分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
URL win7-sp1-x64-hpdapp01-1 2019-01-15 10:15:52 2019-01-15 10:20:59 307 秒

魔盾分数

2.0

正常的

URL详细信息


登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

直接 IP 安全评级 地理位置
104.31.94.113 美国

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
filechain.tk A 104.31.95.113
A 104.31.94.113

摘要

登录查看详细行为信息

WHOIS 信息

Name: None
Country: None
State: None
City: None
ZIP Code: None
Address: None

Orginization: None
Domain Name(s):
    None
Creation Date:
    None
Updated Date:
    None
Expiration Date:
    None
Email(s):
    abuse@freenom.com
    copyright@freenom.com

Registrar(s):
    None
Name Server(s):
    None
Referral URL(s):
    None
没有防病毒引擎扫描信息!

访问主机纪录 (可点击查询WPING实时安全评级)

直接 IP 安全评级 地理位置
104.31.94.113 美国

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49159 104.31.94.113 filechain.tk 80
192.168.122.201 49160 104.31.94.113 filechain.tk 80
192.168.122.201 49161 104.31.94.113 filechain.tk 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 62233 192.168.122.1 53

域名解析 (可点击查询WPING实时安全评级)

域名 安全评级 响应
filechain.tk A 104.31.95.113
A 104.31.94.113

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49159 104.31.94.113 filechain.tk 80
192.168.122.201 49160 104.31.94.113 filechain.tk 80
192.168.122.201 49161 104.31.94.113 filechain.tk 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 62233 192.168.122.1 53

HTTP 请求

URI HTTP数据
URL专业沙箱检测 -> http://filechain.tk/getfile?id=VCoP41PyPE0%3D&s=7F6381A0
GET /getfile?id=VCoP41PyPE0%3D&s=7F6381A0 HTTP/1.1
Accept: */*
Accept-Language: zh-cn
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: filechain.tk
Connection: Keep-Alive

URL专业沙箱检测 -> http://filechain.tk/content/style-2.css
GET /content/style-2.css HTTP/1.1
Accept: */*
Referer: http://filechain.tk/getfile?id=VCoP41PyPE0%3D&s=7F6381A0
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: filechain.tk
Connection: Keep-Alive
Cookie: __cfduid=d5f3bc417810b96b49e553141f69407091547518834

URL专业沙箱检测 -> http://filechain.tk/js/jquery.js
GET /js/jquery.js HTTP/1.1
Accept: */*
Referer: http://filechain.tk/getfile?id=VCoP41PyPE0%3D&s=7F6381A0
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: filechain.tk
Connection: Keep-Alive
Cookie: __cfduid=d5f3bc417810b96b49e553141f69407091547518834

URL专业沙箱检测 -> http://filechain.tk/js/controller-2.js
GET /js/controller-2.js HTTP/1.1
Accept: */*
Referer: http://filechain.tk/getfile?id=VCoP41PyPE0%3D&s=7F6381A0
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: filechain.tk
Connection: Keep-Alive
Cookie: __cfduid=d5f3bc417810b96b49e553141f69407091547518834

URL专业沙箱检测 -> http://filechain.tk/content/images/background.jpg
GET /content/images/background.jpg HTTP/1.1
Accept: */*
Referer: http://filechain.tk/getfile?id=VCoP41PyPE0%3D&s=7F6381A0
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: filechain.tk
Connection: Keep-Alive
Cookie: __cfduid=d5f3bc417810b96b49e553141f69407091547518834

URL专业沙箱检测 -> http://filechain.tk/content/images/get-button.jpg
GET /content/images/get-button.jpg HTTP/1.1
Accept: */*
Referer: http://filechain.tk/getfile?id=VCoP41PyPE0%3D&s=7F6381A0
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: filechain.tk
Connection: Keep-Alive
Cookie: __cfduid=d5f3bc417810b96b49e553141f69407091547518834

URL专业沙箱检测 -> http://filechain.tk/content/images/favicon2.png
GET /content/images/favicon2.png HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: filechain.tk
Connection: Keep-Alive
Cookie: __cfduid=d5f3bc417810b96b49e553141f69407091547518834

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

Timestamp Source IP Source Port Destination IP Destination Port Protocol SID Signature Category
2019-01-15 10:20:34.694141+0800 192.168.122.201 49159 104.31.94.113 80 TCP 2012810 ET POLICY HTTP Request to a *.tk domain Potentially Bad Traffic
2019-01-15 10:20:36.486153+0800 192.168.122.201 49160 104.31.94.113 80 TCP 2012810 ET POLICY HTTP Request to a *.tk domain Potentially Bad Traffic
2019-01-15 10:20:35.540013+0800 192.168.122.201 49159 104.31.94.113 80 TCP 2012810 ET POLICY HTTP Request to a *.tk domain Potentially Bad Traffic
2019-01-15 10:20:35.732039+0800 192.168.122.201 49159 104.31.94.113 80 TCP 2012810 ET POLICY HTTP Request to a *.tk domain Potentially Bad Traffic
2019-01-15 10:20:36.275084+0800 192.168.122.201 49159 104.31.94.113 80 TCP 2012810 ET POLICY HTTP Request to a *.tk domain Potentially Bad Traffic
2019-01-15 10:20:36.639581+0800 192.168.122.201 49161 104.31.94.113 80 TCP 2012810 ET POLICY HTTP Request to a *.tk domain Potentially Bad Traffic
2019-01-15 10:20:38.145310+0800 192.168.122.201 49159 104.31.94.113 80 TCP 2012810 ET POLICY HTTP Request to a *.tk domain Potentially Bad Traffic

TLS

No TLS

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 25.663 seconds )

  • 15.52 Suricata
  • 7.222 NetworkAnalysis
  • 1.506 Static
  • 1.167 VirusTotal
  • 0.241 AnalysisInfo
  • 0.004 BehaviorAnalysis
  • 0.003 Memory

Signatures ( 2.65 seconds )

  • 2.19 md_url_bl
  • 0.314 md_bad_drop
  • 0.021 md_domain_bl
  • 0.017 antiav_detectreg
  • 0.01 anomaly_persistence_autorun
  • 0.01 infostealer_ftp
  • 0.008 antiav_detectfile
  • 0.007 infostealer_bitcoin
  • 0.006 geodo_banking_trojan
  • 0.006 infostealer_im
  • 0.006 ransomware_files
  • 0.005 disables_browser_warn
  • 0.005 ransomware_extensions
  • 0.004 tinba_behavior
  • 0.004 browser_security
  • 0.004 infostealer_mail
  • 0.003 rat_nanocore
  • 0.003 cerber_behavior
  • 0.003 antivm_vbox_files
  • 0.003 bot_drive
  • 0.003 network_torgateway
  • 0.002 bot_drive2
  • 0.002 browser_addon
  • 0.002 ie_martian_children
  • 0.001 network_tor
  • 0.001 betabot_behavior
  • 0.001 ursnif_behavior
  • 0.001 kibex_behavior
  • 0.001 shifu_behavior
  • 0.001 antivm_parallels_keys
  • 0.001 antivm_xen_keys
  • 0.001 banker_zeus_mutex
  • 0.001 bot_athenahttp
  • 0.001 disables_system_restore
  • 0.001 disables_windows_defender
  • 0.001 stealth_modify_uac_prompt

Reporting ( 0.728 seconds )

  • 0.728 ReportHTMLSummary
Task ID 230346
Mongo ID 5c3d43ab2f8f2e52a506eecb
Cuckoo release 1.4-Maldun