分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
文件 (Windows) win7-sp1-x64-hpdapp01-1 2020-01-18 16:30:19 2020-01-18 16:32:47 148 秒

魔盾分数

0.0

正常的

文件详细信息

文件名 360se.exe
文件大小 1592640 字节
文件类型 PE32 executable (GUI) Intel 80386, for MS Windows
MD5 20a542f734d3eccd3e1653b91491497f
SHA1 b19f02d98b57050fe28fe938c584322fe8c2950e
SHA256 c57ac156558695bab745c12ee9748ccff4ef5925c90e7800709e7cf48c85ad77
SHA512 6f90d1059d0585174b365fa753911901bbc5e9e9fb0f18d647220b5a3247bda5ee7a483f7ae05c897bbf7bfd59f45892581ae2b20a4b3fdccc0fe742f6f30a35
CRC32 830F7355
Ssdeep 24576:z1oelUFZ/Il87lQLcE2L/Un9R4z9lSPIa/YXP/PfaRUreF4PSJsjWdrUnKBEbO1O:z/lUD887+4E2LWj8gZllHr422rLH
Yara 登录查看Yara规则
样本下载 提交漏报

登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

无域名信息.


摘要

登录查看详细行为信息

PE 信息

初始地址 0x00400000
入口地址 0x0048bb00
声明校验值 0x0018c385
实际校验值 0x0018c385
最低操作系统版本要求 5.1
PDB路径 E:\se10\src\out\Release\initialexe\360se.exe.pdb
编译时间 2020-01-03 17:31:32
载入哈希 7de57d0d8feaf4d897a7494fe0bbbe96
导出DLL库名称 \x35\x35\x34\x31\x31\x34\x31\x31\x31

版本信息

LegalCopyright
InternalName
CompanyShortName
FileVersion
CompanyName
ProductShortName
ProductName
LastChange
ProductVersion
FileDescription
OriginalFilename
Official Build
Translation

微软证书验证 (Sign Tool)

SHA1 时间戳 有效性 错误
a4b32c3ba28817c45ad5c638190b194391d72abf Fri Jan 03 17:55:37 2020
证书链 Certificate Chain 1
发行给 VeriSign Class 3 Public Primary Certification Authority - G5
发行人 VeriSign Class 3 Public Primary Certification Authority - G5
有效期 Thu Jul 17 075959 2036
SHA1 哈希 4eb6d578499b1ccf5f581ead56be3d9b6744a5e5
证书链 Certificate Chain 2
发行给 VeriSign Class 3 Code Signing 2010 CA
发行人 VeriSign Class 3 Public Primary Certification Authority - G5
有效期 Sat Feb 08 075959 2020
SHA1 哈希 495847a93187cfb8c71f840cb7b41497ad95c64f
证书链 Certificate Chain 3
发行给 Beijing Qihu Technology Co., Ltd.
发行人 VeriSign Class 3 Code Signing 2010 CA
有效期 Sun Feb 02 075959 2020
SHA1 哈希 a50e0babe5ee7dc261b0c122a8641a37e1ce4ce3
证书链 Timestamp Chain 1
发行给 GlobalSign Root CA
发行人 GlobalSign Root CA
有效期 Fri Jan 28 200000 2028
SHA1 哈希 b1bc968bd4f49d622aa89a81f2150152a41d829c
证书链 Timestamp Chain 2
发行给 GlobalSign Timestamping CA - G2
发行人 GlobalSign Root CA
有效期 Fri Jan 28 200000 2028
SHA1 哈希 c0e49d2d7d90a5cd427f02d9125694d5d6ec5b71
证书链 Timestamp Chain 3
发行给 GlobalSign TSA for MS Authenticode - G2
发行人 GlobalSign Timestamping CA - G2
有效期 Thu Jun 24 080000 2027
SHA1 哈希 63b82fab61f583909695050b00249c502933ec79

