section: name: UPX1, entropy: 7.96, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x0000aa00, virtual_size: 0x0000b000
一个进程创建了一个隐藏窗口
Process: ___________________________.exe -> C:\Windows\sysnative\cmd
魔盾安全Yara规则检测结果 - 安全告警
Critical: Spotted potential malicious behaviors from a small size target, like process manipultion, privilege, token and files
Warning: Detected UPX. Commonly used by RAT!
可执行文件被使用UPX压缩
section: name: UPX0, entropy: 0.00, characteristics: IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00000000, virtual_size: 0x00013000
检测到样本尝试异常命令
Anomaly: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4902.bat C:\Users\test\AppData\Local\Temp\___________________________.exe" executed
强制将一个创建的进程加载为另一个不相关进程的子进程
process: C:\Windows\sysnative\cmd.exe, PID 2560
可能是恶意的样本写入可疑的执行文件和库文件到系统目录并执行
Process: c:\windows\sysnative\cmd.exe
Process: c:\windows\sysnative\cmd.exe
文件已被至少一个VirusTotal上的反病毒引擎检测为病毒
CAT-QuickHeal: Trojan.CoinMinerPMF.S2180977
McAfee: Artemis!F93879211F55
Cylance: Unsafe
K7GW: Trojan ( 0051918e1 )
K7AntiVirus: Trojan ( 0051918e1 )
Invincea: heuristic
Symantec: ML.Attribute.HighConfidence
APEX: Malicious
ClamAV: Win.Malware.Xtrat-6913730-0
DrWeb: BackDoor.Xtreme.38
McAfee-GW-Edition: BehavesLike.Win32.Generic.qc
FireEye: Generic.mg.f93879211f559f07
Jiangmin: RiskTool.BitCoinMiner.gwc
Microsoft: Trojan:Win32/Wacatac.B!ml
Endgame: malicious (moderate confidence)
AhnLab-V3: Trojan/Win32.Agent.C2844240
Acronis: suspicious
Zoner: Trojan.Win32.73853
Rising: Trojan.Tiggre!8.ED98/N3#100% (RDM+:cmRtazrmrzz8kqgN3xHHgendpJgm)
SentinelOne: DFI - Suspicious PE
Cybereason: malicious.364f7f
CrowdStrike: win/malicious_confidence_80% (D)
运行截图
静态分析
版本信息
LegalCopyright: |
\u98ce\u4e4b\u6687\u60f3 |
InternalName: |
GoldWave |
FileVersion: |
6.40.0.0 |
CompanyName: |
GoldWave Inc. |
LegalTrademarks: |
GoldWave\xae GoldWave Inc. |
ProductName: |
GoldWave |
ProductVersion: |
6.40.0.0 |
FileDescription: |
\u8bbe\u7f6e\u4e2d\u6587 |
OriginalFilename: |
GoldWave.exe |
Translation: |
0x0000 0x04e4 |
PE数据组成
名称 |
虚拟地址 |
虚拟大小 |
原始数据大小 |
特征 |
熵(Entropy) |
UPX0 |
0x00001000 |
0x00013000 |
0x00000000 |
IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
0.00 |
UPX1 |
0x00014000 |
0x0000b000 |
0x0000aa00 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
7.96 |
.rsrc |
0x0001f000 |
0x00004000 |
0x00003200 |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE |
5.57 |
导入
库 COMCTL32.DLL:
• 0x421f14 - InitCommonControlsEx
库 GDI32.DLL:
• 0x421f1c - GetStockObject
库 KERNEL32.DLL:
• 0x421f24 - LoadLibraryA
• 0x421f28 - ExitProcess
• 0x421f2c - GetProcAddress
• 0x421f30 - VirtualProtect
库 MSVCRT.dll:
• 0x421f38 - free
库 OLE32.DLL:
• 0x421f40 - CoInitialize
库 SHELL32.DLL:
• 0x421f48 - ShellExecuteExW
库 SHLWAPI.DLL:
• 0x421f50 - PathRemoveArgsW
库 USER32.DLL:
• 0x421f58 - SetFocus
库 WINMM.DLL:
• 0x421f60 - timeBeginPeriod
行为分析
互斥量(Mutexes)
- Local\ZoneAttributeCacheCounterMutex
- Local\ZonesCacheCounterMutex
- Local\ZonesLockedCacheCounterMutex
- Local\MSCTF.Asm.MutexDefault1
- Local\_!MSFTHISTORY!_
- Local\c:!users!test!appdata!local!microsoft!windows!temporary internet files!content.ie5!
