分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
文件 (Windows) win7-sp1-x64-shaapp03-1 2021-04-21 22:08:04 2021-04-21 22:08:31 27 秒

魔盾分数

1.55

正常的

文件详细信息

文件名 aaa.exe
文件大小 123904 字节
文件类型 PE32+ executable (GUI) x86-64, for MS Windows
MD5 fa9b9fbaf58ad3a1b83c6f98e67446c7
SHA1 b71add49ca093a94d979319dc323f1f8d1235190
SHA256 9fdc678b76cec3189f1d0ad32f838de1c3a5ec1b0aca4ee9df4aa1c65ebe6c94
SHA512 8092365c8dd0c24e3fe4d3f3f6100e4f9bab1be13dec9b6e5140057aa73c920017c37b9ab20d12d269c9c225e41006f8bdd4c599cdb5dcc3e3916b26e8a47c72
CRC32 C9B08EE0
Ssdeep 3072:TDq7d/EgyrW9qMB/2SfPNYBIM6yUTh2n6hF:a7egyrMq2/Pfdh2nSF
Yara 登录查看Yara规则
样本下载 提交漏报

登录查看威胁特征

运行截图

没有可用的屏幕截图

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
acroipm.adobe.com A 23.210.215.89
CNAME acroipm.adobe.com.edgesuite.net
CNAME a1983.dscd.akamai.net
A 104.116.243.120

摘要

登录查看详细行为信息

PE 信息

初始地址 0x140000000
入口地址 0x140003ec8
声明校验值 0x00000000
实际校验值 0x0002cd3e
最低操作系统版本要求 6.0
编译时间 2021-04-20 16:00:08
载入哈希 b65e828ef41d80dd35d27a35b0e43f9d
图标
图标精确哈希值 9bb381fe083cac2e6a108ebacab6777b
图标相似性哈希值 2560d83fffabc772a603f8cd35f190fe

PE 数据组成

名称 虚拟地址 虚拟大小 原始数据大小 特征 熵(Entropy)
.text 0x00001000 0x0000d5b0 0x0000d600 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 6.43
.rdata 0x0000f000 0x00009be6 0x00009c00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 4.87
.data 0x00019000 0x00002d80 0x00000c00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 2.18
.pdata 0x0001c000 0x00000f9c 0x00001000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 4.81
.gfids 0x0001d000 0x000000c4 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 0.97
.rsrc 0x0001e000 0x00004790 0x00004800 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 2.65
.reloc 0x00023000 0x0000062c 0x00000800 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 4.76

资源

名称 偏移量 大小 语言 子语言 熵(Entropy) 文件类型
RT_ICON 0x0001e0f0 0x00004228 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 2.10 dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294967295, next used block 4294967295
RT_GROUP_ICON 0x00022318 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 1.92 MS Windows icon resource - 1 icon, 64x64
RT_MANIFEST 0x00022330 0x0000045b LANG_ENGLISH SUBLANG_ENGLISH_US 5.33 XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators

导入

库: KERNEL32.dll:
0x14000f000 FindFirstFileA
0x14000f008 VirtualProtect
0x14000f010 HeapFree
0x14000f018 SetLastError
0x14000f020 VirtualFree
0x14000f028 WriteFile
0x14000f030 VirtualAlloc
0x14000f038 FindNextFileA
0x14000f040 lstrlenA
0x14000f048 FindClose
0x14000f050 CreateMutexA
0x14000f058 Sleep
0x14000f060 GetLastError
0x14000f068 CreateFileA
0x14000f070 LoadLibraryA
0x14000f078 CloseHandle
0x14000f080 GetNativeSystemInfo
0x14000f088 GetSystemInfo
0x14000f090 GetModuleFileNameA
0x14000f098 HeapAlloc
0x14000f0a0 GetProcAddress
0x14000f0a8 GetProcessHeap
0x14000f0b0 GlobalMemoryStatusEx
0x14000f0b8 FreeLibrary
0x14000f0c0 IsBadReadPtr
0x14000f0c8 FlushFileBuffers
0x14000f0d0 lstrcatA
0x14000f0d8 CreateFileW
0x14000f0e0 SetFilePointerEx
0x14000f0e8 HeapSize
0x14000f0f0 GetConsoleMode
0x14000f0f8 GetConsoleCP
0x14000f100 SetStdHandle
0x14000f108 FreeEnvironmentStringsW
0x14000f110 GetEnvironmentStringsW
0x14000f118 GetCommandLineW
0x14000f120 GetCommandLineA
0x14000f128 GetCPInfo
0x14000f130 GetOEMCP
0x14000f138 IsValidCodePage
0x14000f140 GetWindowsDirectoryA
0x14000f148 RtlCaptureContext
0x14000f150 RtlLookupFunctionEntry
0x14000f158 RtlVirtualUnwind
0x14000f160 UnhandledExceptionFilter
0x14000f170 GetCurrentProcess
0x14000f178 TerminateProcess
0x14000f188 QueryPerformanceCounter
0x14000f190 GetCurrentProcessId
0x14000f198 GetCurrentThreadId
0x14000f1a0 GetSystemTimeAsFileTime
0x14000f1a8 InitializeSListHead
0x14000f1b0 IsDebuggerPresent
0x14000f1b8 GetStartupInfoW
0x14000f1c0 GetModuleHandleW
0x14000f1c8 RtlPcToFileHeader
0x14000f1d0 RaiseException
0x14000f1d8 RtlUnwindEx
0x14000f1e0 EnterCriticalSection
0x14000f1e8 LeaveCriticalSection
0x14000f1f0 DeleteCriticalSection
0x14000f200 TlsAlloc
0x14000f208 TlsGetValue
0x14000f210 TlsSetValue
0x14000f218 TlsFree
0x14000f220 LoadLibraryExW
0x14000f228 ExitProcess
0x14000f230 GetModuleHandleExW
0x14000f240 MultiByteToWideChar
0x14000f248 WideCharToMultiByte
0x14000f250 GetStdHandle
0x14000f258 GetACP
0x14000f260 LCMapStringW
0x14000f268 GetFileType
0x14000f270 HeapReAlloc
0x14000f278 GetStringTypeW
0x14000f280 FindFirstFileExA
0x14000f288 WriteConsoleW
库: WININET.dll:
0x14000f298 InternetSetOptionA
0x14000f2a0 InternetCrackUrlA
0x14000f2a8 InternetOpenA
0x14000f2b0 InternetQueryOptionA
0x14000f2b8 HttpQueryInfoA
0x14000f2c0 InternetCloseHandle
0x14000f2c8 HttpSendRequestA
0x14000f2d0 InternetConnectA
0x14000f2d8 InternetReadFile
0x14000f2e0 HttpOpenRequestA

G9U[E8RichT[E8
.text
`.rdata
@.data
.pdata
@.gfids
@.rsrc
@.reloc
Unknown exception
bad allocation
bad array new length
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`RTTI
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
CorExitProcess
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
March
April
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
log10
Vista
2008R2
Win8.1
2012R2
Win10
Win10 up
2016 up
%02x-%02x-%02x-%02x-%02x-%02x
%04d-%02d-%02d|%02d:%02d
9PptmfgORMwRZ5AJ245EMak7JpsfI2m6vX0GJBolEWA=
CSWjUcazw53yPNe+dISBvQ==
121212
Error protecting memory page
Voumx0c0GCEBSBfOreOpmw==
DSnYaT1t6CyCztCPcuaadw==
DSnYaT1t6CyCztCPcuaadw==
OjFLdme05+MqrZOXBdVnzsAp+eMWSQGvMkiud44hVBk=
favicon.jpg
{BDA73805-42C8-42D2-945C-E3F26C19175B}
icl2TWBal2Jwiaz4OOngQA==
douyin.ini
kuujjuj
b1/NeF9wodvHezcAQQa0xQ==
.text$mn
.text$mn$00
.text$x
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$r
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata
.xdata$x
.edata
.idata$2
.idata$3
.idata$4
.idata$6
.data
.data$r
.pdata
.gfids$y
.rsrc$01
.rsrc$02
aaa.exe
GetModuleFileNameA
FindFirstFileA
VirtualProtect
HeapFree
SetLastError
VirtualFree
WriteFile
VirtualAlloc
FindNextFileA
lstrlenA
FindClose
CreateMutexA
Sleep
GetLastError
CreateFileA
LoadLibraryA
CloseHandle
GetNativeSystemInfo
GetSystemInfo
GetWindowsDirectoryA
HeapAlloc
GetProcAddress
GetProcessHeap
GlobalMemoryStatusEx
FreeLibrary
IsBadReadPtr
FlushFileBuffers
lstrcatA
KERNEL32.dll
HttpQueryInfoA
InternetQueryOptionA
HttpOpenRequestA
InternetCrackUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetReadFile
WININET.dll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
QueryPerformanceFrequency
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetACP
LCMapStringW
GetFileType
HeapReAlloc
GetStringTypeW
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleCP
GetConsoleMode
HeapSize
SetFilePointerEx
CreateFileW
WriteConsoleW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
GetStartupInfoA
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVtype_info@@
.?AVbad_array_new_length@std@@
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0" xmlns:asmv3="urn:schemas-microsoft-com:asm.v3"><dependency><dependentAssembly><assemblyIdentity type="Win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" publicKeyToken="6595b64144ccf1df" language="*" processorArchitecture="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS></application></compatibility></assembly>
advapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
mscoree.dll
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
March
April
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
en-US
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
ntdll
api-ms-win-appmodel-runtime-l1-1-2
user32
api-ms-
ext-ms-
ja-JP
zh-CN
ko-KR
zh-TW
zh-CHS
ar-SA
bg-BG
ca-ES
cs-CZ
da-DK
de-DE
el-GR
fi-FI
fr-FR
he-IL
hu-HU
is-IS
it-IT
nl-NL
nb-NO
pl-PL
pt-BR
ro-RO
ru-RU
hr-HR
sk-SK
sq-AL
sv-SE
th-TH
tr-TR
ur-PK
id-ID
uk-UA
be-BY
sl-SI
et-EE
lv-LV
lt-LT
fa-IR
vi-VN
hy-AM
az-AZ-Latn
eu-ES
mk-MK
tn-ZA
xh-ZA
zu-ZA
af-ZA
ka-GE
fo-FO
hi-IN
mt-MT
se-NO
ms-MY
kk-KZ
ky-KG
sw-KE
uz-UZ-Latn
tt-RU
bn-IN
pa-IN
gu-IN
ta-IN
te-IN
kn-IN
ml-IN
mr-IN
sa-IN
mn-MN
cy-GB
gl-ES
kok-IN
syr-SY
div-MV
quz-BO
ns-ZA
mi-NZ
ar-IQ
de-CH
en-GB
es-MX
fr-BE
it-CH
nl-BE
nn-NO
pt-PT
sr-SP-Latn
sv-FI
az-AZ-Cyrl
se-SE
ms-BN
uz-UZ-Cyrl
quz-EC
ar-EG
zh-HK
de-AT
en-AU
es-ES
fr-CA
sr-SP-Cyrl
se-FI
quz-PE
ar-LY
zh-SG
de-LU
en-CA
es-GT
fr-CH
hr-BA
smj-NO
ar-DZ
zh-MO
de-LI
en-NZ
es-CR
fr-LU
bs-BA-Latn
smj-SE
ar-MA
en-IE
es-PA
fr-MC
sr-BA-Latn
sma-NO
ar-TN
en-ZA
es-DO
sr-BA-Cyrl
sma-SE
ar-OM
en-JM
es-VE
sms-FI
ar-YE
en-CB
es-CO
smn-FI
ar-SY
en-BZ
es-PE
ar-JO
en-TT
es-AR
ar-LB
en-ZW
es-EC
ar-KW
en-PH
es-CL
ar-AE
es-UY
ar-BH
es-PY
ar-QA
es-BO
es-SV
es-HN
es-NI
es-PR
zh-CHT
af-za
ar-ae
ar-bh
ar-dz
ar-eg
ar-iq
ar-jo
ar-kw
ar-lb
ar-ly
ar-ma
ar-om
ar-qa
ar-sa
ar-sy
ar-tn
ar-ye
az-az-cyrl
az-az-latn
be-by
bg-bg
bn-in
bs-ba-latn
ca-es
cs-cz
cy-gb
da-dk
de-at
de-ch
de-de
de-li
de-lu
div-mv
el-gr
en-au
en-bz
en-ca
en-cb
en-gb
en-ie
en-jm
en-nz
en-ph
en-tt
en-us
en-za
en-zw
es-ar
es-bo
es-cl
es-co
es-cr
es-do
es-ec
es-es
es-gt
es-hn
es-mx
es-ni
es-pa
es-pe
es-pr
es-py
es-sv
es-uy
es-ve
et-ee
eu-es
fa-ir
fi-fi
fo-fo
fr-be
fr-ca
fr-ch
fr-fr
fr-lu
fr-mc
gl-es
gu-in
he-il
hi-in
hr-ba
hr-hr
hu-hu
hy-am
id-id
is-is
it-ch
it-it
ja-jp
ka-ge
kk-kz
kn-in
kok-in
ko-kr
ky-kg
lt-lt
lv-lv
mi-nz
mk-mk
ml-in
mn-mn
mr-in
ms-bn
ms-my
mt-mt
nb-no
nl-be
nl-nl
nn-no
ns-za
pa-in
pl-pl
pt-br
pt-pt
quz-bo
quz-ec
quz-pe
ro-ro
ru-ru
sa-in
se-fi
se-no
se-se
sk-sk
sl-si
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sq-al
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
sv-fi
sv-se
sw-ke
syr-sy
ta-in
te-in
th-th
tn-za
tr-tr
tt-ru
uk-ua
ur-pk
uz-uz-cyrl
uz-uz-latn
vi-vn
xh-za
zh-chs
zh-cht
zh-cn
zh-hk
zh-mo
zh-sg
zh-tw
zu-za
CONOUT$
没有防病毒引擎扫描信息!