PE 数据组成

名称 虚拟地址 虚拟大小 原始数据大小 特征 熵(Entropy)
.text 0x00001000 0x000b17da 0x000b1800 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 6.68
.rdata 0x000b3000 0x0005d8fc 0x0005da00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 5.17
.data 0x00111000 0x0000d554 0x00008e00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.91
.didat 0x0011f000 0x0000011c 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 2.52
.rsrc 0x00120000 0x00060ea8 0x00061000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 7.41
.reloc 0x00181000 0x00007004 0x00007200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 6.63

导入

库: ADVAPI32.dll:
0x4b3000 RegQueryValueExW
0x4b3004 DuplicateTokenEx
0x4b3008 RegOpenKeyExW
0x4b3010 FreeSid
0x4b3014 OpenProcessToken
0x4b301c RegCloseKey
0x4b3024 RegDeleteValueW
0x4b3028 RegSetValueExW
0x4b302c RegEnumKeyExW
0x4b3030 RegCreateKeyExW
0x4b3034 RegDeleteKeyW
0x4b3038 GetTokenInformation
0x4b3048 SystemFunction036
0x4b3054 RegQueryValueExA
0x4b305c RevertToSelf
0x4b3060 GetLengthSid
0x4b3070 SetSecurityInfo
0x4b3078 SetTokenInformation
0x4b307c GetAce
0x4b3084 SetThreadToken
0x4b3088 DuplicateToken
0x4b3090 EqualSid
0x4b3094 CopySid
0x4b3098 CreateWellKnownSid
0x4b309c GetSecurityInfo
0x4b30a0 SetEntriesInAclW
库: KERNEL32.dll:
0x4b30a8 ReadFile
0x4b30ac VirtualProtect
0x4b30b0 GetModuleFileNameW
0x4b30b4 CreateFileW
0x4b30b8 GetLastError
0x4b30bc CloseHandle
0x4b30c0 GetFileSize
0x4b30c4 GetModuleHandleW
0x4b30c8 GetCurrentProcess
0x4b30cc GetVersionExW
0x4b30d0 GetCurrentThread
0x4b30d4 LoadLibraryW
0x4b30d8 VirtualQuery
0x4b30dc TerminateProcess
0x4b30e0 WaitForSingleObject
0x4b30e4 GetSystemDirectoryW
0x4b30e8 OpenProcess
0x4b30ec CreateEventW
0x4b30f0 Sleep
0x4b30f4 GetUserDefaultLCID
0x4b30f8 SetEvent
0x4b30fc CreateThread
0x4b3100 HeapSetInformation
0x4b3104 ReplaceFileW
0x4b3108 GetCurrentProcessId
0x4b310c FreeLibrary
0x4b3114 SetLastError
0x4b3120 DeleteFileW
0x4b312c CreateProcessW
0x4b3130 LoadLibraryExW
0x4b3134 VirtualFree
0x4b3138 VirtualAlloc
0x4b313c SetFilePointer
0x4b3140 GetSystemInfo
0x4b3144 GetFileAttributesW
0x4b3148 GetSystemTime
0x4b314c MultiByteToWideChar
0x4b3150 WideCharToMultiByte
0x4b3154 GetModuleHandleExW
0x4b3158 lstrcmpiW
0x4b315c DuplicateHandle
0x4b3160 GetExitCodeProcess
0x4b3170 GetStdHandle
0x4b3178 GetProcessId
0x4b317c ResumeThread
0x4b3180 GetCommandLineW
0x4b3184 LocalFree
0x4b3188 GetModuleHandleA
0x4b318c GetNativeSystemInfo
0x4b3198 WriteFile
0x4b319c GetLocalTime
