先看Virus:VirusTotal
MD5
19dbec50735b5f2a72d4199c4e184960
SHA-1
6fed7732f7cb6f59743795b2ab154a3676f4c822
SHA-256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
Vhash
014056556d15551055z20018bz13z42z183z19z
Authentihash
ae7f926c6a650f5783e63d3bedaa830fd05984c1b7a68f75fc9766c5dca1a1c4
Imphash
52753d226ff5a8a88caf9829928cd5d1
Rich PE header hash
352c49ec6b07f506f4dd94c08f3e7b9a
SSDEEP
192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj
TLSH
T180624BCFBE204417D8F0C57530659234DFBACABA1B968EDF9CF91E529AC4C072823265
File type
Win32 EXE
executable
windows
win32
pe
peexe
Magic
PE32 executable (GUI) Intel 80386, for MS Windows
TrID
Win32 Executable MS Visual C++ (generic) (47.3%) Win64 Executable (generic) (15.9%) Win32 Dynamic Link Library (generic) (9.9%) Win16 NE executable (generic) (7.6%) Win32 Executable (generic) (6.8%)
DetectItEasy
PE32 Linker: Microsoft Linker (14.00.24210) Compiler: Microsoft Visual C/C++ (19.00.24210) [C++] Tool: Visual Studio (2015)
File size
14.50 KB (14848 bytes)
History
Creation Time
2016-07-10 12:59:43 UTC
First Seen In The Wild
2016-01-28 15:48:34 UTC
First Submission
2016-07-10 15:56:43 UTC
Last Submission
2024-01-05 18:22:16 UTC
Last Analysis
2024-01-05 14:27:15 UTC
Names
Header
Target Machine
Intel 386 or later processors and compatible processors
Compilation Timestamp
2016-07-10 12:59:43 UTC
Entry Point
4653
Contained Sections
5
Sections
Name
Virtual Address
Virtual Size
Raw Size
Entropy
MD5
Chi2
.text
4096
2858
3072
5.86
dd5cb28274194e219d34847d33a25c7e
39371.89
.rdata
8192
8642
8704
6.35
b07b75ff7f55c2669d202cd56a582090
63226.7
.data
20480
404
512
3.58
50b33449e429a684c3050e4e01ecb92d
32024
.rsrc
24576
488
512
4.75
31f32cbd374ff9c89ebf48a0eb4f3212
8391
.reloc
28672
524
1024
3.99
6076414e94bb23843710eadc103ae855
67987
Imports
ADVAPI32.dll
KERNEL32.dll
USER32.dll
SHELL32.dll
PSAPI.DLL
WINMM.dll
GDI32.dll
Contained Resources By Type
RT_MANIFEST
1
Contained Resources By Language
ENGLISH US
1
Contained Resources
SHA-256
File Type
Type
Language
Entropy
Chi2
165c5c883fd4fd36758bcba6baf2faffb77d2f4872ffd5ee918a16f91de5a8a8
XML
RT_MANIFEST
ENGLISH US
4.9
4142.86
- dossier su Juthuniem.exe
- MEMZ.exe
- MEMZ-Trojan.exe
- Loader.exe
- MEMZ-Destructive.exe
- 病毒.exe
- geometry dash auto speedhack.exe
- memz.exe
- tool dò USER ID 1.exe
- Endermanch@MEMZ.exe
- ENDERMANCH@MEMZ.EXE
- frexa.exe
- MEMZ-Trojan.exe.infected
- 防控屏.exe
- a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d.exe
- Endermanch@MEMZ.bak
- MEMZ-Destructive.ex_
- memz-destructive.exe
- GEOMETRY DASH AUTO SPEEDHACK.EXE
- geometry dash speedhack.exe
- Dota 3 Megacheats Secret build.exe
- geometry dash auto speedhack
- antivirusMalware.exe
- geometry dash auto speedhack.exe (copy)
- ping.exe
- HarounHaeder@MEMZ.exe
- SF.Loader.exe
- InfinityPoint_Nova_Beta.exe
- GEOMET~1.EXE
- output.254797996.txt
- projektroboczy.exe
- gayhomosex.exe
- Cats.exe
- geometry_dash_auto_speedhack.exe
- fix.exe
- cat.exe
- tmp7506.tmp.exe
- LBE_Evader_Launcher.exe
- Cheat_Engine.exe
- otmxngjjye.exe
- 02871499.exe
- fixlag.exe
- MEMZ.EXE
- rufus-4.1.exe
- Rustcheat.exe
- Botent.exe
- Diamond-Hack-Tool Free Fire.exe
- 15e9d2bd44afb14bb33f0377608d510a.tmp
