通过进程尝试延迟分析任务
Process: virus.exe tried to sleep 60 seconds, actually delayed analysis time by 0 seconds
检测到网络活动但没有显示在API日志中
country_name: United States
ip: 199.168.187.66
inaddrarpa:
hostname: www.soft.enkeladress.com
score: unknown
ip: 199.168.187.66
domain: www.soft.enkeladress.com
发起了一些HTTP请求
url: http://www.soft.enkeladress.com/
url: http://www.soft.enkeladress.com/favicon.ico
二进制文件可能包含加密或压缩数据
section: name: .vmp1, entropy: 7.96, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ, raw_size: 0x00543e00, virtual_size: 0x00543d70
从文件自身的二进制镜像中读取数据
self_read: process: virus.exe, pid: 2660, offset: 0x00000000, length: 0x00000040
self_read: process: virus.exe, pid: 2660, offset: 0x00000080, length: 0x00000018
self_read: process: virus.exe, pid: 2660, offset: 0x00000178, length: 0x00000168
self_read: process: virus.exe, pid: 2660, offset: 0x00544200, length: 0x00000018
self_read: process: virus.exe, pid: 2660, offset: 0x00544230, length: 0x00000018
self_read: process: virus.exe, pid: 2660, offset: 0x00544290, length: 0x00000018
self_read: process: virus.exe, pid: 2660, offset: 0x005442f0, length: 0x00000010
self_read: process: virus.exe, pid: 2660, offset: 0x00544330, length: 0x00000010
魔盾安全Yara规则检测结果 - 安全告警
Informational: Detected Entropy signature
Warning: Create a new process
Warning: Run a keylogger
Warning: Affect system registries
Critical: Detects malicious behaviors from a small size app
Informational: Detected no presence of any attachment
Informational: Detected no presence of any image
Informational: Detected no presence of any url
可执行文件可能使用VMProtect打包
section: {'name': '.vmp0', 'characteristics': 'IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ', 'virtual_address': '0x00072000', 'size_of_data': '0x00000000', 'entropy': '0.00', 'virtual_size': '0x00325015', 'characteristics_raw': '0x60000060'}
异常的二进制特征
anomaly: Timestamp on binary predates the release date of the OS version it requires by at least a year
尝试阻止沙箱线程以防止恶意行为被记录
尝试断开连接或更改沙箱进程监控的Windows功能
unhook: function_name: NtProtectVirtualMemory, type: modification
运行截图
网络分析
访问主机记录
直接访问 |
IP地址 |
国家名 |
否 |
199.168.187.66 |
United States |
域名解析
域名 |
响应 |
www.soft.enkeladress.com |
A 199.168.187.66
|
TCP连接
IP地址 |
端口 |
199.168.187.66 |
80 |
199.168.187.66 |
80 |
UDP连接
IP地址 |
端口 |
192.168.122.1 |
53 |
192.168.122.1 |
53 |
HTTP请求
URL |
HTTP数据 |
http://www.soft.enkeladress.com/ |
GET / HTTP/1.1
Accept: */*
Accept-Language: zh-cn
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: www.soft.enkeladress.com
Connection: Keep-Alive
|
http://www.soft.enkeladress.com/favicon.ico |
GET /favicon.ico HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: www.soft.enkeladress.com
Connection: Keep-Alive
Cookie: PHPSESSID=08f803a69252d59da18de27a8d94a071
|
静态分析
版本信息
LegalCopyright: |
|
InternalName: |
|
FileVersion: |
1.0.0.136 |
CompanyName: |
MAX!MEMZ |
LegalTrademarks: |
|
Comments: |
|
ProductName: |
MAX!MEMZ |
ProductVersion: |
1.0.0.0 |
FileDescription: |
|
OriginalFilename: |
|
Translation: |
0x0804 0x03a8 |
PE数据组成
名称 |
虚拟地址 |
虚拟大小 |
原始数据大小 |
特征 |
熵(Entropy) |
CODE |
0x00001000 |
0x00068de8 |
0x00000000 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ |
0.00 |
DATA |
0x0006a000 |
0x00001438 |
0x00000000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
BSS |
0x0006c000 |