- Local\c:!users!test!appdata!roaming!microsoft!windows!cookies!
- Local\c:!users!test!appdata!local!microsoft!windows!history!history.ie5!
- Local\WininetStartupMutex
- Local\WininetConnectionMutex
- Local\WininetProxyRegistryMutex
执行的命令
- "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4902.bat C:\Users\test\AppData\Local\Temp\___________________________.exe"
- C:\Windows\sysnative\cmd /c "C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4902.bat C:\Users\test\AppData\Local\Temp\___________________________.exe"
- xcopy "Language\zh.lang" "C:\Users\test\AppData\Roaming\GoldWave\" /c /e /h /y
- mshta vbscript:msgbox("\xe5\xb7\xb2\xe8\xae\xbe\xe7\xbd\xae\xe4\xb8\xba\xe4\xb8\xad\xe6\x96\x87\xef\xbc\x8c\xe5\xa6\x82\xe4\xb8\x8d\xe6\x88\x90\xe5\x8a\x9f\xe8\xaf\xb7\xe6\x89\x8b\xe5\x8a\xa8\xe8\xae\xbe\xe7\xbd\xaeOptions-Language-Active Language-\xe4\xb8\xad\xe6\x96\x87\xef\xbc\x8c\xe7\xa1\xae\xe5\xae\x9a\xe5\x90\x8e\xe9\x87\x8d\xe5\x90\xaf\xe8\xbd\xaf\xe4\xbb\xb6\xe5\x8d\xb3\xe5\x8f\xaf\xef\xbc\x81",vbSystemModal,"\xe9\xa3\x8e\xe4\xb9\x8b\xe6\x9a\x87\xe6\x83\xb3")(window.close)
创建的服务
无信息
启动的服务
无信息
进程
___________________________.exe PID: 2472, 上一级进程 PID: 2320
cmd.exe PID: 2560, 上一级进程 PID: 2472
xcopy.exe PID: 2636, 上一级进程 PID: 2560
mshta.exe PID: 2700, 上一级进程 PID: 2560
读取的文件
- \Device\KsecDD
- C:\Windows\sysnative\cmd
- C:\Windows\sysnative\cmd.exe
- C:\Users\test\AppData\Local\Temp\48F1.tmp
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4902.tmp
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4903.tmp
- C:\Windows\Globalization\Sorting\sortdefault.nls
- C:\Windows\SysWOW64\shell32.dll
- C:\
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000052.db
- C:\Users\desktop.ini
- C:\Users
- C:\Users\test
- C:\Users\test\AppData
- C:\Users\test\Desktop\desktop.ini
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4902.bat
- C:\Windows\sysnative\zh-CN\KERNELBASE.dll.mui
- C:\Windows\Fonts\staticcache.dat
- C:\Windows\sysnative\en-US\mlang.dll.mui
- C:\Users\test\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- C:\Users\test\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- C:\Users\test\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- C:\Windows\sysnative\wininet.dll
- C:\Windows\sysnative\dnsapi.dll
- C:\Windows\sysnative\IPHLPAPI.DLL
- C:\Windows\sysnative\winnsi.dll
- C:\Windows\sysnative\inetcpl.cpl
修改的文件
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4902.bat
- C:\Users\test\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- C:\Users\test\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- C:\Users\test\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- C:\Users\test\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CB4GP22D\error[1]
- C:\Users\test\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHDRIWWS\error[1]
- C:\Users\test\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HEL4YQ7U\warning[1]
删除的文件
- C:\Users\test\AppData\Local\Temp\48F1.tmp
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4902.tmp
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4903.tmp
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\extd.exe
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\4902.bat
- C:\Users\test\AppData\Local\Temp\48F1.tmp\48F2.tmp\
修改的注册表键
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect
删除的注册表键
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName