分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
URL win7-sp1-x64-hpdapp01-1 2020-01-16 23:21:55 2020-01-16 23:24:04 129 秒

魔盾分数

1.9

正常的

URL详细信息

URL
URL专业沙箱检测 -> https://www.meijuxq.com/

登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
www.gstatic.com A 203.208.43.120
A 203.208.43.119
A 203.208.43.111
A 203.208.43.127

摘要

登录查看详细行为信息

WHOIS 信息

Name: None
Country: None
State: None
City: None
ZIP Code: None
Address: None

Orginization: None
Domain Name(s):
    MEIJUXQ.COM
Creation Date:
    2019-12-05 05:40:19
Updated Date:
    2019-12-05 05:45:36
Expiration Date:
    2020-12-05 05:40:19
Email(s):
    abuse@godaddy.com

Registrar(s):
    GoDaddy.com, LLC
Name Server(s):
    F1G1NS1.DNSPOD.NET
    F1G1NS2.DNSPOD.NET
Referral URL(s):
    None
没有防病毒引擎扫描信息!

进程树


chrome.exe, PID: 2620, 上一级进程 PID: 2332
chrome.exe, PID: 2912, 上一级进程 PID: 2620

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49170 203.208.43.119 www.gstatic.com 443

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 49749 192.168.122.1 53

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
www.gstatic.com A 203.208.43.120
A 203.208.43.119
A 203.208.43.111
A 203.208.43.127

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49170 203.208.43.119 www.gstatic.com 443

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 49749 192.168.122.1 53

HTTP 请求

未发现HTTP请求.

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

无警报

TLS

Timestamp Source IP Source Port Destination IP Destination Port Version Issuer Subject Fingerprint
2020-01-16 23:22:24.879962+0800 192.168.122.201 49170 203.208.43.119 443 TLS 1.1 C=US, O=Google Trust Services, CN=GTS CA 1O1 C=US, ST=California, L=Mountain View, O=Google LLC, CN=*.google.com 7a:1f:a5:38:78:c6:e8:20:b0:70:bd:5f:5b:7a:34:4f:e4:a2:cf:ac

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 43.558 seconds )

  • 15.816 BehaviorAnalysis
  • 15.557 Suricata
  • 10.623 Static
  • 1.463 NetworkAnalysis
  • 0.096 AnalysisInfo
  • 0.003 Memory

Signatures ( 6.263 seconds )

  • 0.856 api_spamming
  • 0.834 stealth_timeout
  • 0.603 antiav_detectreg
  • 0.438 mimics_filetime
  • 0.306 stealth_file
  • 0.291 antivm_generic_disk
  • 0.273 virus
  • 0.24 bootkit
  • 0.228 antivm_generic_scsi
  • 0.226 infostealer_ftp
  • 0.143 hancitor_behavior
  • 0.14 antivm_generic_services
  • 0.133 anormaly_invoke_kills
  • 0.13 infostealer_im
  • 0.126 antianalysis_detectreg
  • 0.083 maldun_anomaly_massive_file_ops
  • 0.075 infostealer_mail
  • 0.074 injection_createremotethread
  • 0.071 antiav_detectfile
  • 0.06 stack_pivot
  • 0.049 infostealer_bitcoin
  • 0.047 injection_runpe
  • 0.034 kibex_behavior
  • 0.032 ransomware_extensions
  • 0.03 antidbg_windows
  • 0.03 antivm_parallels_keys
  • 0.03 antivm_xen_keys
  • 0.03 darkcomet_regkeys
  • 0.028 antivm_vbox_files
  • 0.027 betabot_behavior
  • 0.026 rat_luminosity
  • 0.025 geodo_banking_trojan
  • 0.025 recon_fingerprint
  • 0.024 injection_explorer
  • 0.022 ransomware_files
  • 0.02 antivm_generic_diskreg
  • 0.017 vawtrak_behavior
  • 0.017 antisandbox_productid
  • 0.016 md_domain_bl
  • 0.015 md_url_bl
  • 0.013 process_needed
  • 0.012 antidbg_devices
  • 0.011 kovter_behavior
  • 0.011 antivm_vbox_keys
  • 0.011 antivm_vmware_keys
  • 0.011 rat_pcclient
  • 0.01 ipc_namedpipe
  • 0.01 anomaly_persistence_autorun
  • 0.01 infostealer_browser_password
  • 0.01 bypass_firewall
  • 0.01 antivm_xen_keys
  • 0.01 antivm_hyperv_keys
  • 0.01 antivm_vbox_acpi
  • 0.01 antivm_vpc_keys
  • 0.01 maldun_anormaly_invoke_vb_vba
  • 0.01 packer_armadillo_regkey
  • 0.009 network_tor
  • 0.009 ransomware_message
  • 0.009 securityxploded_modules
  • 0.009 recon_programs
  • 0.008 hawkeye_behavior
  • 0.008 sets_autoconfig_url
  • 0.008 antivm_generic_bios
  • 0.008 antivm_generic_cpu
  • 0.008 antivm_generic_system
  • 0.007 antivm_vbox_window
  • 0.006 antiemu_wine_func
  • 0.006 h1n1_behavior
  • 0.005 antivm_vbox_libs
  • 0.005 rat_nanocore
  • 0.005 kazybot_behavior
  • 0.005 disables_wfp
  • 0.005 antisandbox_script_timer
  • 0.005 antivm_vmware_files
  • 0.005 codelux_behavior
  • 0.004 tinba_behavior
  • 0.004 disables_spdy
  • 0.004 sniffer_winpcap
  • 0.003 antiav_avast_libs
  • 0.003 TrickBotTaskDelete
  • 0.003 antisandbox_sunbelt_libs
  • 0.003 deletes_self
  • 0.003 shifu_behavior
  • 0.003 exec_crash
  • 0.003 disables_browser_warn
  • 0.003 malicous_targeted_flame
  • 0.003 network_torgateway
  • 0.002 removes_zoneid_ads
  • 0.002 upatre_behavior
  • 0.002 infostealer_browser
  • 0.002 network_anomaly
  • 0.002 antisandbox_sboxie_libs
  • 0.002 antiav_bitdefender_libs
  • 0.002 ransomware_file_modifications
  • 0.002 cerber_behavior
  • 0.002 antianalysis_detectfile
  • 0.002 antivm_vpc_files
  • 0.002 banker_cridex
  • 0.002 browser_security
  • 0.002 maldun_malicious_drop_executable_file_to_temp_folder
  • 0.002 md_bad_drop
  • 0.002 network_tor_service
  • 0.001 dridex_behavior
  • 0.001 antivm_vmware_libs
  • 0.001 ursnif_behavior
  • 0.001 spreading_autoruninf
  • 0.001 antisandbox_fortinet_files
  • 0.001 antisandbox_sunbelt_files
  • 0.001 antisandbox_threattrack_files
  • 0.001 antivm_vbox_devices
  • 0.001 antiemu_wine_reg
  • 0.001 banker_zeus_mutex
  • 0.001 bitcoin_opencl
  • 0.001 bot_drive
  • 0.001 bot_drive2
  • 0.001 browser_addon
  • 0.001 disables_system_restore
  • 0.001 disables_windows_defender
  • 0.001 ie_martian_children
  • 0.001 ransomware_radamant
  • 0.001 stealth_modify_uac_prompt
  • 0.001 stealth_web_history
  • 0.001 whois_create

Reporting ( 0.889 seconds )

  • 0.889 ReportHTMLSummary
Task ID 487908
Mongo ID 5e20808d2f8f2e4bf4636bd6
Cuckoo release 1.4-Maldun