分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
文件 (Windows) win7-sp1-x64-shaapp02-1 2024-03-27 15:51:10 2024-03-27 15:52:18 68 秒

魔盾分数

2.675

可疑的

文件详细信息

文件名 fontSetting.exe
文件大小 285904 字节
文件类型 PE32+ executable (console) x86-64, for MS Windows
MD5 c3e0697e6c50bfdc5f5f3a52ad2311ee
SHA1 0275f698434064f7be31753373e041323eeb8814
SHA256 d975c57c9ffefa30a4348db988ffdbcfcf178f8fc74036da2c51df2063eb6132
SHA512 4f7a86f02e555e152bcb80e6ad4407f55b69316a4afde61a2f4dec3aacc7ca0a9e72d74cf2eaed2fd6cbc9c6f1aeff34aa55301b28ad4dd9b9c8e73743744847
CRC32 99A559AE
Ssdeep 6144:pjH0lTwCgogQmCYWYHZwmYJX8bABVAT1ohHJxV5:Sv8wY5wm3G25oTb5
Yara 登录查看Yara规则
找不到该样本 提交漏报

登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

无域名信息.


摘要

登录查看详细行为信息

PE 信息

初始地址 0x140000000
入口地址 0x14000c7cc
声明校验值 0x0004695f
实际校验值 0x0004695f
最低操作系统版本要求 6.0
PDB路径 C:\Users\Cirno\Documents\rpgProjs\loaders\x64\Release\fontSetting.pdb
编译时间 2023-07-16 13:32:11
载入哈希 73efb6598cc7edcbe1e557e014bb1679

微软证书验证 (Sign Tool)

SHA1 时间戳 有效性 错误
None Thu Oct 05 01:44:15 2023
WinVerifyTrust returned error 0x800B010A
证书链 Certificate Chain 1
发行给 Sectigo Public Code Signing Root R46
发行人 AAA Certificate Services
有效期 Mon Jan 01 075959 2029
SHA1 哈希 329b78a5c9ebc2043242de90ce1b7c6b1ba6c692
证书链 Certificate Chain 2
发行给 Sectigo Public Code Signing CA R36
发行人 Sectigo Public Code Signing Root R46
有效期 Sat Mar 22 075959 2036
SHA1 哈希 0bc5e76773d2e44fc9903d4dfefe451553bbec4a
证书链 Certificate Chain 3
发行给
发行人 Sectigo Public Code Signing CA R36
有效期 Mon Apr 07 075959 2025
SHA1 哈希 692a53570cca420fabc77b6b35b61fb27905483d
证书链 Timestamp Chain 1
发行给 DigiCert Assured ID Root CA
发行人 DigiCert Assured ID Root CA
有效期 Mon Nov 10 080000 2031
SHA1 哈希 0563b8630d62d75abbc8ab1e4bdfb5a899b24d43
证书链 Timestamp Chain 2
发行给 DigiCert Trusted Root G4
发行人 DigiCert Assured ID Root CA
有效期 Mon Nov 10 075959 2031
SHA1 哈希 a99d5b79e9f1cda59cdab6373169d5353f5874c6
证书链 Timestamp Chain 3
发行给 DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
发行人 DigiCert Trusted Root G4
有效期 Mon Mar 23 075959 2037
SHA1 哈希 b6c8af834d4e53b673c76872aa8c950c7c54df5f
证书链 Timestamp Chain 4
发行给 DigiCert Timestamp 2023
发行人 DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
有效期 Sat Oct 14 075959 2034
SHA1 哈希 66f02b32c2c2c90f825dceaa8ac9c64f199ccf40

PE 数据组成

名称 虚拟地址 虚拟大小 原始数据大小 特征 熵(Entropy)
.text 0x00001000 0x0002b948 0x0002ba00 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 6.37
.rdata 0x0002d000 0x000123c0 0x00012400 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 5.13
.data 0x00040000 0x00002a24 0x00001200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 2.77
.pdata 0x00043000 0x00002d78 0x00002e00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 5.34
_RDATA 0x00046000 0x00000200 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 3.59
.rsrc 0x00047000 0x000001e0 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 4.71
.reloc 0x00048000 0x00000918 0x00000a00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 5.24

