1.2
低危

155905d5b9cf24ebf4999eee0f2966b18c2a484d23a3db04af7e0998dfd57d22

155905d5b9cf24ebf4999eee0f2966b18c2a484d23a3db04af7e0998dfd57d22.exe

分析耗时

193s

最近分析

367天前

文件大小

57.5KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER JAIK
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.71
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Malware-gen 20200327 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200327 2013.8.14.323
McAfee Downloader-FSH!EB76DF98C5BD 20200326 6.0.6.653
Tencent Malware.Win32.Gencirc.10b4ae70 20200327 1.0.0.1
行为判定
动态指标
可执行文件使用UPX压缩 (2 个事件)
section UPX0 description 节名称指示UPX
section UPX1 description 节名称指示UPX
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 56 个反病毒引擎识别为恶意 (50 out of 56 个事件)
ALYac Gen:Variant.Jaik.26656
APEX Malicious
AVG Win32:Malware-gen
Acronis suspicious
Ad-Aware Gen:Variant.Jaik.26656
AhnLab-V3 Trojan/Win32.Kryptik.R326230
Antiy-AVL Trojan/Win32.AGeneric
Arcabit Trojan.Jaik.D6820
Avast Win32:Malware-gen
Avira TR/Spy.Zbot.repoa
BitDefender Gen:Variant.Jaik.26656
BitDefenderTheta Gen:NN.ZexaF.34104.dqX@aCpTi9ii
Bkav W32.AIDetectVM.malware
CAT-QuickHeal Trojan.URI.S11164847
ClamAV Win.Downloader.Upatre-5744087-0
Comodo TrojWare.Win32.TrojanDownloader.Upatre.NAO@5j4p21
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.8c5bdd
Cylance Unsafe
Cyren W32/S-e9202414!Eldorado
DrWeb Trojan.DownLoad3.30786
ESET-NOD32 a variant of Win32/Kryptik.BPUF
Emsisoft Gen:Variant.Jaik.26656 (B)
Endgame malicious (high confidence)
F-Prot W32/S-e9202414!Eldorado
F-Secure Trojan.TR/Spy.Zbot.repoa
FireEye Generic.mg.eb76df98c5bdda46
Fortinet W32/Krptik.AIX!tr
GData Gen:Variant.Jaik.26656
Ikarus Trojan-Spy.Zbot
Invincea heuristic
Jiangmin Trojan/Bublik.ghi
K7AntiVirus Trojan ( 00560bb51 )
K7GW Trojan ( 00560bb51 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=83)
Malwarebytes Trojan.Upatre.Generic
MaxSecure Trojan.Upatre.Gen
McAfee Downloader-FSH!EB76DF98C5BD
McAfee-GW-Edition BehavesLike.Win32.Downloader.qm
MicroWorld-eScan Gen:Variant.Jaik.26656
Microsoft TrojanDownloader:Win32/Upatre.A
NANO-Antivirus Trojan.Win32.DownLoad3.cqlouw
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM08.0.28C1.Malware.Gen
Rising Malware.FakePDF@CV!1.9C28 (RDMK:cmRtazqMH5cuOVWYpWew254L2h5i)
SentinelOne DFI - Malicious PE
Sophos Troj/Agent-AERX
Tencent Malware.Win32.Gencirc.10b4ae70
Trapmine malicious.high.ml.score
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2013-11-27 04:11:59

PE Imphash

6cdf1dd15060e16f29806defaf5d342d

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x00008000 0x00007000 6.4085138406792606
UPX1 0x00009000 0x00005000 0x00004800 3.3111239593213573
.rsrc 0x0000e000 0x00002000 0x00001400 4.543812463752353
.imports 0x00010000 0x00001000 0x00000600 3.9771569938713087

