MEMZ样本分析

该文章详细分析了一个Win32EXE恶意软件样本,提供了MD5、SHA-1、SHA-256等哈希值,展示了VirusTotal对该样本的多重检测结果,包括文件类型、编译信息、行为特征如跨进程写入、修改硬盘引导扇区等,以及恶意行为分析工具的检测结果。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

先看Virus:VirusTotal

MD5

19dbec50735b5f2a72d4199c4e184960

SHA-1

6fed7732f7cb6f59743795b2ab154a3676f4c822

SHA-256

a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

Vhash

014056556d15551055z20018bz13z42z183z19z

Authentihash

ae7f926c6a650f5783e63d3bedaa830fd05984c1b7a68f75fc9766c5dca1a1c4

Imphash

52753d226ff5a8a88caf9829928cd5d1

Rich PE header hash

352c49ec6b07f506f4dd94c08f3e7b9a

SSDEEP

192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj

TLSH

T180624BCFBE204417D8F0C57530659234DFBACABA1B968EDF9CF91E529AC4C072823265

File type

Win32 EXE 

executable

windows

win32

pe

peexe

Magic

PE32 executable (GUI) Intel 80386, for MS Windows

TrID

Win32 Executable MS Visual C++ (generic) (47.3%)   Win64 Executable (generic) (15.9%)   Win32 Dynamic Link Library (generic) (9.9%)   Win16 NE executable (generic) (7.6%)   Win32 Executable (generic) (6.8%)

DetectItEasy

PE32   Linker: Microsoft Linker (14.00.24210)   Compiler: Microsoft Visual C/C++ (19.00.24210) [C++]   Tool: Visual Studio (2015)

File size

14.50 KB (14848 bytes)

History

Creation Time

2016-07-10 12:59:43 UTC

First Seen In The Wild

2016-01-28 15:48:34 UTC

First Submission

2016-07-10 15:56:43 UTC

Last Submission

2024-01-05 18:22:16 UTC

Last Analysis

2024-01-05 14:27:15 UTC

Names

Header

Target Machine

Intel 386 or later processors and compatible processors

Compilation Timestamp

2016-07-10 12:59:43 UTC

Entry Point

4653

Contained Sections

5

Sections

Name

Virtual Address

Virtual Size

Raw Size

Entropy

MD5

Chi2

.text

4096

2858

3072

5.86

dd5cb28274194e219d34847d33a25c7e

39371.89

.rdata

8192

8642

8704

6.35

b07b75ff7f55c2669d202cd56a582090

63226.7

.data

20480

404

512

3.58

50b33449e429a684c3050e4e01ecb92d

32024

.rsrc

24576

488

512

4.75

31f32cbd374ff9c89ebf48a0eb4f3212

8391

.reloc

28672

524

1024

3.99

6076414e94bb23843710eadc103ae855

67987

Imports

ADVAPI32.dll

KERNEL32.dll

USER32.dll

SHELL32.dll

PSAPI.DLL

WINMM.dll

GDI32.dll

Contained Resources By Type

RT_MANIFEST

1

Contained Resources By Language

ENGLISH US

1

Contained Resources

SHA-256

File Type

Type

Language

Entropy

Chi2

165c5c883fd4fd36758bcba6baf2faffb77d2f4872ffd5ee918a16f91de5a8a8

XML

RT_MANIFEST

ENGLISH US

4.9

4142.86

  • dossier su Juthuniem.exe
  • MEMZ.exe
  • MEMZ-Trojan.exe
  • Loader.exe
  • MEMZ-Destructive.exe
  • 病毒.exe
  • geometry dash auto speedhack.exe
  • memz.exe
  • tool dò USER ID 1.exe
  • Endermanch@MEMZ.exe
  • ENDERMANCH@MEMZ.EXE
  • frexa.exe
  • MEMZ-Trojan.exe.infected
  • 防控屏.exe
  • a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d.exe
  • Endermanch@MEMZ.bak
  • MEMZ-Destructive.ex_
  • memz-destructive.exe
  • GEOMETRY DASH AUTO SPEEDHACK.EXE
  • geometry dash speedhack.exe
  • Dota 3 Megacheats Secret build.exe
  • geometry dash auto speedhack
  • antivirusMalware.exe
  • geometry dash auto speedhack.exe (copy)
  • ping.exe
  • HarounHaeder@MEMZ.exe
  • SF.Loader.exe
  • InfinityPoint_Nova_Beta.exe
  • GEOMET~1.EXE
  • output.254797996.txt
  • projektroboczy.exe
  • gayhomosex.exe
  • Cats.exe
  • geometry_dash_auto_speedhack.exe
  • fix.exe
  • cat.exe
  • tmp7506.tmp.exe
  • LBE_Evader_Launcher.exe
  • Cheat_Engine.exe
  • otmxngjjye.exe
  • 02871499.exe
  • fixlag.exe
  • MEMZ.EXE
  • rufus-4.1.exe
  • Rustcheat.exe
  • Botent.exe
  • Diamond-Hack-Tool Free Fire.exe
  • 15e9d2bd44afb14bb33f0377608d510a.tmp
  • SkinC.exe
  • a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d-dropped.bin
  • charon.exe
  • MEMZ
  • Custom cursor.exe
  • tmp274B.tmp.exe
  • Chrome_Installer.exe
  • lbyvek.exe
  • Wn.p
  • Portable Executable Info