进程树


aaa.exe, PID: 2484, 上一级进程 PID: 2152

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49161 23.210.215.89 acroipm.adobe.com 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 59401 192.168.122.1 53

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
acroipm.adobe.com A 23.210.215.89
CNAME acroipm.adobe.com.edgesuite.net
CNAME a1983.dscd.akamai.net
A 104.116.243.120

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49161 23.210.215.89 acroipm.adobe.com 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 59401 192.168.122.1 53

HTTP 请求

URI HTTP数据
URL专业沙箱检测 -> http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip
GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1
Accept: */*
If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT
User-Agent: IPM
Host: acroipm.adobe.com
Connection: Keep-Alive
Cache-Control: no-cache

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

无警报

TLS

No TLS

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
没有发现相似的分析.
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 14.047 seconds )

  • 10.635 Suricata
  • 1.606 VirusTotal
  • 0.75 NetworkAnalysis
  • 0.428 Static
  • 0.305 peid
  • 0.291 TargetInfo
  • 0.011 AnalysisInfo
  • 0.01 Strings
  • 0.009 BehaviorAnalysis
  • 0.002 Memory

Signatures ( 1.412 seconds )

  • 1.33 md_url_bl
  • 0.013 antiav_detectreg
  • 0.011 md_domain_bl
  • 0.005 anomaly_persistence_autorun
  • 0.005 infostealer_ftp
  • 0.004 antiav_detectfile
  • 0.004 geodo_banking_trojan
  • 0.004 ransomware_files
  • 0.003 infostealer_bitcoin
  • 0.003 infostealer_im
  • 0.003 network_http
  • 0.003 ransomware_extensions
  • 0.002 tinba_behavior
  • 0.002 antianalysis_detectreg
  • 0.002 antivm_vbox_files
  • 0.002 bot_drive
  • 0.002 disables_browser_warn
  • 0.002 infostealer_mail
  • 0.002 network_torgateway
  • 0.001 rat_nanocore
  • 0.001 betabot_behavior
  • 0.001 cerber_behavior
  • 0.001 banker_zeus_mutex
  • 0.001 bot_drive2
  • 0.001 browser_security
  • 0.001 modify_proxy
  • 0.001 maldun_malicious_drop_executable_file_to_temp_folder
  • 0.001 md_bad_drop
  • 0.001 network_cnc_http

Reporting ( 0.55 seconds )

  • 0.549 ReportHTMLSummary
  • 0.001 Malheur
Task ID 631864
Mongo ID 608031f67e769a0f6f49514d
Cuckoo release 1.4-Maldun