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000e0f0 0x00000ea8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x0000ef9c 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MANIFEST 0x0000efb4 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library KERNEL32.DLL:
0x406010 GetModuleHandleA
0x406014 GetStartupInfoA
0x406018 GetCommandLineA
0x40601c GetVersionExA
0x406020 GetProcAddress
0x406024 TerminateProcess
0x406028 GetCurrentProcess
0x40602c WriteFile
0x406030 GetStdHandle
0x406034 GetModuleFileNameA
0x406048 WideCharToMultiByte
0x40604c GetLastError
0x406054 SetHandleCount
0x406058 GetFileType
0x40605c HeapDestroy
0x406060 HeapCreate
0x406064 VirtualFree
0x40606c LoadLibraryA
0x406070 GetACP
0x406074 GetOEMCP
0x406078 GetCPInfo
0x40607c HeapAlloc
0x406080 VirtualAlloc
0x406084 HeapReAlloc
0x406088 RtlUnwind
0x40608c InterlockedExchange
0x406090 VirtualQuery
0x406094 HeapSize
0x406098 GetTickCount
0x40609c GetCurrentThreadId
0x4060a0 GetCurrentProcessId
0x4060a4 LCMapStringA
0x4060a8 MultiByteToWideChar
0x4060ac LCMapStringW
0x4060b0 GetStringTypeA
0x4060b4 GetStringTypeW
0x4060b8 GetLocaleInfoA
0x4060bc VirtualProtect
0x4060c0 GetSystemInfo
0x4060c8 HeapFree
0x4060cc ExitProcess
Library GDI32.dll:
0x406000 TextOutW
0x406004 Rectangle
Library USER32.dll:
0x4060d4 DefWindowProcW
0x4060d8 DispatchMessageW
0x4060dc DrawTextW
0x4060e0 EndPaint
0x4060e4 GetClientRect
0x4060e8 GetMessageW
0x4060ec GetWindowRect
0x4060f0 PostQuitMessage
0x4060f4 RegisterClassExW
0x4060f8 TranslateMessage
0x4060fc GetSystemMetrics
0x406100 CharLowerW
0x406104 BeginPaint
0x406108 CreateWindowExW

