5.6
高危

9f2bd06010d5dd76170b35e9b74727b9e4f36898ba7d69823a8764820c43b9dc

f356499f01d6a0db0203e0b6d6a0236c.exe

分析耗时

52s

最近分析

文件大小

2.9MB
静态报毒 动态报毒 ARTEMIS BITREPEYP BSCOPE CHINA CLOUD EJTCZV ELDORADO GENERIC PUA CK MALICIOUS PRESENOKER SILENTINSTALL UNSAFE YIWANZHUSHOU 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!F356499F01D6 20210311 6.0.6.653
Alibaba 20190527 0.3.0.5
Avast 20210311 21.1.5827.0
Tencent 20210311 1.0.0.1
Baidu 20190318 1.0.0.2
Kingsoft 20210311 2017.9.26.565
CrowdStrike 20210203 1.0
静态指标
行为判定
动态指标
Checks for known Chinese AV sofware registry keys (1 个事件)
regkey .*360Safe
Foreign language identified in PE resource (4 个事件)
name CNO language LANG_CHINESE offset 0x001c84d0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000060
name CNO language LANG_CHINESE offset 0x001c84d0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000060
name XLDL language LANG_CHINESE offset 0x001c8530 filetype Zip archive data, at least v2.0 to extract sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0012d3ef
name RT_VERSION language LANG_CHINESE offset 0x00307118 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000300
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.959455206550417 section {'size_of_data': '0x0013f800', 'virtual_address': '0x001c8000', 'entropy': 7.959455206550417, 'name': '.rsrc', 'virtual_size': '0x0013f7c4'} description A section with a high entropy has been found
entropy 0.43536024527337763 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (3 个事件)
host 113.108.239.196
host 172.217.24.14
host 217.69.139.110
Checks the version of Bios, possibly for anti-virtualization (1 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
Checks the CPU name from registry, possibly for anti-virtualization (1 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString
File has been identified by 22 AntiVirus engines on VirusTotal as malicious (22 个事件)
CAT-QuickHeal Trojan.Agent
McAfee Artemis!F356499F01D6
Cylance Unsafe
Sangfor PUP.Win32.Presenoker.mt
K7AntiVirus Unwanted-Program ( 004fbd881 )
K7GW Unwanted-Program ( 004fbd881 )
Cyren W32/Yiwanzhushou.A.gen!Eldorado
APEX Malicious
NANO-Antivirus Trojan.Win32.Agent.ejtczv
Paloalto generic.ml
Sophos Generic PUA CK (PUA)
McAfee-GW-Edition Artemis
Emsisoft Application.SilentInstall (A)
Gridinsoft PUP.Win32.Downloader.dd!n
Microsoft PUA:Win32/Presenoker
ViRobot Adware.Yiwanzhushou.3012352.B
ESET-NOD32 a variant of Win32/Yiwanzhushou.A potentially unwanted
VBA32 BScope.Adware.Bitrepeyp
Rising PUA.Yiwanzhushou!8.DE6F (CLOUD)
Ikarus PUA.Yiwanzhushou
Fortinet Riskware/Yiwanzhushou
Webroot Pua.Gen
Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) (1 个事件)
dead_host 36.110.213.203:80
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2016-02-01 16:45:05

