分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
文件 (Windows) win7-sp1-x64-shaapp03-1 2021-04-21 22:33:34 2021-04-21 22:35:47 133 秒

魔盾分数

9.445

危险的

文件详细信息

文件名 pagent.exe
文件大小 9818112 字节
文件类型 PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
MD5 a97169dddd2847717440d3d407f789d9
SHA1 b22d922344e04a49a6acf158fd2a50290af4b624
SHA256 4b3b6ab55df21435dd7b1a0737feda00454b352f0d3f73c4fb19881103f133fd
SHA512 e8a5999517dad642efccad7cd891314fe491793e334214681148c0a5078e2941715a739ab54d1c70be64030bcb8258aa260c9a132687637f7ccb5ecf1cacd6b4
CRC32 523E307A
Ssdeep 196608:ndH6//MuW8mwf7DPehBe2k6a1pj8Vrr82tAhc1w:96/pt2SjSr8N
Yara 登录查看Yara规则
样本下载 提交误报

登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
acroipm.adobe.com CNAME acroipm.adobe.com.edgesuite.net
A 23.218.107.34
CNAME a1983.dscd.akamai.net
A 23.218.107.43

摘要

登录查看详细行为信息

PE 信息

初始地址 0x00400000
入口地址 0x0046f420
声明校验值 0x00000000
实际校验值 0x0095ed78
最低操作系统版本要求 6.1
编译时间 1970-01-01 08:00:00
载入哈希 4035d2883e01d64f3e7a9dccb1d63af5

PE 数据组成

名称 虚拟地址 虚拟大小 原始数据大小 特征 熵(Entropy)
.text 0x00001000 0x0046712f 0x00467200 IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 5.85
.rdata 0x00469000 0x0046c750 0x0046c800 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 5.60
.data 0x008d6000 0x000ad370 0x0005ea00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 6.08
.idata 0x00984000 0x00000476 0x00000600 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 3.54
.reloc 0x00985000 0x00029d90 0x00029e00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 5.45
.symtab 0x009af000 0x00000004 0x00000200 IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 0.02

导入

库: kernel32.dll:
0xcd6020 WriteFile
0xcd6028 WriteConsoleW
0xcd6038 WaitForSingleObject
0xcd6040 VirtualQuery
0xcd6048 VirtualFree
0xcd6050 VirtualAlloc
0xcd6058 SwitchToThread
0xcd6060 SuspendThread
0xcd6068 Sleep
0xcd6070 SetWaitableTimer
0xcd6088 SetEvent
0xcd6090 SetErrorMode
0xcd60a0 ResumeThread
0xcd60b0 LoadLibraryA
0xcd60b8 LoadLibraryW
0xcd60c0 SetThreadContext
0xcd60c8 GetThreadContext
0xcd60d0 GetSystemInfo
0xcd60d8 GetSystemDirectoryA
0xcd60e0 GetStdHandle
0xcd60f8 GetProcAddress
0xcd6108 GetConsoleMode
0xcd6118 ExitProcess
0xcd6120 DuplicateHandle
0xcd6130 CreateThread
0xcd6140 CreateEventA
0xcd6148 CloseHandle

.text
`.rdata
@.data
.idata
.reloc
B.symtab
D$0f=
D$0H=
D$8H=
没有防病毒引擎扫描信息!

进程树


pagent.exe, PID: 2568, 上一级进程 PID: 2260

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49172 110.185.114.161 443
192.168.122.201 49170 112.17.54.141 443
192.168.122.201 49167 112.29.199.35 443
192.168.122.201 49169 119.147.227.22 443
192.168.122.201 49163 180.96.32.88 443
192.168.122.201 49160 223.111.96.25 443
192.168.122.201 49161 23.218.107.43 acroipm.adobe.com 80
192.168.122.201 49165 27.152.185.145 443

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 59401 192.168.122.1 53

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
acroipm.adobe.com CNAME acroipm.adobe.com.edgesuite.net
A 23.218.107.34
CNAME a1983.dscd.akamai.net
A 23.218.107.43

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49172 110.185.114.161 443
192.168.122.201 49170 112.17.54.141 443
192.168.122.201 49167 112.29.199.35 443
192.168.122.201 49169 119.147.227.22 443
192.168.122.201 49163 180.96.32.88 443
192.168.122.201 49160 223.111.96.25 443
192.168.122.201 49161 23.218.107.43 acroipm.adobe.com 80
192.168.122.201 49165 27.152.185.145 443