L!This program cannot be run in DOS mode.
nOnOnO6
OnOoOnO
OnO1OnOaOnOOnOOnOOnORichnO
.imports
WYmSZ]
33PPPW
hWVY8@
jMQPRL
UjUu>UP;
&SZh`@
SSQQQQh
VYeVZ]
5E[^_h8
UE3+3I
][[ptkE
VZ}3}EPq@
VZE3E3;
f8MZuH<
XPuVVP
;ru,h+@
;r3_^UV3F95
@<Yv"P
^[]VW39=
t.t$<"u
u_^S39
3Y]_^[5@
@B8\t8"u&
_[UQQSVW39=
3_^[QQ@
SUVW=P`@
SSS+S@PVSSD$4
t#SSUPt$$VSS
_^][YY
;rSVWD$
_^3[Dj
33@h,@
+SVWEePEEEEd
Y_^[QVC20XC00U
33333]^]
]_^[]UL$
VWumhx@
_^[W|$
tAt2t$
Wj@3Y@
t6SUW
VPVPV5@
@;rD3Ar
@;rM^U
@;vAAy
YYUWVu
DDDDDDDDDDDDDD
W3;u4DP
^_UQQM
MOI;|9M
3@_^[U
WI <}}
MLD3#um
#Mj _^{
;]r;]u&
]#\D\D
_^[USVWUj
Pjh0F@
t.;t$$t(4v
EtVMf9MZ
_^[S\$
1VtYt(CH;r
PSWSvSU
PSWSUX
Yu3^_][
=N@uNVEP
E3E35@@
3;tMu
VSVWVV|h
u8SS3FVh
?P4YE;t@E
t!SS9]
u5Y9]t
E;tSSu
me}VSW
33M;u#u
Y;t1uSW
EPWu u
u9]t#WY
u5EP3GWh
V~YEn]
3@3UWVu
r)$LS@
DDDDDDDDDDDDDD
MQP5x`@
WWWWVSWu
YYE;t2WWVPVSWu
ULSVWj
MQ@Puu
e_^[SVt$
F3w9=@
SNYu+Vj
_^[Vt$
SVWSD$
lhd!u}
PhX!3V
SPjVPuPW
d VVhS
WPuMDEP0
PE;SVE
|uuyPE39DP
SVu;Et
dleWiteF
etReprinx"
itPretQu#
Direh#
adFiHttpu
lstpQul
File,"
lsuleFptioa
eryIeryO
odulteW
ClosCrea
ocespPatUSER[
eSizHeap #
SetOileNte
ellEtfW
Creaile
GetCur"
32.dhW
SendHeap
InMMNET.
ternEEtW
nnecWINIenW
f2n2x3
30022C1k1
00g0s0
10033111110>022003
3QQWUEMM
xgWZmt&&
VYE5PA5EMME
tj&u~U
WYE5PA
E^_[SWVu
t>r-st>r
EMM5EMM+
VZE5PA
PAM[^_
SZ-SZWY
VZVYWZSZRVYV
U.VZE5PA5EMEEPEAEP
EQkUME}tEjM
|tt?tM
UWZE5PA
CorExitProcess
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- This application cannot run using the active version of the Microsoft .NET Runtime
Please contact the application's support team for more information.
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
Program:
A buffer overrun has been detected which has corrupted the program's
internal state. The program cannot safely continue execution and must
now be terminated.
Buffer overrun detected!
A security error of unknown cause has been detected which has
corrupted the program's internal state. The program cannot safely
continue execution and must now be terminated.
Unknown security failure detected!
QueryPerformanceCounter
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetSystemTimeAsFileTime
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetSystemPowerStatus
HeapFree
ExitProcess
TextOutW
Rectangle
DefWindowProcW
DispatchMessageW
DrawTextW
EndPaint
GetClientRect
GetMessageW
GetWindowRect
PostQuitMessage
RegisterClassExW
TranslateMessage
GetSystemMetrics
CharLowerW
BeginPaint
CreateWindowExW
`.rdata
@.data
-6MEEEE8f2n2x3
30022C1k1o<00g0s0
3D311
0L0Y00
10033111110>022wv00A1_0
WZm)t?&&M'"|
o^5 A5^
}c/?uP>q
tjh&u~[U
#y6\v6D
Z{)Y-M
a7}w9j^Pv^
(a6M=#rD"vo~
nS0Kn
)tf+h,H?+-
_=;|!
ttt>r-s
Up)UmP5
%m_#;L
[!V\U(
Z+t!;M,5l
yh]h[6W
bde.K;
Tf9t?&
`&EPBA
j]Y\afTee
`7lit:I
Zmr\nmsc
ee.VVui
SINGw5OMA
- This wplicaJ-
vh using thnac
M3Rsmjk
7k.?`'n
'm fm _lkk
m#.8v;WabS.o#ifmaJz
UTmo'7e
ughbpX>ze[lowi8_)76stdv5puviu!
4__*e^k/X
v19op?P
desc+8D6F$ed
&uh/loB
8n`g@way.;h)A09
|f*e-+8&>argu(sW2k&Wxf5n
Mh]lt:
sLibrVy'
gm:6{{.
dP.klwn>=7+
namGeCWd3St/|
UcrObj
tAPvm]b
FQangeBox1uH32
A buff+C[3Z
&LA. kJ
ea`qly@.u(
hO\~@k
eMiM{%3No7N
I"J@.@
yui\z'
8`y??yv/@~@o
^_o__j291
QueryP9
nceCou
.m6dLin!
Wrfg&pd
NampUnh
nTeEfGVngs
/|+Wid
1R0k]:S
TypBmE1D,oy
/hSyemTis>im((
4LcMACP
\~5Wc[
RtlMwi
kWagTb,/:6+*`
$Zeo&l"WE
kg!{>A
x`ut5nRT
NfA{8#DispW@{
E(Pai3li
i k}gd@a
/]bTnslI#5d
uL/BAn
