10.0
0-day

1ee75106a9113b116c54e7a5954950065b809e0bb4dd0a91dc76f778508c7954

f9e6c35dbb62101498ec755152a8a67b.exe

分析耗时

23s

最近分析

文件大小

308.0KB
静态报毒 动态报毒 AGENERIC AI SCORE=100 AIDETECTVM AQJQ ARTEMIS AUMKK BLINDINGCAN01 BSCOPE CONFIDENCE CRYPTINJECT CRYPTO EANSPF EGXY GEN2 HIGH CONFIDENCE KCLOUD MALWARE2 NUKESPED POSSIBLETHREAT QVM41 R + TROJ R002C0OHE20 R173163 SCORE SIGGEN6 STATIC AI SUSPICIOUS PE TBALP4CEXAU TQ0@AAFZRXDO TRJGEN UNSAFE VOLGMER VWSF7BTI8ND ZEXAF ZPACK 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!F9E6C35DBB62 20201119 6.0.6.653
Alibaba Trojan:MSIL/CryptInject.0b508713 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_80% (W) 20190702 1.0
Baidu 20190318 1.0.0.2
Avast Win32:Malware-gen 20201119 20.10.5736.0
Tencent Win32.Trojan.Crypt.Egxy 20201119 1.0.0.1
Kingsoft Win32.Troj.Generic_a.a.(kcloud) 20201119 2017.9.26.565
静态指标
Queries for the computername (1 个事件)
Time & API Arguments Status Return Repeated
1620809372.04956
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
Checks if process is being debugged by a debugger (1 个事件)
Time & API Arguments Status Return Repeated
1620809372.04956
IsDebuggerPresent
failed 0 0
Command line console output was observed (50 out of 482 个事件)
Time & API Arguments Status Return Repeated
1620840299.668502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840299.668502
WriteConsoleW
buffer: del
console_handle: 0x00000007
success 1 0
1620840299.668502
WriteConsoleW
buffer: /F "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840299.746502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe
console_handle: 0x00000007
success 1 0
1620840299.778502
WriteConsoleW
buffer: 拒绝访问。
console_handle: 0x0000000b
success 1 0
1620840299.793502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840299.793502
WriteConsoleW
buffer: if
console_handle: 0x00000007
success 1 0
1620840299.793502
WriteConsoleW
buffer: exist "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840299.793502
WriteConsoleW
buffer: goto
console_handle: 0x00000007
success 1 0
1620840299.793502
WriteConsoleW
buffer: L1
console_handle: 0x00000007
success 1 0
1620840299.825502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840299.825502
WriteConsoleW
buffer: del
console_handle: 0x00000007
success 1 0
1620840299.825502
WriteConsoleW
buffer: /F "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840299.871502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe
console_handle: 0x00000007
success 1 0
1620840299.887502
WriteConsoleW
buffer: 拒绝访问。
console_handle: 0x0000000b
success 1 0
1620840299.903502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840299.903502
WriteConsoleW
buffer: if
console_handle: 0x00000007
success 1 0
1620840299.903502
WriteConsoleW
buffer: exist "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840299.903502
WriteConsoleW
buffer: goto
console_handle: 0x00000007
success 1 0
1620840299.903502
WriteConsoleW
buffer: L1
console_handle: 0x00000007
success 1 0
1620840299.918502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840299.918502
WriteConsoleW
buffer: del
console_handle: 0x00000007
success 1 0
1620840299.934502
WriteConsoleW
buffer: /F "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840299.965502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe
console_handle: 0x00000007
success 1 0
1620840299.965502
WriteConsoleW
buffer: 拒绝访问。
console_handle: 0x0000000b
success 1 0
1620840300.012502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840300.012502
WriteConsoleW
buffer: if
console_handle: 0x00000007
success 1 0
1620840300.012502
WriteConsoleW
buffer: exist "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840300.012502
WriteConsoleW
buffer: goto
console_handle: 0x00000007
success 1 0
1620840300.012502
WriteConsoleW
buffer: L1
console_handle: 0x00000007
success 1 0
1620840300.028502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840300.059502
WriteConsoleW
buffer: del
console_handle: 0x00000007
success 1 0
1620840300.059502
WriteConsoleW
buffer: /F "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840300.121502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe