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 59401 192.168.122.1 53

HTTP 请求

URI HTTP数据
URL专业沙箱检测 -> http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip
GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1
Accept: */*
If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT
User-Agent: IPM
Host: acroipm.adobe.com
Connection: Keep-Alive
Cache-Control: no-cache

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

Timestamp Source IP Source Port Destination IP Destination Port Protocol SID Signature Category
2021-04-21 22:34:44.830072+0800 192.168.122.201 49167 112.29.199.35 443 TCP 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
2021-04-21 22:35:32.236210+0800 192.168.122.201 49172 110.185.114.161 443 TCP 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
2021-04-21 22:34:29.525560+0800 192.168.122.201 49165 27.152.185.145 443 TCP 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
2021-04-21 22:35:01.102203+0800 192.168.122.201 49169 119.147.227.22 443 TCP 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
2021-04-21 22:33:59.087830+0800 192.168.122.201 49160 223.111.96.25 443 TCP 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
2021-04-21 22:35:16.965842+0800 192.168.122.201 49170 112.17.54.141 443 TCP 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
2021-04-21 22:34:14.297486+0800 192.168.122.201 49163 180.96.32.88 443 TCP 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode

TLS

No TLS

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
没有发现相似的分析.
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 26.362 seconds )

  • 10.527 Suricata
  • 8.335 Static
  • 3.121 TargetInfo
  • 1.911 NetworkAnalysis
  • 1.507 VirusTotal
  • 0.53 BehaviorAnalysis
  • 0.24 peid
  • 0.161 AnalysisInfo
  • 0.016 config_decoder
  • 0.011 Strings
  • 0.003 Memory

Signatures ( 1.647 seconds )

  • 1.384 md_url_bl
  • 0.031 api_spamming
  • 0.024 antiav_detectreg
  • 0.023 stealth_timeout
  • 0.021 stealth_decoy_document
  • 0.01 infostealer_ftp
  • 0.009 anomaly_persistence_autorun
  • 0.009 md_domain_bl
  • 0.006 mimics_filetime
  • 0.006 reads_self
  • 0.006 network_execute_http
  • 0.006 virus
  • 0.006 infostealer_im
  • 0.005 bootkit
  • 0.005 stealth_file
  • 0.005 antivm_generic_disk
  • 0.005 antiav_detectfile
  • 0.005 antianalysis_detectreg
  • 0.004 network_document_http
  • 0.004 hancitor_behavior
  • 0.004 geodo_banking_trojan
  • 0.004 infostealer_mail
  • 0.004 ransomware_extensions
  • 0.004 ransomware_files
  • 0.003 maldun_anomaly_massive_file_ops
  • 0.003 stealth_network
  • 0.003 shifu_behavior
  • 0.003 disables_browser_warn
  • 0.003 infostealer_bitcoin
  • 0.003 network_http
  • 0.002 tinba_behavior
  • 0.002 anomaly_persistence_bootexecute
  • 0.002 injection_createremotethread
  • 0.002 antivm_vbox_files
  • 0.002 browser_security
  • 0.002 modify_proxy
  • 0.002 network_torgateway
  • 0.001 rat_nanocore
  • 0.001 anomaly_reset_winsock
  • 0.001 antivm_generic_services
  • 0.001 process_interest
  • 0.001 betabot_behavior
  • 0.001 creates_largekey
  • 0.001 kibex_behavior
  • 0.001 antivm_generic_scsi
  • 0.001 creates_nullvalue
  • 0.001 nymaim_behavior
  • 0.001 cerber_behavior
  • 0.001 injection_runpe
  • 0.001 kovter_behavior
  • 0.001 antivm_parallels_keys
  • 0.001 antivm_xen_keys
  • 0.001 bot_drive
  • 0.001 bot_drive2
  • 0.001 browser_addon
  • 0.001 disables_system_restore
  • 0.001 disables_windows_defender
  • 0.001 maldun_malicious_drop_executable_file_to_temp_folder
  • 0.001 md_bad_drop
  • 0.001 network_cnc_http
  • 0.001 recon_fingerprint
  • 0.001 stealth_modify_uac_prompt

Reporting ( 0.537 seconds )

  • 0.531 ReportHTMLSummary
  • 0.006 Malheur
Task ID 631867
Mongo ID 608038687e769a0f71493dad
Cuckoo release 1.4-Maldun