- SkinC.exe
- a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d-dropped.bin
- charon.exe
- MEMZ
- Custom cursor.exe
- tmp274B.tmp.exe
- Chrome_Installer.exe
- lbyvek.exe
- Wn.p
-
Portable Executable Info
Compiler Products
- [IMP] VS2008 SP1 build 30729 count=15
- [---] Unmarked objects count=61
- [C++] VS2015 Update 3 [14.0] build 24210 count=5
- [RES] VS2015 UPD3 build 24210 count=1
- [LNK] VS2015 Update 3 [14.0] build 24210 count=1
AhnLab-V3Trojan/Win32.DiskWriter.C1514156
AlibabaTrojan:Win32/DiskWriter.ded37607
Antiy-AVLTrojan/Win32.TSGeneric
ArcabitTrojan.AgentWDCR.PKD
AvastWin32:MalwareX-gen [Trj]
AVGWin32:MalwareX-gen [Trj]
Avira (no cloud)TR/Rozena.AP
BitDefenderTrojan.AgentWDCR.PKD
BitDefenderThetaAI:Packer.E0B41D791F
Bkav ProW32.AIDetectMalware
ClamAVWin.Malware.Diskwriter-6914536-0
CrowdStrike FalconWin/malicious_confidence_100% (W)
CylanceUnsafe
CynetMalicious (score: 100)
DeepInstinctMALICIOUS
DrWebTrojan.KillMBR.24807
ElasticMalicious (high Confidence)
EmsisoftTrojan.AgentWDCR.PKD (B)
eScanTrojan.AgentWDCR.PKD
ESET-NOD32Win32/Zmem.A
F-SecureTrojan.TR/Rozena.AP
FortinetW32/Zmem.I!tr
GDataWin32.Trojan.Agent.TLUCQP
GoogleDetected
Gridinsoft (no cloud)Trojan.Win32.Agent.dg
IkarusTrojan.Win32.Zmem
JiangminTrojan.DiskWriter.aa
K7AntiVirusRiskware ( 0040eff71 )
K7GWRiskware ( 0040eff71 )
KasperskyTrojan.Win32.DiskWriter.ez
KingsoftMalware.kb.a.998
LionicTrojan.Win32.DiskWriter.tnbd
MalwarebytesGeneric.Malware.AI.DDS
MAXMalware (ai Score=100)
MaxSecureTrojan.Malware.9751253.susgen
McAfeeRDN/Generic.grp
MicrosoftTrojan:Win32/Dynamer!bit
NANO-AntivirusTrojan.Win32.DiskWriter.ekeock
PandaTrj/WLT.D
QuickHealTrojan.Mauvaise.S2299117
RisingTrojan.DiskWriter!8.87FB (KTSE)
Sangfor Engine ZeroSuspicious.Win32.Save.a
SecureAgeMalicious
SentinelOne (Static ML)Static AI - Suspicious PE
Skyhigh (SWG)RDN/Generic.grp
SophosMal/EncPk-YG
SUPERAntiSpywareTrojan.Agent/Gen-Crypt
SymantecDeltree Trojan
TACHYONTrojan/W32.DiskWriter.14848
TencentMalware.Win32.Gencirc.10b18ce5
TrendMicroTROJ_MEMZWIPER.A
TrendMicro-HouseCallTROJ_MEMZWIPER.A
VaristW32/Diskwriter.RJSJ-6696
VBA32BScope.Trojan.Boot
VIPRETrojan.AgentWDCR.PKD
VirITTrojan.Win32.KillMBR.BKSD
ViRobotTrojan.Win32.S.Agent.14848.MW
WebrootW32.Trojan.Gen
XcitiumMalware@#azw7fthdwxzq
ZillyaTrojan.DiskWriter.Win32.211
ZoneAlarm by Check PointTrojan.Win32.DiskWriter.ez
ZonerTrojan.Win32.73166
Acronis (Static ML)Undetected
BaiduUndetected
CMCUndetected
CybereasonUndetected
Palo Alto NetworksUndetected
TEHTRISUndetected
YandexUndetected
Avast-MobileUnable to process file type
BitDefenderFalxUnable to process file type
Symantec Mobile InsightUnable to process file type
TrustlookUnable to process file type
关键行为
行为描述: | 跨进程写入数据 |
详情信息: | TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b34 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b34 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffdb238, Size = 0x00000004 TargetPID = 0x00000b34 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b8c TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b8c TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000b8c TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b90 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b90 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000b90 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b70 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b70 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffd5238, Size = 0x00000004 TargetPID = 0x00000b70 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b18 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b18 TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffde238, Size = 0x00000004 TargetPID = 0x00000b18 |
行为描述: | 修改硬盘引导扇区 |
详情信息: | NtWriteFile |
行为描述: | 获取TickCount值 |
详情信息: | TickCount = 161662, SleepMilliseconds = 100. TickCount = 161678, SleepMilliseconds = 100. TickCount = 161693, SleepMilliseconds = 100. TickCount = 161709, SleepMilliseconds = 100. TickCount = 161740, SleepMilliseconds = 100. TickCount = 161756, SleepMilliseconds = 100. TickCount = 161834, SleepMilliseconds = 100. TickCount = 161865, SleepMilliseconds = 100. TickCount = 162381, SleepMilliseconds = 100. TickCount = 162521, SleepMilliseconds = 100. TickCount = 162537, SleepMilliseconds = 100. TickCount = 162553, SleepMilliseconds = 100. TickCount = 162568, SleepMilliseconds = 100. TickCount = 192484, SleepMilliseconds = 30000. TickCount = 162600, SleepMilliseconds = 100. |
行为描述: | 获取窗口截图信息 |
详情信息: | Foreground window Info: HWND = 0x00010010, DC = 0x02010994. Foreground window Info: HWND = 0x00010010, DC = 0x1101099b. Foreground window Info: HWND = 0x00010010, DC = 0x0101090f. Foreground window Info: HWND = 0x00010010, DC = 0x080108c5. Foreground window Info: HWND = 0x00010010, DC = 0x06010ab2. Foreground window Info: HWND = 0x00010010, DC = 0x09010b57. Foreground window Info: HWND = 0x00010010, DC = 0x0c010ab2. |
行为描述: | 关机或重启 |
详情信息: | NtRaiseHardError ErrorStatus = C0000022 |
行为描述: | 设置特殊文件夹属性 |
详情信息: | C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5 C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low C:\Users\Administrator\AppData\Local\Microsoft\Feeds Cache C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~ C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~ |
行为描述: | 直接获取CPU时钟 |
详情信息: | EAX = 0x6ed468ba, EDX = 0x00000089 EAX = 0xb836e2ef, EDX = 0x00000089 EAX = 0xc3a2b276, EDX = 0x00000089 EAX = 0xf19291f7, EDX = 0x00000089 EAX = 0xca709dec, EDX = 0x00000089 EAX = 0xc908b122, EDX = 0x00000089 EAX = 0xc908b16e, EDX = 0x00000089 EAX = 0xcd239d68, EDX = 0x00000089 EAX = 0xc908b1ba, EDX = 0x00000089 EAX = 0xde0258a0, EDX = 0x00000089 EAX = 0xc908b206, EDX = 0x00000089 EAX = 0xf4459173, EDX = 0x00000089 EAX = 0xf44591bf, EDX = 0x00000089 EAX = 0xcb90818f, EDX = 0x00000089 EAX = 0xe08a2829, EDX = 0x00000089 |
进程行为
- 创建进程
- 枚举进程
- 跨进程写入数据
文件行为
- 创建文件
- 创建可执行文件
- 查找文件
- 删除文件
- 设置特殊文件夹属性
- 修改文件内容
网络行为
- 下载文件
- 打开指定IE网页
- 连接指定站点
- 打开HTTP连接
- 建立到一个指定的套接字连接
- 读取网络文件
- 发送HTTP包
- 打开HTTP请求
- 按名称获取主机地址
注册表行为
- 修改注册表
- 删除注册表键值
其他行为
- 检测自身是否被调试
- 隐藏指定窗口
- 启动系统服务
- 获取光标位置
- 直接操作物理设备
- 可执行文件签名信息
- 加载新释放的文件
- 关机或重启
- 可执行文件MD5
- 创建互斥体
- 获取TickCount值
- 打开事件
- 获取窗口截图信息
- 直接获取CPU时钟
- 创建事件对象
- 查找指定窗口
- 修改硬盘引导扇区
- 窗口信息
- 调整进程token权限
- 枚举窗口
- 调用Sleep函数
- 打开互斥体
- 哈勃分析;腾讯哈勃分析系统-已完成 (qq.com)