分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
文件 (Windows) win7-sp1-x64-shaapp03-1 2022-09-24 17:44:36 2022-09-24 17:46:46 130 秒

魔盾分数

10.0

危险的

文件详细信息

文件名 武小帅音效库3.0.exe
文件大小 329216 字节
文件类型 PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5 d081c97638455b144a0b05837127cc43
SHA1 1daeb002546b8284fba85e7f60ac5a8e0094c178
SHA256 4f63766fc153333d74316d4f9dc2d24959cb50fe0153ec9c2823c0417bc9f2a5
SHA512 fb423c3d1078241c702347890b08bf8ec1d2842f19bba240624c420de247272f6504192293f4d5c33aa32b1ec27a3341162d030ca3aa7140bd6e5b0f32e62017
CRC32 70A5C710
Ssdeep 6144:JxIwjsYWay0sCYLogeJyTLBivQEPTarMU3zD3MUrLDkfaMoUOfwF6VIRrGzP:JyEs0rgkyoYMTvWHQJ/xF69P
Yara 登录查看Yara规则
找不到该样本 提交误报

登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

无域名信息.


摘要

登录查看详细行为信息

PE 信息

初始地址 0x00400000
入口地址 0x004ff024
声明校验值 0x00000000
实际校验值 0x000562b9
最低操作系统版本要求 4.0
编译时间 2022-09-23 15:12:03
载入哈希 e89e0109eff95fef1d9e40394413fd70
图标
图标精确哈希值 7f4b7ef0cddff0f968080b7b5613c0f3
图标相似性哈希值 a314032cf97185c93730a489d2adce8b

版本信息

LegalCopyright
FileVersion
Comments
ProductName
ProductVersion
FileDescription
Translation

PE 数据组成

名称 虚拟地址 虚拟大小 原始数据大小 特征 熵(Entropy)
UPX0 0x00001000 0x000ad000 0x00000000 IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.00
UPX1 0x000ae000 0x0004e000 0x0004dc00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 8.00
.rsrc 0x000fc000 0x00003000 0x00002400 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 3.10
.text 0x000ff000 0x000001ff 0x00000200 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 6.83

资源

名称 偏移量 大小 语言 子语言 熵(Entropy) 文件类型
TEXTINCLUDE 0x000f2bc0 0x00000151 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.38 data
TEXTINCLUDE 0x000f2bc0 0x00000151 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.38 data
TEXTINCLUDE 0x000f2bc0 0x00000151 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.38 data
RT_CURSOR 0x000f30b0 0x000000b4 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 6.87 data
RT_CURSOR 0x000f30b0 0x000000b4 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 6.87 data
RT_CURSOR 0x000f30b0 0x000000b4 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 6.87 data
RT_CURSOR 0x000f30b0 0x000000b4 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 6.87 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_BITMAP 0x000f47b8 0x00000144 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.36 data
RT_ICON 0x000fcba0 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL 1.90 dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
RT_ICON 0x000fcba0 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL 1.90 dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
RT_ICON 0x000fcba0 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL 1.90 dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
RT_MENU 0x000f5dc0 0x00000284 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.71 MS Windows COFF PA-RISC object file
RT_MENU 0x000f5dc0 0x00000284 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.71 MS Windows COFF PA-RISC object file
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_DIALOG 0x000f7008 0x0000018c LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 7.41 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_STRING 0x000f7a50 0x00000024 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.06 data
RT_GROUP_CURSOR 0x000f7a9c 0x00000022 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 4.97 data
RT_GROUP_CURSOR 0x000f7a9c 0x00000022 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 4.97 data
RT_GROUP_CURSOR 0x000f7a9c 0x00000022 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 4.97 data
RT_GROUP_ICON 0x000f7ae8 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 4.22 data
RT_GROUP_ICON 0x000f7ae8 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 4.22 data
RT_GROUP_ICON 0x000f7ae8 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 4.22 data
RT_VERSION 0x000fdc64 0x00000248 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 3.92 data
RT_MANIFEST 0x000fdeb0 0x000001cd LANG_NEUTRAL SUBLANG_NEUTRAL 5.08 XML 1.0 document, ASCII text, with very long lines, with no line terminators