*Kbsa_
%&'[P@
XPTPSWXaD$j
Ji]JJJ`yx
6}}}}}|f00}}}}}}}}}}|G11|}}}}}}}}}}}}}508w}}}}}}}}}}}}}}38Gj}}}}}}}}}}}}}}}38jg}}}}}}}}}}}}}}}4FfG}}}}}}}}}}}}}}}}}9:9h}}}{q{{q{{q{{{{{{bEK{{{{}{{nnnnnnnnnnnnnnnnnnnnnq{}}}}}}}}
l{}{{{{{{{
w{{l{ppppppq
q{qpnlUUUUln
pqnlTRQQQRTX
pplRQNMMMORV
pnTQML
nlRRQRTpp
!!!!!!!!%d!%iz!!
!!!!!!!
""""""""D"~=""A"""""""
lUQ{W"##############################"lUQ{k#5555555555555555555555555555555nURn5<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<5llnplllllllllllllllllnllqpn{p{}{{{{{{{{{{{{{}{{}{{qqo{{{{{{{{{{{{{{{{}{}{{{m
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PA
KERNEL32.DLL
GDI32.dll
USER32.dll
LoadLibraryA
GetProcAddress
VirtualProtect
VirtualAlloc
VirtualFree
ExitProcess
TextOutW
EndPaint
KERNEL32.DLL
QueryPerformanceCounter
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetSystemTimeAsFileTime
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetSystemPowerStatus
HeapFree
ExitProcess
GDI32.dll
TextOutW
Rectangle
USER32.dll
DefWindowProcW
DispatchMessageW
DrawTextW
EndPaint
GetClientRect
GetMessageW
GetWindowRect
PostQuitMessage
RegisterClassExW
TranslateMessage
GetSystemMetrics
CharLowerW
BeginPaint
CreateWindowExW
apxeie
/i/*\%
ctextr
((((( H
h(((( H
H
Bzanuce
Nemidebcaza
c:\sample.exe
C:\5edb4722aecbb744d46359ba0517508d87a587182712446ec58c28307b5384d8
C:\630778291904d95010196e4f86a6bbd5d8e0f584f59cd8e5bcd0f0658203c6ea
C:\0f62d082c6d6f9b3032b932ba53262c08d3dcd26dadb7388feba8e2bc8ab4185
C:\uXN1TniB.exe
C:\UNgxK_De.exe
C:\bfgcMhTl.exe
C:\6YpZE1xm.exe
C:\ed96913f9fa4ce8521998d5f62a5ec45c601e3fdfe4ff560d08807e87290f1a6
C:\7075e39a2a8f23572dd775e7ad6b17379cc9b87c1ebea9349f47d23288bbe176
C:\982bb98d96f5c7024b705175b966d0ffa2dec4ef177036aa45ec0d428740738f
C:\9fe2ffb18287908a0c8a82e50232098849707ccf3c5de52e27573aa709eaf1a3
c:\analyse\1549552815.1699843_8ee540b9-5f9b-418a-817b-0e60a7119af7
C:\Ku7sSqnf.exe
C:\fdffa7f7e91dfa11a384bbb2455e917e489ea3676c4efee472614163e5cddde9
C:\661de7bbe3fdf3c5a05006a338e1f60c753d05e48626d26dc2b33b4b1f0ee5e7
C:\SR2DhVwc.exe
C:\80a7d32d17b160c58003e48f3a494966a540b4185ab91d3cfebca8483516ae97
C:\7b43080e49bba8f030788002847fde0b7fa5719c594bcf15899bb968727d149f
C:\sjJstrSJ.exe
C:\73bd389959f08042678483879b92161986e8db85f71f72c50429f8618033201d
C:\anIaa_fn.exe
C:\24940a16984050330e031b5a3b596816a0886b15a24f2cda3613a5fb9e99a343
C:\8cbf03ab3387e89385eaab110ebff734ecba13f585faa4c1ea79bd241081b9cd
C:\0083bca65d1d847f48304f5ad8bf2472626f3e88ca73085bc73bcbe748b274e1
C:\5a75ff220bdc2546553dbb1c6f597619dd6548718633b2731e1e8208eabfd6c5
C:\237a8543c448fd5d8e84c12b88c8c961aa2c14cead2031a89b5cd215568ccac9
C:\Users\admin\Downloads\94b6d0017ff9728ccb711e4db2a5ef5fb521391bb329e5ae71d664f12ab98e5b.exe
C:\1d42baef35865817439a333447a258a593095205289edf52eae30f778880a536
C:\Users\admin\Downloads\apsoct.exe
C:\56bb0a499a0ff3d36c47b5cc5879e7f4be44dbf03ce3bad132e81012f803eae3
C:\f6e1b894f1181403ad159072f3bf89e9b9e167b1da49cd162c41fd812a6ba46a
C:\5855be5162f78e04621d47fa818b3e0bc02d3741577735a77fbf2ae0f9b6fb07
C:\Users\admin\Downloads\apsoct.exe
C:\Users\admin\Downloads\d58b677a5e391b5d6db6b4a73eb4926d71a26ede4139bf2ab2b00fd21d5fe526.exe
C:\Users\Petra\AppData\Local\Temp\apsoct.pe32
C:\c01bdbde3be17f2b2531a840af09ed25277d29693742fab6aa3c935e46e5393e

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.