二进制文件可能包含加密或压缩数据
section: name: UPX1, entropy: 8.00, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x0050e800, virtual_size: 0x0050f000
从文件自身的二进制镜像中读取数据
self_read: process: 6.24________________________.exe, pid: 2656, offset: 0x00000000, length: 0x00000040
self_read: process: 6.24________________________.exe, pid: 2656, offset: 0x000000f8, length: 0x00000020
self_read: process: 6.24________________________.exe, pid: 2656, offset: 0x0000017b, length: 0x00080000
可执行文件被使用UPX压缩
section: name: UPX0, entropy: 0.00, characteristics: IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00000000, virtual_size: 0x00970000
尝试断开连接或更改沙箱进程监控的Windows功能
unhook: function_name: SetWindowLongA, type: modification
unhook: function_name: SetWindowLongW, type: modification
魔盾安全Yara规则检测结果 - 高危
Informational: Detected Entropy signature
Informational: Detected Rich Signature
Warning: Create a new process
Warning: Detected take screenshot function
Warning: Affect system registries
Critical: Detects malicious behaviors from a small size app
Informational: Detected no presence of any attachment
Critical: Contains an embedded Mach-O file
Informational: Detected no presence of any image
Informational: Detected no presence of any url
Warning: Detected UPX. Commonly used by RAT!
Informational: UPXv20MarkusLaszloReiser
Informational: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
运行截图
网络分析
访问主机记录
直接访问 |
IP地址 |
国家名 |
是 |
43.248.186.95 |
China |
TCP连接
IP地址 |
端口 |
192.168.122.201 |
49160 |
ICMP请求
源地址 |
目标地址 |
ICMP类型 |
ICMP数据 |
192.168.122.201 |
43.248.186.95 |
8 |
|
43.248.186.95 |
192.168.122.201 |
0 |
|
静态分析
版本信息
LegalCopyright: |
\u4f5c\u8005\u7248\u6743\u6240\u6709 \u8bf7\u5c0a\u91cd\u5e76\u4f7f\u7528\u6b63\u7248 |
FileVersion: |
1.0.0.0 |
Comments: |
\u672c\u7a0b\u5e8f\u4f7f\u7528\u6613\u8bed\u8a00\u7f16\u5199(http://www.eyuyan.com) |
ProductName: |
\u6613\u8bed\u8a00\u7a0b\u5e8f |
ProductVersion: |
1.0.0.0 |
FileDescription: |
M Y\u5e94\u7528\u7a0b\u5e8f |
Translation: |
0x0804 0x04b0 |
PE数据组成
名称 |
虚拟地址 |
虚拟大小 |
原始数据大小 |
特征 |
熵(Entropy) |
UPX0 |
0x00001000 |
0x00970000 |
0x00000000 |
IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
UPX1 |
0x00971000 |
0x0050f000 |
0x0050e800 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
8.00 |
.rsrc |
0x00e80000 |
0x00013000 |
0x00012200 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
4.66 |
导入
库 ADVAPI32.dll:
• 0x1291e28 - RegCloseKey
库 AVIFIL32.dll:
• 0x1291e30 - AVIStreamInfoA
库 COMCTL32.dll:
• 0x1291e38 - None
库 comdlg32.dll:
• 0x1291e40 - ChooseFontA
库 GDI32.dll:
• 0x1291e48 - DPtoLP
库 KERNEL32.DLL:
• 0x1291e50 - LoadLibraryA
• 0x1291e54 - ExitProcess
• 0x1291e58 - GetProcAddress
• 0x1291e5c - VirtualProtect
库 MSIMG32.dll:
• 0x1291e64 - GradientFill
库 MSVFW32.dll:
• 0x1291e6c - DrawDibDraw
库 ole32.dll:
• 0x1291e74 - OleRun
库 OLEAUT32.dll:
• 0x1291e7c - VariantInit
库 oledlg.dll:
• 0x1291e84 - None
库 SHELL32.dll:
• 0x1291e8c - ShellExecuteA
库 USER32.dll:
• 0x1291e94 - GetDC
库 WINMM.dll:
• 0x1291e9c - PlaySoundA
库 WINSPOOL.DRV:
• 0x1291ea4 - ClosePrinter
库 WS2_32.dll:
• 0x1291eac - WSAAsyncSelect