[Packed]/Win32.Klone
Microsoft Worm:Win32/Rebhip
Arcabit Trojan.Generic.D20A9D72
AegisLab Hacktool.Win32.Klone.x!c
ZoneAlarm Backdoor.Win32.DarkKomet.hedl
GData Trojan.GenericKD.34250098
Cynet Malicious (score: 100)
VBA32 Backdoor.DarkKomet
ALYac Trojan.GenericKD.34250098
Ad-Aware Trojan.GenericKD.34250098
ESET-NOD32 a variant of Win32/Injector.DGGO
TrendMicro-HouseCall TROJ_GEN.R002C0CGS20
Tencent Malware.Win32.Gencirc.10bc8f4d
Ikarus Packed.Win32.Klone
Fortinet W32/Injector.CJWH!tr
AVG Win32:Malware-gen
Panda Trj/CI.A
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 172.217.160.78:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2016-10-04 17:51:09

Imports

Library MSVBVM60.DLL:
0x401000 _CIcos
0x401004 _adj_fptan
0x401008 __vbaLenBstr
0x40100c __vbaStrVarMove
0x401010 __vbaFreeVarList
0x401014 __vbaEnd
0x401018 _adj_fdiv_m64
0x40101c __vbaFreeObjList
0x401020 __vbaStrErrVarCopy
0x401024 _adj_fprem1
0x401028 __vbaStrCat
0x40102c __vbaSetSystemError
0x401034 _adj_fdiv_m32
0x401038 __vbaAryVar
0x40103c __vbaAryDestruct
0x401040
0x401044 _adj_fdiv_m16i
0x401048 _adj_fdivr_m16i
0x40104c __vbaVarIndexLoad
0x401050 _CIsin
0x401054 __vbaErase
0x401058 __vbaChkstk
0x40105c EVENT_SINK_AddRef
0x401064 __vbaStrCmp
0x401068 DllFunctionCall
0x40106c _adj_fpatan
0x401070 __vbaRedim
0x401074 __vbaUI1ErrVar
0x401078 EVENT_SINK_Release
0x40107c _CIsqrt
0x401084 __vbaExceptHandler
0x401088
0x40108c __vbaStrToUnicode
0x401090 _adj_fprem
0x401094 _adj_fdivr_m64
0x401098 __vbaFPException
0x40109c
0x4010a0 __vbaUbound
0x4010a4 __vbaVarCat
0x4010a8
0x4010ac _CIlog
0x4010b0 __vbaNew2
0x4010b4 __vbaVar2Vec
0x4010b8 _adj_fdiv_m32i
0x4010bc _adj_fdivr_m32i
0x4010c0
0x4010c4 __vbaStrCopy
0x4010c8 __vbaFreeStrList
0x4010cc _adj_fdivr_m32
0x4010d0 _adj_fdiv_r
0x4010d4
0x4010d8 __vbaAryLock
0x4010dc __vbaStrToAnsi
0x4010e0 __vbaVarDup
0x4010e4 _CIatan
0x4010e8 __vbaAryCopy
0x4010ec __vbaStrMove
0x4010f0 _allmul
0x4010f4 _CItan
0x4010f8 __vbaAryUnlock
0x4010fc _CIexp
0x401100 __vbaFreeStr

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 53210 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53380 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 60384 224.0.0.252 5355
192.168.56.101 61680 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.