二进制文件可能包含加密或压缩数据
section: name: .vmp1, entropy: 7.93, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00194000, virtual_size: 0x00193dd0
从文件自身的二进制镜像中读取数据
self_read: process: ____________.vmp.exe, pid: 1780, offset: 0x00000000, length: 0x00000040
self_read: process: ____________.vmp.exe, pid: 1780, offset: 0x00000120, length: 0x00000020
self_read: process: ____________.vmp.exe, pid: 1780, offset: 0x000001a3, length: 0x00080000
投放了一个或多个可疑文件
suspicious: c:\users\test\appdata\local\temp\rr.bat
suspicious: c:\users\test\appdata\local\temp\rr.bat
可执行文件可能使用VMProtect打包
section: {'name': '.vmp0', 'characteristics': 'IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE', 'virtual_address': '0x0015b000', 'size_of_data': '0x00000000', 'entropy': '0.00', 'virtual_size': '0x000e9db7', 'characteristics_raw': '0xe0000060'}
尝试阻止Cuckoo线程以防止恶意行为被记录
尝试断开连接或更改Cuckoo监控的Windows功能
unhook: function_name: SetWindowLongA, type: modification
unhook: function_name: SetWindowLongW, type: modification
运行截图
静态分析
版本信息
LegalCopyright: |
\x4f5c\x8005\x7248\x6743\x6240\x6709 \x8bf7\x5c0a\x91cd\x5e76\x4f7f\x7528\x6b63\x7248 |
FileVersion: |
1.0.0.0 |
Comments: |
\x672c\x7a0b\x5e8f\x4f7f\x7528\x6613\x8bed\x8a00\x7f16\x5199(http://www.eyuyan.com) |
ProductName: |
Dev. |
ProductVersion: |
1.0.0.0 |
FileDescription: |
\x6613\x8bed\x8a00\x7a0b\x5e8f |
Translation: |
0x0804 0x04b0 |
PE数据组成
名称 |
虚拟地址 |
虚拟大小 |
原始数据大小 |
特征 |
熵(Entropy) |
.text |
0x00001000 |
0x000b1c26 |
0x00000000 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ |
0.00 |
.rdata |
0x000b3000 |
0x0005755e |
0x00000000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ |
0.00 |
.data |
0x0010b000 |
0x0004f72a |
0x00000000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
.vmp0 |
0x0015b000 |
0x000e9db7 |
0x00000000 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
.vmp1 |
0x00245000 |
0x00193dd0 |
0x00194000 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
7.93 |
.rsrc |
0x003d9000 |
0x000040f5 |
0x00005000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ |
5.44 |
资源
名称 |
偏移量 |
大小 |
语言 |
子语言 |
熵(Entropy) |
文件类型 |
RT_ICON |
0x003dbbf4 |
0x000010a8 |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
6.72 |
data |
RT_ICON |
0x003dbbf4 |
0x000010a8 |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
6.72 |
data |
RT_ICON |
0x003dbbf4 |
0x000010a8 |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
6.72 |
data |
RT_ICON |
0x003dbbf4 |
0x000010a8 |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
6.72 |
data |
RT_GROUP_ICON |
0x003dccd4 |
0x00000014 |
LANG_CHINESE |
SUBLANG_CHINESE_SIMPLIFIED |
2.02 |
MS Windows icon resource - 1 icon, 16x16, 16 colors |
RT_GROUP_ICON |
0x003dccd4 |
0x00000014 |
LANG_CHINESE |
SUBLANG_CHINESE_SIMPLIFIED |
2.02 |
MS Windows icon resource - 1 icon, 16x16, 16 colors |
RT_GROUP_ICON |
0x003dccd4 |
0x00000014 |
LANG_CHINESE |
SUBLANG_CHINESE_SIMPLIFIED |
2.02 |
MS Windows icon resource - 1 icon, 16x16, 16 colors |
RT_VERSION |
0x003dcce8 |
0x00000240 |
LANG_CHINESE |
SUBLANG_CHINESE_SIMPLIFIED |
3.77 |
data |
RT_MANIFEST |
0x003dcf28 |
0x000001cd |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
5.08 |
XML 1.0 document, ASCII text, with very long lines, with no line terminators |
导入
库 WINMM.dll:
• 0x694000 - midiStreamClose
库 WS2_32.dll:
• 0x694008 - WSACleanup
库 KERNEL32.dll:
• 0x694010 - GetVersionExA
• 0x694014 - GetVersion
• 0x694018 - GlobalFindAtomA
库 USER32.dll:
• 0x694020 - IntersectRect
库 GDI32.dll:
• 0x694028 - GetStretchBltMode
库 WINSPOOL.DRV:
• 0x694030 - DocumentPropertiesA
库 ADVAPI32.dll:
• 0x694038 - RegCloseKey
库 SHELL32.dll:
• 0x694040 - SHGetSpecialFolderPathA
库 ole32.dll:
• 0x694048 - OleUninitialize
库 OLEAUT32.dll:
• 0x694050 - UnRegisterTypeLib
库 COMCTL32.dll:
• 0x694058 - None
库 comdlg32.dll:
• 0x694060 - GetFileTitleA
库 KERNEL32.dll:
• 0x694068 - GetModuleFileNameW
库 KERNEL32.dll:
• 0x694070 - GetModuleHandleA
• 0x694074 - LoadLibraryA
• 0x694078 - LocalAlloc
• 0x69407c - LocalFree
• 0x694080 - GetModuleFileNameA
• 0x694084 - ExitProcess
投放文件
rr.bat
文件名 |
rr.bat |
相关文件 |
- C:\Users\test\AppData\Local\Temp\rr.bat
|
文件大小 |
12144 bytes |
文件类型 |
PE32+ executable (native) x86-64, for MS Windows |
MD5 |
dad20e4603919391341db0d925c901db |
SHA1 |
7bc9eb4e384860955415b95c1e1c18ad099e7b96 |
SHA256 |
e0d319c43a12f927d0630056aeef89d654d550bd1f2a9d096c30565f72fcefa8 |
SHA512 |
380af0b3ec63f41aec4c94f1030a584a8a73bc0f5f9bc70849211012e0a254ac3478b52ab92a1be3e4cefb2809695d345d48e33194e7242e5b3bc57b8498f00c |
Ssdeep |
192:qUW6VaGwODiSl9TYhhKG53+ebCfjpQpkqs1I5ZgjlNc:RW6VarOTlXG5JbCN1M6j0 |
VirusTotal |
搜索相关分析 |