导入

库: KERNEL32.dll:
0x14002d010 LoadLibraryW
0x14002d018 MultiByteToWideChar
0x14002d020 WideCharToMultiByte
0x14002d028 SetConsoleCP
0x14002d030 HeapSize
0x14002d038 LoadLibraryA
0x14002d040 GetProcessHeap
0x14002d048 SetEnvironmentVariableW
0x14002d050 FreeEnvironmentStringsW
0x14002d058 GetEnvironmentStringsW
0x14002d060 GetOEMCP
0x14002d068 GetProcAddress
0x14002d070 GetACP
0x14002d078 IsValidCodePage
0x14002d080 FindNextFileW
0x14002d088 EncodePointer
0x14002d090 DecodePointer
0x14002d098 EnterCriticalSection
0x14002d0a0 LeaveCriticalSection
0x14002d0b0 DeleteCriticalSection
0x14002d0b8 LCMapStringEx
0x14002d0c0 GetStringTypeW
0x14002d0c8 GetCPInfo
0x14002d0d0 RtlCaptureContext
0x14002d0d8 RtlLookupFunctionEntry
0x14002d0e0 RtlVirtualUnwind
0x14002d0e8 IsDebuggerPresent
0x14002d0f0 UnhandledExceptionFilter
0x14002d100 GetStartupInfoW
0x14002d110 GetModuleHandleW
0x14002d118 GetCurrentProcess
0x14002d120 TerminateProcess
0x14002d128 QueryPerformanceCounter
0x14002d130 GetCurrentProcessId
0x14002d138 GetCurrentThreadId
0x14002d140 GetSystemTimeAsFileTime
0x14002d148 InitializeSListHead
0x14002d150 RtlPcToFileHeader
0x14002d158 RaiseException
0x14002d160 RtlUnwindEx
0x14002d168 GetLastError
0x14002d170 SetLastError
0x14002d180 TlsAlloc
0x14002d188 TlsGetValue
0x14002d190 TlsSetValue
0x14002d198 TlsFree
0x14002d1a0 FreeLibrary
0x14002d1a8 LoadLibraryExW
0x14002d1b0 RtlUnwind
0x14002d1b8 CreateFileW
0x14002d1c0 GetDriveTypeW
0x14002d1d0 GetFileType
0x14002d1d8 CloseHandle
0x14002d1e0 PeekNamedPipe
0x14002d1f0 FileTimeToSystemTime
0x14002d1f8 ExitProcess
0x14002d200 GetModuleHandleExW
0x14002d208 GetModuleFileNameW
0x14002d210 GetStdHandle
0x14002d218 WriteFile
0x14002d220 GetCommandLineA
0x14002d228 GetCommandLineW
0x14002d230 GetCurrentDirectoryW
0x14002d238 HeapFree
0x14002d240 HeapAlloc
0x14002d248 GetFullPathNameW
0x14002d250 FlsAlloc
0x14002d258 FlsGetValue
0x14002d260 FlsSetValue
0x14002d268 FlsFree
0x14002d270 CompareStringW
0x14002d278 LCMapStringW
0x14002d280 GetLocaleInfoW
0x14002d288 IsValidLocale
0x14002d290 GetUserDefaultLCID
0x14002d298 EnumSystemLocalesW
0x14002d2a0 SetStdHandle
0x14002d2a8 FlushFileBuffers
0x14002d2b0 GetConsoleOutputCP
0x14002d2b8 GetConsoleMode
0x14002d2c0 ReadFile
0x14002d2c8 GetFileSizeEx
0x14002d2d0 SetFilePointerEx
0x14002d2d8 ReadConsoleW
0x14002d2e0 HeapReAlloc
0x14002d2e8 GetTimeZoneInformation
0x14002d2f0 FindClose
0x14002d2f8 FindFirstFileExW
0x14002d300 WriteConsoleW
库: USER32.dll:
0x14002d310 ShowWindow
0x14002d318 MoveWindow
0x14002d320 GetWindow
0x14002d328 GetClassNameW
0x14002d330 SetWindowPos
库: COMDLG32.dll:
0x14002d000 ChooseFontW
库: ole32.dll:
0x14002d340 CoInitialize
0x14002d348 CoUninitialize

