Informational: Detected Entropy signature
Informational: Detected Rich Signature
Informational: Create a new process
Critical: Detects malicious behaviors from a small size app
Informational: Detected no presence of any attachment
Informational: Detected no presence of any image
Informational: Detected no presence of any url
Warning: Detected UPX. Commonly used by RAT!
Informational: UPXv20MarkusLaszloReiser
Informational: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Informational: UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser
Informational: UPX 3.X
可执行文件被使用UPX压缩
section: name: UPX0, entropy: 0.00, characteristics: IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00000000, virtual_size: 0x0000a000
生成可疑网络流量,可能被用来进行恶意活动
signature: ET TROJAN [PTsecurity] Botnet Nitol.B Checkin
将自己装载到Windows开机自动启动项目
service name: .Net CLR
service path: C:\Windows\meguwo.exe
通过进程尝试长时间延迟分析任务
Process: meguwo.exe tried to sleep 181 seconds, actually delayed analysis time by 0 seconds
生成一个自己的复制文件
copy: C:\Windows\meguwo.exe
运行截图
网络分析
访问主机记录
直接访问 |
IP地址 |
国家名 |
否 |
139.196.209.127 |
China |
域名解析
域名 |
响应 |
ip.yototoo.com |
A 139.196.209.127
|
TCP连接
IP地址 |
端口 |
139.196.209.127 |
2017 |
静态分析
版本信息
LegalCopyright: |
yetaimei.com |
InternalName: |
yetaimei |
FileVersion: |
1, 2, 2, 1536 |
CompanyName: |
yetaimei |
PrivateBuild: |
|
LegalTrademarks: |
|
Comments: |
|
ProductName: |
yetaimei |
SpecialBuild: |
|
ProductVersion: |
1, 2, 2, 1536 |
FileDescription: |
yetaimei.com |
OriginalFilename: |
|
Translation: |
0x0804 0x04b0 |
PE数据组成
名称 |
虚拟地址 |
虚拟大小 |
原始数据大小 |
特征 |
熵(Entropy) |
UPX0 |
0x00001000 |
0x0000a000 |
0x00000000 |
IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
UPX1 |
0x0000b000 |
0x00005000 |
0x00004600 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
7.88 |
.rsrc |
0x00010000 |
0x00002000 |
0x00001800 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
5.34 |
资源
名称 |
偏移量 |
大小 |
语言 |
子语言 |
熵(Entropy) |
文件类型 |
RT_RCDATA |
0x0000a200 |
0x00002000 |
LANG_CHINESE |
SUBLANG_CHINESE_SIMPLIFIED |
0.00 |
None |
导入
库 KERNEL32.DLL:
• 0x411690 - LoadLibraryA
• 0x411694 - GetProcAddress
• 0x411698 - VirtualProtect
• 0x41169c - VirtualAlloc
• 0x4116a0 - VirtualFree
• 0x4116a4 - ExitProcess
库 ADVAPI32.dll:
• 0x4116ac - OpenServiceA
库 iphlpapi.dll:
• 0x4116b4 - GetIfTable
库 MSVCRT.dll:
• 0x4116bc - free
库 SHELL32.dll:
• 0x4116c4 - ShellExecuteA
库 SHLWAPI.dll:
• 0x4116cc - SHDeleteKeyA
库 USER32.dll:
• 0x4116d4 - wsprintfA
库 WS2_32.dll:
• 0x4116dc - htons
投放文件
meguwo.exe
文件名 |
meguwo.exe |
相关文件 |
|
文件大小 |
25088 bytes |
文件类型 |
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
MD5 |
33d9b1744eeaf4a54b0b34c4e7818a52 |
SHA1 |
6faa63ac01e2a9fd0b587ca237e2b60199598794 |
SHA256 |
407ef8026d93b555ba3c2bd1fe941c6359f30714cb671e1f51d236cc487675c6 |
SHA512 |
d3e086ab3a7e16fd20227d1731c4e7d3d714d6131051524ddffe0e5e8ab8f85bee52f863e6aae84118dd8ea63a78910e1d94d3670e80d667e741592023779010 |
Ssdeep |
384:zsNpvXJMLbDqV2IGGKiEWBAWklalz3u9YqlivFz6V/jJjjdQFZLnqa:zgpaLN2fBAhlad3SY3hStGTq |
VirusTotal |
搜索相关分析 |
行为分析
互斥量(Mutexes)
- C:\Users\test\AppData\Local\Temp\ytmd.exe
- Local\ZoneAttributeCacheCounterMutex
- Local\ZonesCacheCounterMutex
- Local\ZonesLockedCacheCounterMutex
- C:\Windows\meguwo.exe
- .Net CLR
- DBWinMutex
执行的命令
- "C:\Windows\system32\cmd.exe" /c del C:\Users\test\AppData\Local\Temp\ytmd.exe > nul
- C:\Windows\System32\cmd.exe /c del C:\Users\test\AppData\Local\Temp\ytmd.exe > nul
- C:\Windows\meguwo.exe
- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
- C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
- C:\Windows\system32\sppsvc.exe
进程
ytmd.exe PID: 2440, 上一级进程 PID: 2296
services.exe PID: 428, 上一级进程 PID: 332
meguwo.exe PID: 2576, 上一级进程 PID: 428
cmd.exe PID: 2680, 上一级进程 PID: 2440
mscorsvw.exe PID: 2360, 上一级进程 PID: 428
mscorsvw.exe PID: 708, 上一级进程 PID: 428
访问的文件
- C:\Users\test\AppData\Local\Temp\ytmd.exe
- C:\Windows\meguwo.exe
- \Device\KsecDD
- C:\Windows\System32\cmd.exe
- C:\Windows\SysWOW64\shell32.dll
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000052.db
- C:\Users\test\Desktop\desktop.ini
- C:\Windows\SysWOW64\propsys.dll
- C:\Windows\sysnative\propsys.dll
- C:\Windows
- C:\Windows\System32
- C:\Windows\System32\cmd.exe:Zone.Identifier
- \??\MountPointManager
- C:\Windows\Temp
- C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp
- C:\Windows\ServiceProfiles
- C:\Windows\ServiceProfiles\LocalService
- C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp
- C:\Windows\ServiceProfiles\NetworkService
- C:\Windows\System32\tzres.dll
- C:\Windows\hra33.dll
- C:\Windows\System32\hra33.dll
- C:\Windows\system\hra33.dll
- C:\ProgramData\Oracle\Java\javapath\hra33.dll
- C:\Windows\System32\wbem\hra33.dll
- C:\Windows\System32\WindowsPowerShell\v1.0\hra33.dll
- C:\Program Files (x86)\WinRAR\hra33.dll
- C:\Users\test\AppData\Local\Temp
- C:\Users
- C:\Users\test
- C:\Users\test\AppData
- C:\Users\test\AppData\Local
- \??\nul
- C:\
- C:\Windows\Microsoft.NET\Framework\v4.0.30319\ndpsetup.bat
- C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat
- C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat
- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ndpsetup.bat
- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat
- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat
读取的文件
- C:\Users\test\AppData\Local\Temp\ytmd.exe
- \Device\KsecDD
- C:\Windows\SysWOW64\shell32.dll
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000052.db
- C:\Users\test\Desktop\desktop.ini
- C:\Windows\System32\tzres.dll
修改的文件
- C:\Windows\meguwo.exe
- \??\nul
- C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat
- C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat
- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat
- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat
删除的文件
- C:\Users\test\AppData\Local\Temp\ytmd.exe
修改的注册表键
- HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.Net CLR\Description
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect
删除的注册表键
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName