section: name: , entropy: 7.99, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ, raw_size: 0x00111fd3, virtual_size: 0x003ca4cd
section: name: , entropy: 7.98, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x001322b8, virtual_size: 0x002754d1
section: name: , entropy: 7.98, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x000334f3, virtual_size: 0x00128c76
section: name: , entropy: 8.00, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x002e1000, virtual_size: 0x002e0bac
section: name: .boot, entropy: 7.96, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ, raw_size: 0x0029e3f8, virtual_size: 0x0029f000
魔盾安全Yara规则检测结果 - 安全告警
Critical: Spotted potential malicious behaviors from a small size target, like process manipultion, privilege, token and files
对一个无法找到的进程进行重复搜索,可能希望以startbrowser=1选项运行
检查是否存在常见排错或检验程序的窗口
Window: FilemonClass
Window: File Monitor - Sysinternals: www.sysinternals.com
Window: PROCMON_WINDOW_CLASS
Window: Process Monitor - Sysinternals: www.sysinternals.com
Window: RegmonClass
Window: Registry Monitor - Sysinternals: www.sysinternals.com
Window: 18467-41
Window: Regmonclass
Window: Filemonclass
开始系统监听0.0.0.0:51787
创建一个隐藏文件或系统文件
file: C:\Users\test\AppData\Local\Temp\zlibwapi.dll
HTTP数据流中包含可疑的恶意软件数据
ip_hostname: HTTP connection was made to an IP address rather than domain name
suspicious_request: http://103.205.252.104:9969/api/xiaoxin/gonggao.html
建立TCP连接到一个外部IP地址的非标准端口
Connection: 103.205.252.104:9969
异常的二进制特征
anomaly: Found duplicated section names
对一些具体的运行中的进程呈现出兴趣
检查Bios版本,可能被用来实现反虚拟机
通过ACPI技术检测VirtualBox系统
检测到样本尝试模糊或欺骗文件类型
网络分析
访问主机记录
直接访问 |
IP地址 |
国家名 |
是 |
103.205.252.104 |
China |
否 |
180.111.199.93 |
China |
否 |
47.96.130.35 |
China |
域名解析
域名 |
响应 |
gitclone.com |
A 47.96.130.35
|
q1.qlogo.cn |
CNAME q.qlogo.cn
A 180.111.199.93
A 180.111.198.52
A 180.111.199.110
A 180.111.198.158
A 180.111.199.109
A 180.111.199.184
A 180.111.199.95
A 180.111.198.41
A 180.111.198.106
A 180.111.198.198
|
TCP连接
IP地址 |
端口 |
103.205.252.104 |
9969 |
180.111.199.93 |
80 |
184.28.235.201 |
80 |
47.96.130.35 |
443 |
UDP连接
IP地址 |
端口 |
192.168.122.1 |
53 |
192.168.122.1 |
53 |
192.168.122.1 |
53 |
HTTP请求
URL |
HTTP数据 |
http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip |
GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1
Accept: */*
If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT
User-Agent: IPM
Host: acroipm.adobe.com
Connection: Keep-Alive
Cache-Control: no-cache
|
http://103.205.252.104:9969/api/xiaoxin/gonggao.html |
GET /api/xiaoxin/gonggao.html HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Accept: text/html, application/xhtml+xml, */*
Accept-Encoding: gbk, GB2312
Accept-Language: zh-cn
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Host: 103.205.252.104:9969
|
http://q1.qlogo.cn/g?b=qq&nk=&s=640 |
GET /g?b=qq&nk=&s=640 HTTP/1.1
Accept: */*
Referer: http://q1.qlogo.cn/g?b=qq&nk=&s=640
Accept-Language: zh-cn
User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Host: q1.qlogo.cn
Cache-Control: no-cache
|
静态分析
版本信息
LegalCopyright: |
XiaoXinToolBox |
FileVersion: |
1.0.1.0 |
CompanyName: |
XiaoXinToolBox |
Comments: |
XiaoXinToolBox |
ProductName: |
XiaoXinToolBox |
ProductVersion: |
1.0.1.0 |
FileDescription: |
XiaoXinToolBox |
Translation: |
0x0804 0x04b0 |
PE数据组成
名称 |
虚拟地址 |
虚拟大小 |
原始数据大小 |
特征 |
熵(Entropy) |
|
0x00001000 |
0x003ca4cd |
0x00111fd3 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ |
7.99 |
|
0x003cc000 |
0x002754d1 |
0x001322b8 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ |
7.98 |
|
0x00642000 |
0x00128c76 |
0x000334f3 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
7.98 |
|
0x0076b000 |
0x002e0bac |
0x002e1000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ |
8.00 |
.exports |
0x00a4c000 |
0x00001000 |
0x00001000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ |
0.76 |
.imports |
0x00a4d000 |
0x00001000 |
0x00001000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
1.17 |
.rsrc |
0x00a4e000 |
0x00002000 |
0x00002000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ |
3.88 |
.themida |
0x00a50000 |
0x0044c000 |
0x00000000 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
.boot |
0x00e9c000 |
0x0029f000 |
0x0029e3f8 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ |
7.96 |
导入
库 kernel32.dll:
• 0xe4d2d8 - GetModuleHandleA
库 user32.dll:
• 0xe4d2e0 - TranslateMessage
库 gdi32.dll:
• 0xe4d2e8 - PtVisible
库 gdiplus.dll:
• 0xe4d2f0 - GdipCreateBitmapFromScan0
库 ole32.dll:
• 0xe4d2f8 - CLSIDFromProgID
库 imm32.dll:
• 0xe4d300 - ImmGetCompositionStringW
库 shell32.dll:
• 0xe4d308 - ShellExecuteA
库 shlwapi.dll:
• 0xe4d310 - PathFileExistsA
库 winmm.dll:
• 0xe4d318 - timeKillEvent
库 winspool.drv:
• 0xe4d320 - DocumentPropertiesA
库 advapi32.dll:
• 0xe4d328 - CreateServiceA
库 comctl32.dll:
• 0xe4d330 - None
库 WS2_32.dll:
• 0xe4d338 - htons
库 comdlg32.dll:
• 0xe4d340 - GetSaveFileNameA
库 OLEAUT32.dll:
• 0xe4d348 - UnRegisterTypeLib
导出
序列 |
地址 |
名称 |
1 |
0x729720 |
e2ee_CacheClear |
2 |
0x729760 |
e2ee_CacheDecr |
3 |
0x729700 |
e2ee_CacheDelete |
4 |
0x7296e0 |
e2ee_CacheExists |
5 |
0x729620 |
e2ee_CacheGet |
6 |
0x7296a0 |
e2ee_CacheGetMulti |
7 |
0x7296c0 |
e2ee_CacheGetMultiText |
8 |
0x729640 |
e2ee_CacheGetText |
9 |
0x729740 |
e2ee_CacheIncr |
10 |
0x729660 |
e2ee_CacheSet |
11 |
0x729780 |
e2ee_CacheSetExpire |
12 |
0x729680 |
e2ee_CacheSetText |