console_handle: 0x00000007
success 1 0
1620840300.121502
WriteConsoleW
buffer: 拒绝访问。
console_handle: 0x0000000b
success 1 0
1620840300.137502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840300.153502
WriteConsoleW
buffer: if
console_handle: 0x00000007
success 1 0
1620840300.153502
WriteConsoleW
buffer: exist "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840300.153502
WriteConsoleW
buffer: goto
console_handle: 0x00000007
success 1 0
1620840300.153502
WriteConsoleW
buffer: L1
console_handle: 0x00000007
success 1 0
1620840300.168502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840300.168502
WriteConsoleW
buffer: del
console_handle: 0x00000007
success 1 0
1620840300.168502
WriteConsoleW
buffer: /F "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840300.200502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe
console_handle: 0x00000007
success 1 0
1620840300.200502
WriteConsoleW
buffer: 拒绝访问。
console_handle: 0x0000000b
success 1 0
1620840300.215502
WriteConsoleW
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp>
console_handle: 0x00000007
success 1 0
1620840300.215502
WriteConsoleW
buffer: if
console_handle: 0x00000007
success 1 0
1620840300.215502
WriteConsoleW
buffer: exist "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe"
console_handle: 0x00000007
success 1 0
1620840300.215502
WriteConsoleW
buffer: goto
console_handle: 0x00000007
success 1 0
1620840300.215502
WriteConsoleW
buffer: L1
console_handle: 0x00000007
success 1 0
The executable uses a known packer (1 个事件)
packer Armadillo v1.71
The file contains an unknown PE resource name possibly indicative of a packer (1 个事件)
resource name MYRES
One or more processes crashed (1 个事件)
Time & API Arguments Status Return Repeated
1620809372.01856
__exception__
stacktrace:
f9e6c35dbb62101498ec755152a8a67b+0x1d31 @ 0x401d31
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1638076
registers.edi: 0
registers.eax: 1447909480
registers.ebp: 1638128
registers.edx: 22104
registers.ebx: 0
registers.esi: 0
registers.ecx: 10
exception.instruction_r: ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a eb 0b
exception.symbol: f9e6c35dbb62101498ec755152a8a67b+0x1bd2
exception.instruction: in eax, dx
exception.module: f9e6c35dbb62101498ec755152a8a67b.exe
exception.exception_code: 0xc0000096
exception.offset: 7122
exception.address: 0x401bd2
success 0 0
行为判定
动态指标
Foreign language identified in PE resource (6 个事件)
name RT_ICON language LANG_KOREAN offset 0x0003a228 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_KOREAN size 0x00000568
name RT_ICON language LANG_KOREAN offset 0x0003a228 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_KOREAN size 0x00000568
name RT_ICON language LANG_KOREAN offset 0x0003a228 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_KOREAN size 0x00000568
name RT_ICON language LANG_KOREAN offset 0x0003a228 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_KOREAN size 0x00000568
name RT_GROUP_ICON language LANG_KOREAN offset 0x0003a790 filetype data sublanguage SUBLANG_KOREAN size 0x0000003e
name RT_VERSION language LANG_KOREAN offset 0x000391d0 filetype data sublanguage SUBLANG_KOREAN size 0x000003a0
Creates executable files on the filesystem (2 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\msdtcvtre.bat
file C:\Windows\System32\Ntmssvc.dll
Creates a service (1 个事件)
Time & API Arguments Status Return Repeated
1620809372.76856
CreateServiceW
service_start_name: LocalSystem
start_type: 2
service_handle: 0x0031f9e8
display_name: Protocol Security Service
error_control: 1
service_name: Ntmssvc
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\%SystemRoot%\System32\svchost.exe -k netsvcs
filepath_r: %SystemRoot%\System32\svchost.exe -k netsvcs
service_manager_handle: 0x0031f880
desired_access: 983551
service_type: 32
password:
success 3275240 0
Drops a binary and executes it (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\msdtcvtre.bat
Drops an executable to the user AppData folder (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\f9e6c35dbb62101498ec755152a8a67b.exe