0x4b31a4 CreateDirectoryW
0x4b31a8 QueryDosDeviceW
0x4b31ac GetLongPathNameW
0x4b31b0 RemoveDirectoryW
0x4b31b4 GetTempPathW
0x4b31b8 UnmapViewOfFile
0x4b31bc SetFileAttributesW
0x4b31c4 CopyFileW
0x4b31c8 CreateFileMappingW
0x4b31cc MapViewOfFile
0x4b31d0 GetProcAddress
0x4b31d4 SetThreadPriority
0x4b31dc GetThreadPriority
0x4b31ec HeapCreate
0x4b31f0 HeapDestroy
0x4b31f4 FormatMessageA
0x4b31f8 GetTickCount
0x4b3200 RaiseException
0x4b3204 DecodePointer
0x4b320c ReadProcessMemory
0x4b3218 GetFileSizeEx
0x4b321c SetFilePointerEx
0x4b3220 FlushFileBuffers
0x4b3224 FindFirstFileW
0x4b3228 FindFirstFileExW
0x4b322c FindNextFileW
0x4b3230 FindClose
0x4b3238 Process32NextW
0x4b323c Process32FirstW
0x4b3240 GetCurrentThreadId
0x4b3244 GetProcessTimes
0x4b3248 HeapFree
0x4b3250 HeapSize
0x4b3258 HeapReAlloc
0x4b325c HeapAlloc
0x4b3260 GetProcessHeap
0x4b3268 DebugBreak
0x4b3278 UnregisterWaitEx
0x4b327c SizeofResource
0x4b3280 LockResource
0x4b3284 LoadResource
0x4b3288 FindResourceW
0x4b328c IsDebuggerPresent
0x4b3290 DeviceIoControl
0x4b3294 TlsGetValue
0x4b3298 lstrcmpA
0x4b329c lstrcmpiA
0x4b32a0 TlsSetValue
0x4b32a4 TlsAlloc
0x4b32a8 ResetEvent
0x4b32ac TlsFree
0x4b32b8 VirtualQueryEx
0x4b32bc HeapLock
0x4b32c0 HeapWalk
0x4b32c4 HeapUnlock
0x4b32d4 CreateRemoteThread
0x4b32d8 GetLocaleInfoW
0x4b32dc SuspendThread
0x4b32e0 GetThreadContext
0x4b32e8 SetThreadContext
0x4b32ec CreateFileA
0x4b32f4 OutputDebugStringW
0x4b32f8 VirtualAllocEx
0x4b32fc TerminateJobObject
0x4b3300 WriteProcessMemory
0x4b3304 VirtualProtectEx
0x4b3308 GetProcessHeaps
0x4b3310 SignalObjectAndWait
0x4b3314 GetFileType
0x4b3318 VirtualFreeEx
0x4b331c CreateJobObjectW
0x4b3320 CreateNamedPipeW
0x4b3324 CreateMutexW
0x4b3328 SearchPathW
0x4b332c LoadLibraryExA
0x4b3330 WriteConsoleW
0x4b3340 GetCommandLineA
0x4b3344 GetOEMCP
0x4b3348 IsValidCodePage
0x4b334c EnumSystemLocalesW
0x4b3350 IsValidLocale
0x4b3354 ReadConsoleW
0x4b3358 GetACP
0x4b3360 lstrlenW
0x4b3364 GetConsoleMode
0x4b3368 GetConsoleCP
0x4b336c GetFullPathNameW
0x4b3370 FormatMessageW
0x4b3374 GetStringTypeW
0x4b3378 EncodePointer
0x4b337c GetCPInfo
0x4b3380 CompareStringW
0x4b3384 LCMapStringW
0x4b3390 GetStartupInfoW
0x4b3394 InitializeSListHead
0x4b339c ReleaseMutex
0x4b33a0 OpenThread
0x4b33a4 RtlUnwind
0x4b33a8 ExitProcess
0x4b33ac GetDriveTypeW
0x4b33b0 SetStdHandle
库: PSAPI.DLL:
0x4b33c0 QueryWorkingSet
库: VERSION.dll:
0x4b33d4 GetFileVersionInfoW
0x4b33d8 VerQueryValueW
库: NETAPI32.dll:
0x4b33b8 Netbios