.text
`.rdata
@.data
.pdata
@_RDATA
@.rsrc
@.reloc
没有防病毒引擎扫描信息!

进程树


fontSetting.exe, PID: 2736, 上一级进程 PID: 2404

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49157 104.114.77.136 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 63246 192.168.122.1 53

域名解析 (可点击查询WPING实时安全评级)

无域名信息.

TCP

源地址 源端口 目标地址 目标端口
192.168.122.201 49157 104.114.77.136 80

UDP

源地址 源端口 目标地址 目标端口
192.168.122.201 63246 192.168.122.1 53

HTTP 请求

URI HTTP数据
URL专业沙箱检测 -> http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip
GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1
Accept: */*
If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT
User-Agent: IPM
Host: acroipm.adobe.com
Connection: Keep-Alive
Cache-Control: no-cache

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

无警报

TLS

No TLS

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
没有发现相似的分析.
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 25.944 seconds )

  • 13.294 Suricata
  • 10.211 NetworkAnalysis
  • 1.522 Static
  • 0.431 peid
  • 0.358 TargetInfo
  • 0.1 BehaviorAnalysis
  • 0.014 Strings
  • 0.011 AnalysisInfo
  • 0.002 Memory
  • 0.001 config_decoder

Signatures ( 1.618 seconds )

  • 1.466 proprietary_url_bl
  • 0.032 antiav_detectreg
  • 0.009 infostealer_ftp
  • 0.008 infostealer_im
  • 0.008 proprietary_domain_bl
  • 0.007 antiav_detectfile
  • 0.006 anomaly_persistence_autorun
  • 0.006 antianalysis_detectreg
  • 0.005 api_spamming
  • 0.005 stealth_timeout
  • 0.005 geodo_banking_trojan
  • 0.005 ransomware_files
  • 0.004 stealth_decoy_document
  • 0.004 infostealer_bitcoin
  • 0.004 network_http
  • 0.004 ransomware_extensions
  • 0.003 bot_drive
  • 0.003 infostealer_mail
  • 0.002 tinba_behavior
  • 0.002 rat_nanocore
  • 0.002 antivm_vbox_files
  • 0.002 disables_browser_warn
  • 0.002 proprietary_malicious_drop_executable_file_to_temp_folder
  • 0.001 mimics_filetime
  • 0.001 antivm_generic_services
  • 0.001 betabot_behavior
  • 0.001 reads_self
  • 0.001 ursnif_behavior
  • 0.001 kibex_behavior
  • 0.001 antivm_generic_scsi
  • 0.001 shifu_behavior
  • 0.001 antivm_generic_disk
  • 0.001 anormaly_invoke_kills
  • 0.001 cerber_behavior
  • 0.001 antivm_generic_diskreg
  • 0.001 antivm_parallels_keys
  • 0.001 antivm_xen_keys
  • 0.001 bot_drive2
  • 0.001 browser_addon
  • 0.001 browser_security
  • 0.001 modify_proxy
  • 0.001 disables_windows_defender
  • 0.001 codelux_behavior
  • 0.001 darkcomet_regkeys
  • 0.001 proprietary_bad_drop
  • 0.001 network_cnc_http
  • 0.001 stealth_modify_uac_prompt

Reporting ( 1.775 seconds )

  • 1.764 ReportHTMLSummary
  • 0.011 Malheur
Task ID 743117
Mongo ID 6603d0e7dc327bb8988beffe
Cuckoo release 1.4-Maldun