分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
文件 (Windows) win7-sp1-x64-shaapp02-1 2022-09-24 22:46:14 2022-09-24 22:48:21 127 秒

魔盾分数

0.0

正常的

文件详细信息

文件名 Project1.exe
文件大小 13824 字节
文件类型 PE32+ executable (console) x86-64, for MS Windows
MD5 59107b447ac176672fc297cfee9a0e42
SHA1 c7343caa2417a16d64d77fbfc4af2913f06efacd
SHA256 ad439667eefa6d56a05071aea3e66b7605d9adf59d8c7e07b075ba0c60fa5b0d
SHA512 ba690e9d9263cdd31799a8a8300bdf6b84acf12a185810485a907b75522738f229e37ccf1c6681e1521f2be4f2a3155fb963b5a4c5a489955759e9c166f3ef44
CRC32 980BE501
Ssdeep 192:dCKp2uKYserz4OeAuc4wUU+/+2+K/4nt0IF:9p2uDBtH4PUOlvIF
Yara 登录查看Yara规则
找不到该样本 提交漏报

登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

无域名信息.


摘要

登录查看详细行为信息

PE 信息

初始地址 0x140000000
入口地址 0x140001da8
声明校验值 0x00000000
实际校验值 0x0000db71
最低操作系统版本要求 6.0
编译时间 2022-09-24 01:46:59
载入哈希 9a3624d1a23112e8e91e1b46666a880e

PE 数据组成

名称 虚拟地址 虚拟大小 原始数据大小 特征 熵(Entropy)
.text 0x00001000 0x000017a6 0x00001800 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 6.25
.rdata 0x00003000 0x00000e58 0x00001000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 3.52
.data 0x00004000 0x00000220 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.54
.pdata 0x00005000 0x00000150 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 2.64
.00cfg 0x00006000 0x00000038 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 0.40
.rsrc 0x00007000 0x000001b0 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 4.24
.reloc 0x00008000 0x00000040 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 0.71

导入

库: KERNEL32.dll:
0x140003680 GetCurrentProcessId
0x140003688 GetCurrentThreadId
0x140003690 GetModuleHandleW
0x140003698 GetSystemTimeAsFileTime
0x1400036a0 InitializeSListHead
0x1400036a8 IsDebuggerPresent
0x1400036b8 QueryPerformanceCounter
0x1400036c0 RtlCaptureContext
0x1400036c8 RtlLookupFunctionEntry
0x1400036d0 RtlVirtualUnwind
0x1400036e0 UnhandledExceptionFilter
库: VCRUNTIME140.dll:
0x1400036f0 __C_specific_handler
0x1400036f8 __current_exception
0x140003708 memcpy
0x140003710 memset
库: api-ms-win-crt-stdio-l1-1-0.dll:
0x140003720 __acrt_iob_func
0x140003728 __p__commode
0x140003730 __stdio_common_vfprintf
0x140003738 _kbhit
0x140003740 _set_fmode
0x140003748 puts
库: api-ms-win-crt-conio-l1-1-0.dll:
0x140003758 _getch
库: api-ms-win-crt-runtime-l1-1-0.dll:
0x140003768 __p___argc
0x140003770 __p___argv
0x140003778 _c_exit
0x140003780 _cexit
0x140003788 _configure_narrow_argv
0x140003790 _crt_atexit
0x140003798 _exit
0x1400037b0 _initialize_onexit_table
0x1400037b8 _initterm
0x1400037c0 _initterm_e
0x1400037d8 _seh_filter_exe
0x1400037e0 _set_app_type
0x1400037e8 _sleep
0x1400037f0 exit
0x1400037f8 system
0x140003800 terminate
库: api-ms-win-crt-time-l1-1-0.dll:
0x140003810 _time64
库: api-ms-win-crt-utility-l1-1-0.dll:
0x140003820 rand
0x140003828 srand
库: api-ms-win-crt-math-l1-1-0.dll:
0x140003838 __setusermatherr
库: api-ms-win-crt-locale-l1-1-0.dll:
0x140003848 _configthreadlocale
库: api-ms-win-crt-heap-l1-1-0.dll:
0x140003858 _set_new_mode

!This program cannot be run in DOS mode.$
.text
`.rdata
@.data
.pdata
@.00cfg
@.rsrc
@.reloc
Lc5$0
Game over!
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleW
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
UnhandledExceptionFilter
__C_specific_handler
__current_exception
__current_exception_context
memcpy
memset
__acrt_iob_func
__p__commode
__stdio_common_vfprintf
_kbhit
_set_fmode
_getch
__p___argc
__p___argv
_c_exit
_cexit
_configure_narrow_argv
_crt_atexit
_exit
_get_initial_narrow_environment
_initialize_narrow_environment
_initialize_onexit_table
_initterm
_initterm_e
_register_onexit_function
_register_thread_local_exe_atexit_callback
_seh_filter_exe
_set_app_type
_sleep
system
terminate
_time64
srand
__setusermatherr
_configthreadlocale
_set_new_mode
KERNEL32.dll
VCRUNTIME140.dll
api-ms-win-crt-stdio-l1-1-0.dll
api-ms-win-crt-conio-l1-1-0.dll
api-ms-win-crt-runtime-l1-1-0.dll
api-ms-win-crt-time-l1-1-0.dll
api-ms-win-crt-utility-l1-1-0.dll
api-ms-win-crt-math-l1-1-0.dll
api-ms-win-crt-locale-l1-1-0.dll
api-ms-win-crt-heap-l1-1-0.dll
没有防病毒引擎扫描信息!

进程树


Project1.exe, PID: 2472, 上一级进程 PID: 2172

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49162 23.192.228.78 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 63246 192.168.122.1 53

域名解析 (可点击查询WPING实时安全评级)

无域名信息.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49162 23.192.228.78 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 63246 192.168.122.1 53

HTTP 请求

URI HTTP数据
URL专业沙箱检测 -> http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip
GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1
Accept: */*
If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT
User-Agent: IPM
Host: acroipm.adobe.com
Connection: Keep-Alive
Cache-Control: no-cache

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

无警报

TLS

No TLS

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
没有发现相似的分析.
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 15.685 seconds )

  • 10.595 Suricata
  • 2.014 AnalysisInfo
  • 1.032 VirusTotal
  • 0.943 NetworkAnalysis
  • 0.548 Static
  • 0.299 peid
  • 0.242 TargetInfo
  • 0.009 BehaviorAnalysis
  • 0.002 Memory
  • 0.001 Strings

Signatures ( 1.416 seconds )

  • 1.338 md_url_bl
  • 0.011 antiav_detectreg
  • 0.009 md_domain_bl
  • 0.006 antiav_detectfile
  • 0.006 infostealer_ftp
  • 0.005 anomaly_persistence_autorun
  • 0.004 geodo_banking_trojan
  • 0.004 ransomware_files
  • 0.003 infostealer_bitcoin
  • 0.003 infostealer_im
  • 0.003 network_http
  • 0.003 ransomware_extensions
  • 0.002 tinba_behavior
  • 0.002 antianalysis_detectreg
  • 0.002 antivm_vbox_files
  • 0.002 disables_browser_warn
  • 0.002 infostealer_mail
  • 0.001 rat_nanocore
  • 0.001 betabot_behavior
  • 0.001 cerber_behavior
  • 0.001 antivm_parallels_keys
  • 0.001 bot_drive
  • 0.001 bot_drive2
  • 0.001 browser_security
  • 0.001 modify_proxy
  • 0.001 maldun_malicious_drop_executable_file_to_temp_folder
  • 0.001 md_bad_drop
  • 0.001 network_cnc_http

Reporting ( 0.535 seconds )

  • 0.535 ReportHTMLSummary
Task ID 710647
Mongo ID 632f18cddc327b8d452c9004
Cuckoo release 1.4-Maldun