导入

库: ADVAPI32.dll:
0x4fe184 RegCloseKey
库: COMCTL32.dll:
0x4fe18c None
库: comdlg32.dll:
0x4fe194 ChooseColorA
库: GDI32.dll:
0x4fe19c Escape
库: KERNEL32.DLL:
0x4fe1a4 LoadLibraryA
0x4fe1a8 ExitProcess
0x4fe1ac GetProcAddress
0x4fe1b0 VirtualProtect
库: ole32.dll:
0x4fe1b8 OleInitialize
库: OLEAUT32.dll:
0x4fe1c0 LoadTypeLib
库: SHELL32.dll:
0x4fe1c8 DragFinish
库: USER32.dll:
0x4fe1d0 GetDC
库: WINMM.dll:
0x4fe1d8 waveOutOpen
库: WINSPOOL.DRV:
0x4fe1e0 ClosePrinter
库: WS2_32.dll:
0x4fe1e8 ntohl

.rsrc
.text
ekYL^>
~(V#F
9NE@ws?
xhSxfT
&T6])
z(3:B
没有防病毒引擎扫描信息!

进程树


__________________3.0.exe, PID: 2576, 上一级进程 PID: 2252

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49160 23.192.228.89 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 59401 192.168.122.1 53

域名解析 (可点击查询WPING实时安全评级)

无域名信息.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49160 23.192.228.89 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 59401 192.168.122.1 53

HTTP 请求

URI HTTP数据
URL专业沙箱检测 -> http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip
GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1
Accept: */*
If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT
User-Agent: IPM
Host: acroipm.adobe.com
Connection: Keep-Alive
Cache-Control: no-cache

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

无警报

TLS

No TLS

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
没有发现相似的分析.
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 17.54 seconds )

  • 11.854 Suricata
  • 2.505 BehaviorAnalysis
  • 1.06 VirusTotal
  • 0.945 NetworkAnalysis
  • 0.565 Static
  • 0.295 TargetInfo
  • 0.292 peid
  • 0.012 Strings
  • 0.01 AnalysisInfo
  • 0.002 Memory

Signatures ( 2.53 seconds )

  • 1.333 md_url_bl
  • 0.171 process_interest
  • 0.166 injection_createremotethread
  • 0.164 api_spamming
  • 0.122 stealth_timeout
  • 0.112 vawtrak_behavior
  • 0.109 injection_runpe
  • 0.107 stealth_decoy_document
  • 0.076 process_needed
  • 0.016 antiav_detectreg
  • 0.009 md_domain_bl
  • 0.007 hancitor_behavior
  • 0.007 infostealer_ftp
  • 0.005 antiemu_wine_func
  • 0.005 stealth_hidden_window
  • 0.005 mimics_filetime
  • 0.005 anomaly_persistence_autorun
  • 0.005 infostealer_browser_password
  • 0.005 kovter_behavior
  • 0.005 antiav_detectfile
  • 0.004 bcdedit_command
  • 0.004 reads_self
  • 0.004 debugs_self
  • 0.004 maldun_anomaly_write_exe_and_dll_under_winroot_run
  • 0.004 virus
  • 0.004 geodo_banking_trojan
  • 0.004 infostealer_im
  • 0.004 ransomware_extensions
  • 0.004 ransomware_files
  • 0.003 powershell_command
  • 0.003 bootkit
  • 0.003 maldun_anomaly_heavy_create_suspended
  • 0.003 upatre_behavior
  • 0.003 stealth_childproc
  • 0.003 stealth_file
  • 0.003 dead_link
  • 0.003 deletes_shadow_copies
  • 0.003 antivm_generic_disk
  • 0.003 antianalysis_detectreg
  • 0.003 infostealer_bitcoin
  • 0.003 network_http
  • 0.002 tinba_behavior
  • 0.002 rat_nanocore
  • 0.002 injection_needextension
  • 0.002 antivm_vbox_files
  • 0.002 disables_browser_warn
  • 0.002 infostealer_mail
  • 0.001 betabot_behavior
  • 0.001 kibex_behavior
  • 0.001 antidbg_windows
  • 0.001 cerber_behavior
  • 0.001 antivm_parallels_keys
  • 0.001 bot_drive
  • 0.001 bot_drive2
  • 0.001 browser_security
  • 0.001 modify_proxy
  • 0.001 maldun_malicious_drop_executable_file_to_temp_folder
  • 0.001 md_bad_drop
  • 0.001 network_cnc_http

Reporting ( 0.546 seconds )

  • 0.545 ReportHTMLSummary
  • 0.001 Malheur
Task ID 710620
Mongo ID 632ed2257e769a059be15f23
Cuckoo release 1.4-Maldun