Imports

Library KERNEL32.dll:
0x551088 GetTempPathW
0x55108c GetTempFileNameW
0x551094 MultiByteToWideChar
0x551098 WideCharToMultiByte
0x55109c DecodePointer
0x5510a8 GetProcAddress
0x5510ac GetCurrentProcessId
0x5510b0 GetCurrentThreadId
0x5510b4 lstrcmpiW
0x5510b8 LoadLibraryExW
0x5510bc GetModuleHandleW
0x5510c0 CreateMutexA
0x5510c4 CloseHandle
0x5510c8 OpenProcess
0x5510cc SizeofResource
0x5510d0 LoadResource
0x5510d4 WaitForSingleObject
0x5510ec ResumeThread
0x5510f0 GetLastError
0x5510f4 SetThreadPriority
0x5510f8 RaiseException
0x5510fc GetProcessHeap
0x551100 HeapSize
0x551104 HeapFree
0x551108 HeapReAlloc
0x55110c HeapAlloc
0x551110 HeapDestroy
0x551114 GlobalFree
0x551118 FreeLibrary
0x55111c LockResource
0x551124 FindResourceExW
0x551128 FindResourceW
0x55112c FindResourceA
0x551130 OutputDebugStringW
0x551134 LocalFree
0x551138 GetFullPathNameA
0x55113c SetEndOfFile
0x551144 GetFullPathNameW
0x551150 SetStdHandle
0x551164 GetCommandLineW
0x551168 GetStartupInfoW
0x55116c ReadConsoleW
0x551170 SetFilePointerEx
0x551174 GetConsoleMode
0x551178 GetConsoleCP
0x55117c FlushFileBuffers
0x551180 GetOEMCP
0x551184 GetACP
0x551188 IsValidCodePage
0x55118c GetCurrentThread
0x551190 ExitProcess
0x551194 WriteConsoleW
0x551198 GetModuleHandleExW
0x55119c FindFirstFileExW
0x5511a0 EnumSystemLocalesW
0x5511a4 GetUserDefaultLCID
0x5511a8 IsValidLocale
0x5511ac GetLocaleInfoW
0x5511b0 LCMapStringW
0x5511b4 CompareStringW
0x5511b8 GetTimeFormatW
0x5511bc GetDateFormatW
0x5511c0 CreateSemaphoreW
0x5511c4 TlsFree
0x5511c8 TlsSetValue
0x5511cc TlsGetValue
0x5511d0 TlsAlloc
0x5511dc GetCPInfo
0x5511e0 FatalAppExitA
0x5511f4 PeekNamedPipe
0x5511f8 GetFileType
0x551200 CreateProcessW
0x551204 GetModuleFileNameW
0x55120c AreFileApisANSI
0x551210 RtlUnwind
0x551214 ExitThread
0x551218 CreateThread
0x55121c VirtualQuery
0x551220 VirtualProtect
0x551224 VirtualAlloc
0x55122c OpenFile
0x551230 DuplicateHandle
0x551234 CreateFileW
0x551238 DeleteFileW
0x55123c GetSystemInfo
0x551240 GetTempPathA
0x551244 GetTempFileNameA
0x551248 GetTickCount
0x55124c Sleep
0x55125c Process32FirstW
0x551260 Process32NextW
0x551264 GetExitCodeProcess
0x551268 lstrcpyW
0x55126c lstrcatW
0x551270 FindFirstFileW
0x551274 FindClose
0x551278 FindNextFileW
0x55127c LoadLibraryW
0x551280 WriteFile
0x551284 ReadFile
0x551288 SetFilePointer
0x55128c CreateEventW
0x551290 SetEvent
0x551294 CreatePipe
0x55129c GetStdHandle
0x5512a0 GetModuleFileNameA
0x5512a4 CreateProcessA
0x5512a8 ResetEvent
0x5512ac GlobalAlloc
0x5512b0 GetLocalTime
0x5512b4 VerSetConditionMask
0x5512b8 VerifyVersionInfoW
0x5512c0 CreateFileA
0x5512c4 GetFileSize
0x5512c8 IsDebuggerPresent
0x5512cc GetStringTypeW
0x5512d0 EncodePointer
0x5512d4 DeviceIoControl
0x5512d8 lstrcmpA
0x5512dc lstrcmpiA
0x5512e0 lstrlenA
0x5512e4 lstrlenW
0x5512e8 SetLastError
0x5512ec CreateDirectoryW
0x5512f0 RemoveDirectoryW
0x5512f4 SetFileAttributesW
0x5512f8 GetFileAttributesW
0x5512fc MoveFileW
0x551300 MoveFileExW
0x551308 GetDriveTypeW
0x55130c GetDiskFreeSpaceExW
0x551310 GetStartupInfoA
0x551320 MapViewOfFile
0x551324 UnmapViewOfFile
0x551328 CreateFileMappingW
0x55132c SetFileTime
0x551338 GetCurrentProcess
0x55133c TerminateProcess
0x551344 FreeResource
Library USER32.dll:
0x551440 IsWindowVisible
0x551444 GetWindow
0x551448 GetDesktopWindow
0x55144c GetPropA
0x551450 IsIconic
0x551454 ShowWindow
0x551458 GetWindowLongW
0x55145c SetWindowPos
0x551460 PostMessageW
0x551468 PeekMessageW
0x55146c TranslateMessage
0x551470 DispatchMessageW
0x551474 wsprintfW
0x551478 EnumDisplayDevicesW
0x55147c GetDC
0x551480 ReleaseDC
0x551484 RemovePropA
0x551488 LoadCursorW
0x55148c RegisterClassW
0x551490 CreateWindowExW
0x551494 IsWindow
0x551498 UnregisterClassW
0x55149c DestroyWindow
0x5514a0 CharNextW
0x5514a4 DefWindowProcW
0x5514a8 FindWindowW
0x5514ac LoadIconW
Library ADVAPI32.dll:
0x551000 OpenProcessToken
0x551004 RegQueryValueExW
0x551008 OpenSCManagerW
0x55100c OpenServiceW
0x551010 CloseServiceHandle
0x551014 DeleteService
0x551018 QueryServiceStatus
0x55101c RegSetValueExW
0x551020 RegQueryInfoKeyW
0x551024 RegOpenKeyExW
0x551028 RegEnumKeyExW
0x55102c RegDeleteValueW
0x551030 RegDeleteKeyW
0x551034 RegCreateKeyExW
0x551038 RegQueryValueExA
0x55103c RegOpenKeyExA
0x551040 RegCloseKey
0x551048 ControlService
0x55104c RegEnumKeyExA
Library SHELL32.dll:
0x5513a8 SHFileOperationW
0x5513b8 CommandLineToArgvW
Library ole32.dll:
0x551588 CoInitialize
0x55158c CoCreateInstance
0x551590 CoTaskMemAlloc
0x551594 CoTaskMemRealloc
0x551598 CoTaskMemFree
0x55159c CreateBindCtx
0x5515a0 CoInitializeEx
0x5515a4 CoSetProxyBlanket
0x5515ac CoCreateGuid
0x5515b0 CoUninitialize
Library OLEAUT32.dll:
0x551354 CreateErrorInfo
0x551358 SetErrorInfo
0x55135c GetErrorInfo
0x551360 VariantChangeType
0x551364 VariantClear
0x551368 SysFreeString
0x55136c VarUI4FromStr
0x551370 VariantInit
0x551374 SysAllocString
Library SHLWAPI.dll:
0x5513c0 StrToIntExW
0x5513c4 PathIsRelativeA
0x5513c8 PathIsRelativeW
0x5513cc SHGetValueA
0x5513d0 PathIsRootW
0x5513d4 PathIsUNCA
0x5513d8 PathIsUNCW
0x5513dc PathIsNetworkPathA
0x5513e0 SHSetValueA
0x5513e4 PathCombineW
0x5513e8 PathFileExistsA
0x5513ec PathFindFileNameW
0x5513f0 PathIsDirectoryA
0x5513f4 PathIsRootA
0x5513f8 PathIsNetworkPathW
0x5513fc PathIsURLA
0x551400 PathIsURLW
0x551404 PathRelativePathToW
0x551408 PathRemoveFileSpecA
0x55140c StrStrA
0x551410 StrStrIA
0x551414 PathAddBackslashW
0x551418 PathAppendW
0x55141c PathAddBackslashA
0x551420 StrStrIW
0x551424 PathFileExistsW
0x551428 PathAppendA
0x55142c StrCpyW
0x551430 PathRemoveFileSpecW
0x551434 PathIsDirectoryW
Library COMCTL32.dll:
Library OPENGL32.dll:
0x55137c wglDeleteContext
0x551380 wglMakeCurrent
0x551384 wglCreateContext
Library WS2_32.dll:
0x5514e8 getnameinfo
0x5514ec socket
0x5514f0 setsockopt
0x5514f4 sendto
0x5514f8 WSAConnect
0x5514fc WSACreateEvent
0x551504 WSAEventSelect
0x55150c WSARecv
0x551510 WSAResetEvent
0x551514 WSASend
0x551518 WSASetEvent
0x55151c WSASocketW
0x551520 getaddrinfo
0x551524 freeaddrinfo
0x551528 shutdown
0x55152c send
0x551530 WSACloseEvent
0x551534 WSAGetLastError
0x551538 WSASetLastError
0x55153c WSACleanup
0x551540 WSAStartup
0x551544 closesocket
0x551548 gethostname
0x55154c recvfrom
0x551550 recv
0x551554 ntohs
0x551558 ntohl
0x55155c listen
0x551560 accept
0x551564 bind
0x551568 connect
0x55156c ioctlsocket
0x551570 getpeername
0x551574 getsockname
0x551578 getsockopt
0x55157c htonl
0x551580 htons
Library WINMM.dll:
0x5514dc timeEndPeriod
0x5514e0 timeBeginPeriod
Library VERSION.dll:
0x5514b4 GetFileVersionInfoW
0x5514b8 VerQueryValueW
Library WININET.dll:
0x5514c4 InternetOpenW
0x5514c8 HttpQueryInfoW
0x5514cc InternetReadFile
0x5514d0 InternetOpenUrlW
0x5514d4 InternetCloseHandle
Library IPHLPAPI.DLL:
0x55107c GetAdaptersInfo
Library urlmon.dll:
0x5515bc CreateURLMoniker
Library SETUPAPI.dll:
0x551398 CM_Get_Device_IDW
Library NETAPI32.dll:
0x55134c Netbios
Library GDI32.dll:
0x551068 GetStockObject
0x55106c ChoosePixelFormat
0x551070 SetPixelFormat
0x551074 SwapBuffers

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
217.69.139.110 443 192.168.56.101 49173

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57874 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.