分析任务

分析类型 虚拟机标签 开始时间 结束时间 持续时间
文件 (Windows) win7-sp1-x64-hpdapp03-1 2018-10-11 17:58:25 2018-10-11 18:00:56 151 秒

魔盾分数

1.75

正常的

文件详细信息

文件名 刺激战场-情毒.exe
文件大小 2527232 字节
文件类型 PE32 executable (GUI) Intel 80386, for MS Windows
MD5 68835860e9daa1df65540e4bc9296145
SHA1 50477cc34d3973c5710c6ae8977e6761c8edfc11
SHA256 0a8f3f83a091d58ad667e7bafcd572727e1257bee879261db9fa59b2a0796b75
SHA512 0e773f3cf0bb19c02cd204365affb96698004d948725ad965ee5231d25f3d3fa7f9916f40e2096e49bb198b5749e688665d06b0f6f06a91b7a6664f86a3ecbd1
CRC32 909615BB
Ssdeep 49152:jVTmdEUo8l4SUjYi3a4vpope+/DdU/6ODzTAGFRX+Prw:jhmdzoK4si3a4vae+/DA6ODz065+Pr
Yara 登录查看Yara规则
样本下载 提交漏报

登录查看威胁特征

运行截图


访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

域名解析 (可点击查询WPING实时安全评级)

无域名信息.


摘要

登录查看详细行为信息

PE 信息

初始地址 0x00400000
入口地址 0x009b36e9
声明校验值 0x00000000
实际校验值 0x002759d1
最低操作系统版本要求 5.0
编译时间 2018-10-10 01:27:46
载入哈希 9f43a40892c1072ff5b83c2d973dbc9b
图标
图标精确哈希值 7e8d0dbe5de19f74f384ae459c5abecf
图标相似性哈希值 439e81c5165936c3ea55d4df339c6380

版本信息

LegalCopyright
FileVersion
Comments
ProductName
ProductVersion
FileDescription
Translation

PE 数据组成

名称 虚拟地址 虚拟大小 原始数据大小 特征 熵(Entropy)
.text 0x00001000 0x0009b19a 0x00000000 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 0.00
.rdata 0x0009d000 0x00120a82 0x00000000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 0.00
.data 0x001be000 0x000372ea 0x00000000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.00
.vmp0 0x001f6000 0x001b821e 0x00000000 IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 0.00
.vmp1 0x003af000 0x002651c0 0x00266000 IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 7.98
.rsrc 0x00615000 0x00001559 0x00002000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 2.91

资源

名称 偏移量 大小 语言 子语言 熵(Entropy) 文件类型
RT_ICON 0x00615a8c 0x00000668 LANG_NEUTRAL SUBLANG_NEUTRAL 2.62 dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 0, next used block 0
RT_ICON 0x00615a8c 0x00000668 LANG_NEUTRAL SUBLANG_NEUTRAL 2.62 dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 0, next used block 0
RT_ICON 0x00615a8c 0x00000668 LANG_NEUTRAL SUBLANG_NEUTRAL 2.62 dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 0, next used block 0
RT_ICON 0x00615a8c 0x00000668 LANG_NEUTRAL SUBLANG_NEUTRAL 2.62 dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 0, next used block 0
RT_ICON 0x00615a8c 0x00000668 LANG_NEUTRAL SUBLANG_NEUTRAL 2.62 dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 0, next used block 0
RT_GROUP_ICON 0x00616138 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 2.02 MS Windows icon resource - 1 icon, 16x16, 16 colors
RT_GROUP_ICON 0x00616138 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 2.02 MS Windows icon resource - 1 icon, 16x16, 16 colors
RT_GROUP_ICON 0x00616138 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 2.02 MS Windows icon resource - 1 icon, 16x16, 16 colors
RT_VERSION 0x0061614c 0x00000240 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 3.83 data
RT_MANIFEST 0x0061638c 0x000001cd LANG_NEUTRAL SUBLANG_NEUTRAL 5.08 XML 1.0 document, ASCII text, with very long lines, with no line terminators