0x00000ca5 |
0x00000000 |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
.idata |
0x0006d000 |
0x00002758 |
0x00000000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
.tls |
0x00070000 |
0x00000010 |
0x00000000 |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
.rdata |
0x00071000 |
0x00000018 |
0x00000000 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ |
0.00 |
.vmp0 |
0x00072000 |
0x00325015 |
0x00000000 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ |
0.00 |
.vmp1 |
0x00398000 |
0x00543d70 |
0x00543e00 |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ |
7.96 |
.rsrc |
0x008dc000 |
0x0000215c |
0x00002200 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ |
4.11 |
导入
库 kernel32.dll:
• 0x901000 - GetVersion
库 user32.dll:
• 0x901008 - GetKeyboardType
库 advapi32.dll:
• 0x901010 - RegQueryValueExA
库 oleaut32.dll:
• 0x901018 - SysFreeString
库 kernel32.dll:
• 0x901020 - TlsSetValue
库 advapi32.dll:
• 0x901028 - RegSetValueExA
库 kernel32.dll:
• 0x901030 - GetVersionExA
• 0x901034 - GetVersion
库 version.dll:
• 0x90103c - VerQueryValueA
库 gdi32.dll:
• 0x901044 - UnrealizeObject
库 user32.dll:
• 0x90104c - CreateWindowExA
库 kernel32.dll:
• 0x901054 - Sleep
库 oleaut32.dll:
• 0x90105c - SafeArrayPtrOfIndex
库 ole32.dll:
• 0x901064 - CreateStreamOnHGlobal
库 oleaut32.dll:
• 0x90106c - CreateErrorInfo
库 comctl32.dll:
• 0x901074 - ImageList_SetIconSize
库 shell32.dll:
• 0x90107c - ShellExecuteA
库 shell32.dll:
• 0x901084 - SHGetSpecialFolderLocation
库 comdlg32.dll:
• 0x90108c - GetSaveFileNameA
库 wsock32.dll:
• 0x901094 - WSACleanup
库 WTSAPI32.dll:
• 0x90109c - WTSSendMessageW
库 kernel32.dll:
• 0x9010a4 - VirtualQuery
库 user32.dll:
• 0x9010ac - GetUserObjectInformationW
库 kernel32.dll:
• 0x9010b4 - LocalAlloc
• 0x9010b8 - LocalFree
• 0x9010bc - GetModuleFileNameW
• 0x9010c0 - GetProcessAffinityMask
• 0x9010c4 - SetProcessAffinityMask
• 0x9010c8 - SetThreadAffinityMask
• 0x9010cc - Sleep
• 0x9010d0 - ExitProcess
• 0x9010d4 - FreeLibrary
• 0x9010d8 - LoadLibraryA
• 0x9010dc - GetModuleHandleA
• 0x9010e0 - GetProcAddress
库 user32.dll:
• 0x9010e8 - GetProcessWindowStation
• 0x9010ec - GetUserObjectInformationW
行为分析
互斥量(Mutexes)
- Local\MSCTF.Asm.MutexDefault1
- Local\!IETld!Mutex
执行的命令
- http://www.soft.enkeladress.com/
- http://www.soft.enkeladress.com
创建的服务
无信息
启动的服务
无信息
进程
virus.exe PID: 2660, 上一级进程 PID: 2300
访问的文件
- C:\Users\test\AppData\Local\Temp\virus.exe
- C:\Users
- C:\Users\test
- C:\Users\test\AppData
- C:\Users\test\AppData\Local
- C:\Users\test\AppData\Local\Temp
- C:\Users\test\AppData\Local\Temp\virus.CHS
- C:\Users\test\AppData\Local\Temp\virus.CHS.DLL
- C:\Users\test\AppData\Local\Temp\virus.CH
- C:\Users\test\AppData\Local\Temp\virus.CH.DLL
- C:\Windows\Globalization\Sorting\sortdefault.nls
- \Device\KsecDD
- C:\Windows\Fonts\staticcache.dat
- C:\Users\test\AppData\Local\Temp\script.vbs
- C:\Users\test\AppData\Local\Temp\virus.tmp
- C:\Windows\SysWOW64\ieframe.dll
读取的文件
- C:\Windows\Globalization\Sorting\sortdefault.nls
- C:\Users\test\AppData\Local\Temp\virus.exe
- \Device\KsecDD
- C:\Windows\Fonts\staticcache.dat
- C:\Users\test\AppData\Local\Temp\virus.tmp
- C:\Windows\SysWOW64\ieframe.dll
修改的文件
- C:\Users\test\AppData\Local\Temp\virus.tmp
删除的文件
- C:\Users\test\AppData\Local\Temp\script.vbs
删除的注册表键
无信息