A process created a hidden window (1 个事件)
Time & API Arguments Status Return Repeated
1620809373.76856
ShellExecuteExW
parameters:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\msdtcvtre.bat
filepath_r: C:\Users\ADMINI~1.OSK\AppData\Local\Temp\msdtcvtre.bat
show_type: 0
success 1 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.937093437452297 section {'size_of_data': '0x00037000', 'virtual_address': '0x00039000', 'entropy': 7.937093437452297, 'name': '.rsrc', 'virtual_size': '0x00036050'} description A section with a high entropy has been found
entropy 0.7236842105263158 description Overall entropy of this PE file is high
Checks for the Locally Unique Identifier on the system for a suspicious privilege (1 个事件)
Time & API Arguments Status Return Repeated
1620809372.08056
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Attempts to stop active services (1 个事件)
Time & API Arguments Status Return Repeated
1620809372.09656
ControlService
service_handle: 0x0031f920
service_name: PcaSvc
control_code: 1
success 1 0
Installs itself for autorun at Windows startup (2 个事件)
reg_key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ntmssvc\Parameters\ServiceDll reg_value C:\Windows\system32\Ntmssvc.dll
service_name Ntmssvc service_path C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\%SystemRoot%\System32\svchost.exe -k netsvcs
Detects VirtualBox through the presence of a device (1 个事件)
file \??\VBoxMiniRdrDn
Detects VirtualBox through the presence of a file (1 个事件)
dll VboxHook.dll
Detects VMWare through the in instruction feature (1 个事件)
Time & API Arguments Status Return Repeated
1620809372.01856
__exception__
stacktrace:
f9e6c35dbb62101498ec755152a8a67b+0x1d31 @ 0x401d31
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1638076
registers.edi: 0
registers.eax: 1447909480
registers.ebp: 1638128
registers.edx: 22104
registers.ebx: 0
registers.esi: 0
registers.ecx: 10
exception.instruction_r: ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a eb 0b
exception.symbol: f9e6c35dbb62101498ec755152a8a67b+0x1bd2
exception.instruction: in eax, dx
exception.module: f9e6c35dbb62101498ec755152a8a67b.exe
exception.exception_code: 0xc0000096
exception.offset: 7122
exception.address: 0x401bd2
success 0 0
Generates some ICMP traffic
File has been identified by 57 AntiVirus engines on VirusTotal as malicious (50 out of 57 个事件)
Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Generic.15806083
FireEye Generic.mg.f9e6c35dbb621014
CAT-QuickHeal Trojan.Generic
McAfee Artemis!F9E6C35DBB62
Cylance Unsafe
Zillya Trojan.Generic.Win32.314715
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Trojan:MSIL/CryptInject.0b508713
K7GW Riskware ( 0040eff71 )
CrowdStrike win/malicious_confidence_80% (W)
Arcabit Trojan.Generic.DF12E83
TrendMicro TROJ_GEN.R002C0OHE20
Symantec Trojan.Volgmer.B
APEX Malicious
Avast Win32:Malware-gen
ClamAV Win.Trojan.BLINDINGCAN01-9448730-1
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Trojan.Generic.15806083
NANO-Antivirus Trojan.Win32.TrjGen.eanspf
Paloalto generic.ml
Tencent Win32.Trojan.Crypt.Egxy
Ad-Aware Trojan.Generic.15806083
Emsisoft Trojan.Generic.15806083 (B)
F-Secure Trojan.TR/Crypt.ZPACK.Gen2
DrWeb Trojan.Siggen6.56685
VIPRE Trojan.Win32.Generic!BT
Invincea Mal/Generic-R + Troj/Agent-AQJQ
McAfee-GW-Edition BehavesLike.Win32.Worm.fc
Sophos Troj/Agent-AQJQ
Ikarus Trojan.Win32.NukeSped
Jiangmin Trojan.Generic.aumkk
Webroot W32.Trojan.Gen
Avira TR/Crypt.ZPACK.Gen2
Antiy-AVL Trojan/Win32.AGeneric
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Microsoft Trojan:MSIL/CryptInject!MSR
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Trojan.Generic.15806083
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Agent.R173163
BitDefenderTheta Gen:NN.ZexaF.34634.tq0@aaFZrXdO
ALYac Trojan.Agent.315392C
MAX malware (ai score=100)
VBA32 BScope.Trojan.MSIL.CryptInject
ESET-NOD32 a variant of Win32/NukeSped.I
TrendMicro-HouseCall TROJ_GEN.R002C0OHE20
Rising Trojan.Crypto!8.364 (TFE:5:vWsF7bti8nD)
Yandex Trojan.Agent!TBalp4CeXaU
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2016-01-06 09:18:45

Imports

Library KERNEL32.dll:
0x40e018 GetFileSizeEx
0x40e01c SizeofResource
0x40e020 LockResource
0x40e024 LoadResource
0x40e028 FindResourceW
0x40e02c GetLastError
0x40e030 GetTickCount
0x40e034 SetErrorMode
0x40e038 SetFilePointer
0x40e03c GetFileType
0x40e040 DuplicateHandle
0x40e044 CreateFileW
0x40e048 FlushFileBuffers
0x40e04c ReadFile
0x40e050 WideCharToMultiByte
0x40e060 CreateDirectoryW
0x40e064 SetFileTime
0x40e068 WriteFile
0x40e06c MultiByteToWideChar
0x40e070 GetOEMCP
0x40e074 GetACP
0x40e078 GetComputerNameW
0x40e07c GetModuleHandleA
0x40e080 GetCurrentProcess
0x40e084 LoadLibraryA
0x40e088 CloseHandle
0x40e08c GetProcAddress
0x40e090 GetStartupInfoW
0x40e094 GetVersion
0x40e098 ExitProcess
0x40e09c RtlUnwind
0x40e0a8 HeapAlloc
0x40e0ac HeapFree
0x40e0b0 TerminateProcess
0x40e0b8 GetModuleFileNameW
0x40e0cc GetCommandLineW
0x40e0d0 GetCommandLineA
0x40e0d4 SetHandleCount
0x40e0d8 GetStdHandle
0x40e0dc GetStartupInfoA
0x40e0e4 GetCurrentThreadId
0x40e0e8 TlsSetValue
0x40e0ec TlsAlloc
0x40e0f0 SetLastError
0x40e0f4 TlsGetValue
0x40e0f8 GetModuleFileNameA
0x40e100 GetVersionExA
0x40e104 HeapDestroy
0x40e108 HeapCreate
0x40e10c VirtualFree
0x40e11c VirtualAlloc
0x40e120 HeapReAlloc
0x40e124 LCMapStringA
0x40e128 LCMapStringW
0x40e12c GetCPInfo
0x40e130 SetStdHandle
0x40e134 CreateFileA
0x40e138 GetStringTypeA
0x40e13c GetStringTypeW
0x40e140 SetEndOfFile
Library USER32.dll:
0x40e150 wsprintfW
Library ADVAPI32.dll:
0x40e008 RegOpenKeyW
0x40e00c RegCreateKeyExW
0x40e010 OpenProcessToken
Library SHELL32.dll:
0x40e148 ShellExecuteA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.