分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
URL win7-sp1-x64-shaapp03-1 2020-09-24 15:36:37 2020-09-24 15:38:43 126 秒

魔盾分数

2.39

可疑的

URL详细信息

URL
URL专业沙箱检测 -> http://retracker.slvnet.ru

登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
www.gstatic.com A 203.208.41.66
acroipm.adobe.com A 23.223.195.201
CNAME acroipm.adobe.com.edgesuite.net
CNAME a1983.dscd.akamai.net
A 23.223.195.194

摘要

登录查看详细行为信息

WHOIS 信息

Name: None
Country: None
State: None
City: None
ZIP Code: None
Address: None

Orginization: Global Internet Telemetry Measurement Collective
Domain Name(s):
    SLVNET.RU
Creation Date:
    2019-03-16 15:33:54
Updated Date:
    None
Expiration Date:
    2021-03-16 15:33:54
Email(s):
    None

Registrar(s):
    101DOMAIN-RU
Name Server(s):
    ns1.csof.net.
    ns2.csof.net.
    ns3.csof.net.
    ns4.csof.net.
Referral URL(s):
    None
没有防病毒引擎扫描信息!

进程树


chrome.exe, PID: 2396, 上一级进程 PID: 2148
chrome.exe, PID: 2820, 上一级进程 PID: 2396

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49163 203.208.41.66 www.gstatic.com 443
192.168.122.201 49202 23.223.195.201 acroipm.adobe.com 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 53125 192.168.122.1 53
192.168.122.201 56960 192.168.122.1 53

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
www.gstatic.com A 203.208.41.66
acroipm.adobe.com A 23.223.195.201
CNAME acroipm.adobe.com.edgesuite.net
CNAME a1983.dscd.akamai.net
A 23.223.195.194

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49163 203.208.41.66 www.gstatic.com 443
192.168.122.201 49202 23.223.195.201 acroipm.adobe.com 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 53125 192.168.122.1 53
192.168.122.201 56960 192.168.122.1 53

HTTP 请求

URI HTTP数据
URL专业沙箱检测 -> http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip
GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1
Accept: */*
If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT
User-Agent: IPM
Host: acroipm.adobe.com
Connection: Keep-Alive
Cache-Control: no-cache

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

无警报

TLS

Timestamp Source IP Source Port Destination IP Destination Port Version Issuer Subject Fingerprint
2020-09-24 15:36:56.096755+0800 192.168.122.201 49163 203.208.41.66 443 TLS 1.1 C=US, O=Google Trust Services, CN=GTS CA 1O1 C=US, ST=California, L=Mountain View, O=Google LLC, CN=*.gstatic.com 34:bc:05:ba:72:88:80:08:49:73:7c:02:6c:21:8f:de:ca:cd:e8:11

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 32.938 seconds )

  • 13.382 BehaviorAnalysis
  • 10.643 Suricata
  • 4.824 NetworkAnalysis
  • 1.991 VirusTotal
  • 1.768 Static
  • 0.328 AnalysisInfo
  • 0.002 Memory

Signatures ( 5.833 seconds )

  • 1.293 md_url_bl
  • 0.868 api_spamming
  • 0.806 stealth_timeout
  • 0.44 mimics_filetime
  • 0.265 stealth_file
  • 0.26 antivm_generic_disk
  • 0.246 virus
  • 0.22 bootkit
  • 0.212 antivm_generic_scsi
  • 0.14 antivm_generic_services
  • 0.135 hancitor_behavior
  • 0.129 anormaly_invoke_kills
  • 0.08 maldun_anomaly_massive_file_ops
  • 0.069 injection_createremotethread
  • 0.055 antiav_detectreg
  • 0.053 stack_pivot
  • 0.043 injection_runpe
  • 0.041 antiav_detectfile
  • 0.033 infostealer_ftp
  • 0.029 infostealer_bitcoin
  • 0.024 rat_luminosity
  • 0.023 antidbg_windows
  • 0.022 injection_explorer
  • 0.021 infostealer_im
  • 0.021 ransomware_extensions
  • 0.016 vawtrak_behavior
  • 0.016 antivm_vbox_files
  • 0.014 ransomware_files
  • 0.013 process_needed
  • 0.012 infostealer_mail
  • 0.011 antianalysis_detectreg
  • 0.01 md_domain_bl
  • 0.009 kovter_behavior
  • 0.008 ransomware_message
  • 0.008 ipc_namedpipe
  • 0.008 infostealer_browser_password
  • 0.007 hawkeye_behavior
  • 0.007 sets_autoconfig_url
  • 0.007 anomaly_persistence_autorun
  • 0.007 securityxploded_modules
  • 0.007 antidbg_devices
  • 0.007 geodo_banking_trojan
  • 0.006 antivm_vbox_window
  • 0.006 betabot_behavior
  • 0.006 h1n1_behavior
  • 0.006 rat_pcclient
  • 0.005 antiemu_wine_func
  • 0.005 network_tor
  • 0.005 kibex_behavior
  • 0.004 antivm_vbox_libs
  • 0.004 disables_spdy
  • 0.004 disables_wfp
  • 0.004 antisandbox_script_timer
  • 0.003 tinba_behavior
  • 0.003 rat_nanocore
  • 0.003 TrickBotTaskDelete
  • 0.003 kazybot_behavior
  • 0.003 antisandbox_sunbelt_libs
  • 0.003 deletes_self
  • 0.003 antivm_vmware_files
  • 0.003 antivm_xen_keys
  • 0.003 codelux_behavior
  • 0.002 removes_zoneid_ads
  • 0.002 antiav_avast_libs
  • 0.002 upatre_behavior
  • 0.002 infostealer_browser
  • 0.002 antisandbox_sboxie_libs
  • 0.002 antiav_bitdefender_libs
  • 0.002 ransomware_file_modifications
  • 0.002 shifu_behavior
  • 0.002 exec_crash
  • 0.002 cerber_behavior
  • 0.002 sniffer_winpcap
  • 0.002 antivm_generic_diskreg
  • 0.002 antivm_parallels_keys
  • 0.002 disables_browser_warn
  • 0.002 darkcomet_regkeys
  • 0.002 maldun_malicious_drop_executable_file_to_temp_folder
  • 0.002 network_torgateway
  • 0.001 network_anomaly
  • 0.001 dridex_behavior
  • 0.001 antivm_vmware_libs
  • 0.001 bypass_firewall
  • 0.001 antianalysis_detectfile
  • 0.001 antisandbox_sunbelt_files
  • 0.001 antivm_hyperv_keys
  • 0.001 antivm_vbox_keys
  • 0.001 antivm_vmware_keys
  • 0.001 antivm_vpc_files
  • 0.001 antivm_vpc_keys
  • 0.001 banker_cridex
  • 0.001 bot_drive
  • 0.001 bot_drive2
  • 0.001 browser_security
  • 0.001 malicous_targeted_flame
  • 0.001 ie_martian_children
  • 0.001 maldun_anomaly_invoke_vb_vba
  • 0.001 md_bad_drop
  • 0.001 network_tor_service
  • 0.001 recon_fingerprint
  • 0.001 stealth_web_history

Reporting ( 0.426 seconds )

  • 0.426 ReportHTMLSummary
Task ID 577376
Mongo ID 5f6c4d4a7e769a53d2c22136
Cuckoo release 1.4-Maldun