导出

序列 地址 名称
1 0x40dfd0 ??0ShellResourceRequestDetails@@QAE@XZ
2 0x401a20 ??1ShellResourceRequestDetails@@QAE@XZ
3 0x40e040 ??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
4 0x42c090 GetHandleVerifier
5 0x403c60 GetUploadedReportsImpl
6 0x46d9d0 IsSandboxedProcess
7 0x403b20 get_launch_failed
.text
`.rdata
@.data
.didat
.rsrc
@.reloc
SSQhf+L
SSQhO+L
VWQhO+L
Ph|RL
Ph@ L
tChd L
ujh@!L
t>hP-L
t.hD-L
WPh`"L
QQVWj
QQVWj
QQVWj
t7h\&L
YYhx&L
t;h\&L
u$h<-L
t0hd7L
t/h (L
Qhp(L
Qhp(L
F$hP)L
QQVWj
Ph0.L
VWhP,L
VVVVVVVh00L
Ph,1L
SVWh|4L
Ph|4L
Ph0.L
Ph85L
Ph`5L
防病毒引擎/厂商 病毒名/规则匹配 病毒库日期
Bkav 未发现病毒 20200113
MicroWorld-eScan 未发现病毒 20200113
FireEye 未发现病毒 20200112
CAT-QuickHeal 未发现病毒 20200112
Qihoo-360 未发现病毒 20200113
McAfee 未发现病毒 20200113
Cylance 未发现病毒 20200113
Zillya 未发现病毒 20200112
SUPERAntiSpyware 未发现病毒 20200112
Sangfor 未发现病毒 20200107
K7AntiVirus 未发现病毒 20200112
Alibaba 未发现病毒 20190527
K7GW 未发现病毒 20200112
CrowdStrike 未发现病毒 20190702
Invincea 未发现病毒 20191211
Baidu 未发现病毒 20190318
F-Prot 未发现病毒 20200112
TotalDefense 未发现病毒 20200112
APEX 未发现病毒 20200110
Avast 未发现病毒 20200113
ClamAV 未发现病毒 20200112
GData 未发现病毒 20200112
Kaspersky 未发现病毒 20200112
BitDefender 未发现病毒 20200113
NANO-Antivirus 未发现病毒 20200113
Paloalto 未发现病毒 20200113
ViRobot 未发现病毒 20200112
Tencent 未发现病毒 20200113
Endgame 未发现病毒 20190918
Emsisoft 未发现病毒 20200113
Comodo 未发现病毒 20200113
F-Secure 未发现病毒 20200112
DrWeb 未发现病毒 20200113
VIPRE 未发现病毒 20200113
TrendMicro 未发现病毒 20200113
McAfee-GW-Edition 未发现病毒 20200112
Trapmine 未发现病毒 20191216
CMC 未发现病毒 20190321
Sophos 未发现病毒 20200113
SentinelOne 未发现病毒 20191218
Cyren 未发现病毒 20200113
Jiangmin 未发现病毒 20200112
Webroot 未发现病毒 20200113
Avira 未发现病毒 20200113
Antiy-AVL 未发现病毒 20200113
Kingsoft 未发现病毒 20200113
Arcabit 未发现病毒 20200113
AegisLab 未发现病毒 20200113
ZoneAlarm 未发现病毒 20200113
Avast-Mobile 未发现病毒 20200110
Microsoft 未发现病毒 20200113
TACHYON 未发现病毒 20200113
AhnLab-V3 未发现病毒 20200112
Acronis 未发现病毒 20200107
VBA32 未发现病毒 20200110
ALYac 未发现病毒 20200113
MAX 未发现病毒 20200113
Ad-Aware 未发现病毒 20200113
Malwarebytes 未发现病毒 20200113
Zoner 未发现病毒 20200113
ESET-NOD32 未发现病毒 20200113
TrendMicro-HouseCall 未发现病毒 20200113
Rising 未发现病毒 20200113
Yandex 未发现病毒 20200112
Ikarus 未发现病毒 20200112
eGambit 未发现病毒 20200113
Fortinet 未发现病毒 20200112
BitDefenderTheta 未发现病毒 20200110
AVG 未发现病毒 20200113
Cybereason 未发现病毒 20190616
Panda 未发现病毒 20200112
MaxSecure 未发现病毒 20200108

进程树


360se.exe, PID: 2648, 上一级进程 PID: 2352

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

无TCP连接纪录.

UDP

无UDP连接纪录.

域名解析 (可点击查询WPING实时安全评级)

无域名信息.

TCP

无TCP连接纪录.

UDP

无UDP连接纪录.

HTTP 请求

未发现HTTP请求.

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

无警报

TLS

No TLS

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
没有发现相似的分析.
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 27.65 seconds )

  • 17.37 Suricata
  • 6.925 Static
  • 1.456 VirusTotal
  • 0.803 TargetInfo
  • 0.468 peid
  • 0.356 NetworkAnalysis
  • 0.127 AnalysisInfo
  • 0.122 BehaviorAnalysis
  • 0.016 Strings
  • 0.004 config_decoder
  • 0.003 Memory

Signatures ( 0.194 seconds )

  • 0.028 antiav_detectreg
  • 0.021 md_url_bl
  • 0.017 md_domain_bl
  • 0.012 infostealer_ftp
  • 0.008 antiav_detectfile
  • 0.007 anomaly_persistence_autorun
  • 0.007 infostealer_im
  • 0.007 ransomware_extensions
  • 0.007 ransomware_files
  • 0.006 antianalysis_detectreg
  • 0.005 api_spamming
  • 0.005 infostealer_bitcoin
  • 0.004 stealth_timeout
  • 0.004 infostealer_mail
  • 0.003 tinba_behavior
  • 0.003 stealth_decoy_document
  • 0.003 antivm_vbox_files
  • 0.003 geodo_banking_trojan
  • 0.003 disables_browser_warn
  • 0.002 rat_nanocore
  • 0.002 betabot_behavior
  • 0.002 cerber_behavior
  • 0.002 browser_security
  • 0.002 modify_proxy
  • 0.002 md_bad_drop
  • 0.001 antiemu_wine_func
  • 0.001 network_tor
  • 0.001 ursnif_behavior
  • 0.001 kibex_behavior
  • 0.001 antivm_generic_scsi
  • 0.001 shifu_behavior
  • 0.001 infostealer_browser_password
  • 0.001 kovter_behavior
  • 0.001 antianalysis_detectfile
  • 0.001 antidbg_devices
  • 0.001 antivm_generic_diskreg
  • 0.001 antivm_parallels_keys
  • 0.001 antivm_xen_keys
  • 0.001 banker_zeus_mutex
  • 0.001 bot_drive
  • 0.001 bot_drive2
  • 0.001 browser_addon
  • 0.001 disables_system_restore
  • 0.001 disables_windows_defender
  • 0.001 darkcomet_regkeys
  • 0.001 maldun_malicious_drop_executable_file_to_temp_folder
  • 0.001 office_security
  • 0.001 rat_pcclient
  • 0.001 rat_spynet
  • 0.001 recon_fingerprint
  • 0.001 stealth_hiddenreg
  • 0.001 stealth_hide_notifications
  • 0.001 stealth_modify_uac_prompt
  • 0.001 stealth_modify_security_center_warnings

Reporting ( 1.313 seconds )

  • 0.912 ReportHTMLSummary
  • 0.401 Malheur
Task ID 488321
Mongo ID 5e22c2d22f8f2e4bf1636a80
Cuckoo release 1.4-Maldun