导入

库: WINMM.dll:
0x9b2000 midiStreamOut
库: WS2_32.dll:
0x9b2008 WSACleanup
库: KERNEL32.dll:
0x9b2010 GetVersion
0x9b2014 GetVersionExA
库: USER32.dll:
0x9b201c PeekMessageA
库: GDI32.dll:
0x9b2024 Escape
库: WINSPOOL.DRV:
0x9b202c OpenPrinterA
库: ADVAPI32.dll:
0x9b2034 RegOpenKeyExA
库: SHELL32.dll:
库: ole32.dll:
0x9b2044 CLSIDFromString
库: OLEAUT32.dll:
0x9b204c LoadTypeLib
库: COMCTL32.dll:
0x9b2054 None
库: comdlg32.dll:
0x9b205c ChooseColorA
库: WTSAPI32.dll:
0x9b2064 WTSSendMessageW
库: KERNEL32.dll:
0x9b206c LoadLibraryA
库: USER32.dll:
0x9b2074 CharUpperBuffW
库: ADVAPI32.dll:
0x9b207c RegQueryValueExA
库: KERNEL32.dll:
0x9b2084 LocalAlloc
0x9b2088 GetCurrentProcess
0x9b208c GetCurrentThread
0x9b2090 LocalFree
0x9b2094 GetModuleFileNameW
0x9b20a4 Sleep
0x9b20a8 ExitProcess
0x9b20ac GetLastError
0x9b20b0 FreeLibrary
0x9b20b4 LoadLibraryA
0x9b20b8 GetModuleHandleA
库: ADVAPI32.dll:
0x9b20c0 OpenSCManagerW
0x9b20c8 OpenServiceW
0x9b20cc QueryServiceConfigW
0x9b20d0 CloseServiceHandle

.text
`.rdata
@.data
.vmp0
`.vmp1
`.rsrc
3}B
Sleep
[y~B-
SHELL32.dll
OpenSCManagerW
~B#N>~B0
ADVAPI32.dll
'M.\/
&y G,
没有防病毒引擎扫描信息!

进程树


____________-______.exe, PID: 2512, 上一级进程 PID: 2380

访问主机纪录 (可点击查询WPING实时安全评级)

无主机纪录.

TCP

无TCP连接纪录.

UDP

无UDP连接纪录.

域名解析 (可点击查询WPING实时安全评级)

无域名信息.

TCP

无TCP连接纪录.

UDP

无UDP连接纪录.

HTTP 请求

未发现HTTP请求.

SMTP 流量

无SMTP流量.

IRC 流量

无IRC请求.

ICMP 流量

无ICMP流量.

CIF 报告

无 CIF 结果

网络警报

无警报

TLS

No TLS

Suricata HTTP

No Suricata HTTP

未发现网络提取文件
抱歉! 没有任何文件投放。
没有发现相似的分析.
HTML 总结报告
(需15-60分钟同步)
下载

Processing ( 13.655 seconds )

  • 7.36 Suricata
  • 2.03 TargetInfo
  • 1.797 Static
  • 1.25 VirusTotal
  • 0.417 peid
  • 0.367 AnalysisInfo
  • 0.236 NetworkAnalysis
  • 0.091 BehaviorAnalysis
  • 0.087 Debug
  • 0.009 Strings
  • 0.006 config_decoder
  • 0.005 Memory

Signatures ( 0.26 seconds )

  • 0.101 md_bad_drop
  • 0.023 antiav_detectreg
  • 0.022 md_url_bl
  • 0.013 md_domain_bl
  • 0.009 infostealer_ftp
  • 0.008 ransomware_files
  • 0.007 ransomware_extensions
  • 0.006 persistence_autorun
  • 0.006 antiav_detectfile
  • 0.006 infostealer_im
  • 0.005 antianalysis_detectreg
  • 0.004 stealth_timeout
  • 0.004 infostealer_bitcoin
  • 0.004 infostealer_mail
  • 0.003 api_spamming
  • 0.003 disables_browser_warn
  • 0.002 rat_nanocore
  • 0.002 tinba_behavior
  • 0.002 decoy_document
  • 0.002 cerber_behavior
  • 0.002 antivm_vbox_files
  • 0.002 geodo_banking_trojan
  • 0.002 browser_security
  • 0.001 network_tor
  • 0.001 betabot_behavior
  • 0.001 mimics_filetime
  • 0.001 kibex_behavior
  • 0.001 antivm_generic_scsi
  • 0.001 shifu_behavior
  • 0.001 antivm_generic_disk
  • 0.001 antivm_parallels_keys
  • 0.001 antivm_xen_keys
  • 0.001 banker_zeus_mutex
  • 0.001 bot_drive
  • 0.001 bot_drive2
  • 0.001 browser_addon
  • 0.001 modify_proxy
  • 0.001 modify_security_center_warnings
  • 0.001 modify_uac_prompt
  • 0.001 office_security
  • 0.001 rat_pcclient
  • 0.001 rat_spynet
  • 0.001 recon_fingerprint
  • 0.001 stealth_hiddenreg
  • 0.001 stealth_hide_notifications

Reporting ( 0.002 seconds )

  • 0.002 Malheur
Task ID 195548
Mongo ID 5bbf1f6aa093ef245b83d6a7
Cuckoo release 1.4-Maldun