    Compiler Products
  • [IMP] VS2008 SP1 build 30729 count=15
  • [---] Unmarked objects count=61
  • [C++] VS2015 Update 3 [14.0] build 24210 count=5
  • [RES] VS2015 UPD3 build 24210 count=1
  • [LNK] VS2015 Update 3 [14.0] build 24210 count=1

AhnLab-V3Trojan/Win32.DiskWriter.C1514156

AlibabaTrojan:Win32/DiskWriter.ded37607

Antiy-AVLTrojan/Win32.TSGeneric

ArcabitTrojan.AgentWDCR.PKD

AvastWin32:MalwareX-gen [Trj]

AVGWin32:MalwareX-gen [Trj]

Avira (no cloud)TR/Rozena.AP

BitDefenderTrojan.AgentWDCR.PKD

BitDefenderThetaAI:Packer.E0B41D791F

Bkav ProW32.AIDetectMalware

ClamAVWin.Malware.Diskwriter-6914536-0

CrowdStrike FalconWin/malicious_confidence_100% (W)

CylanceUnsafe

CynetMalicious (score: 100)

DeepInstinctMALICIOUS

DrWebTrojan.KillMBR.24807

ElasticMalicious (high Confidence)

EmsisoftTrojan.AgentWDCR.PKD (B)

eScanTrojan.AgentWDCR.PKD

ESET-NOD32Win32/Zmem.A

F-SecureTrojan.TR/Rozena.AP

FortinetW32/Zmem.I!tr

GDataWin32.Trojan.Agent.TLUCQP

GoogleDetected

Gridinsoft (no cloud)Trojan.Win32.Agent.dg

IkarusTrojan.Win32.Zmem

JiangminTrojan.DiskWriter.aa

K7AntiVirusRiskware ( 0040eff71 )

K7GWRiskware ( 0040eff71 )

KasperskyTrojan.Win32.DiskWriter.ez

KingsoftMalware.kb.a.998

LionicTrojan.Win32.DiskWriter.tnbd

MalwarebytesGeneric.Malware.AI.DDS

MAXMalware (ai Score=100)

MaxSecureTrojan.Malware.9751253.susgen

McAfeeRDN/Generic.grp

MicrosoftTrojan:Win32/Dynamer!bit

NANO-AntivirusTrojan.Win32.DiskWriter.ekeock

PandaTrj/WLT.D

QuickHealTrojan.Mauvaise.S2299117

RisingTrojan.DiskWriter!8.87FB (KTSE)

Sangfor Engine ZeroSuspicious.Win32.Save.a

SecureAgeMalicious

SentinelOne (Static ML)Static AI - Suspicious PE

Skyhigh (SWG)RDN/Generic.grp

SophosMal/EncPk-YG

SUPERAntiSpywareTrojan.Agent/Gen-Crypt

SymantecDeltree Trojan

TACHYONTrojan/W32.DiskWriter.14848

TencentMalware.Win32.Gencirc.10b18ce5

TrendMicroTROJ_MEMZWIPER.A

TrendMicro-HouseCallTROJ_MEMZWIPER.A

VaristW32/Diskwriter.RJSJ-6696

VBA32BScope.Trojan.Boot

VIPRETrojan.AgentWDCR.PKD

VirITTrojan.Win32.KillMBR.BKSD

ViRobotTrojan.Win32.S.Agent.14848.MW

WebrootW32.Trojan.Gen

XcitiumMalware@#azw7fthdwxzq

ZillyaTrojan.DiskWriter.Win32.211

ZoneAlarm by Check PointTrojan.Win32.DiskWriter.ez

ZonerTrojan.Win32.73166

Acronis (Static ML)Undetected

BaiduUndetected

CMCUndetected

CybereasonUndetected

Palo Alto NetworksUndetected

TEHTRISUndetected

YandexUndetected

Avast-MobileUnable to process file type

BitDefenderFalxUnable to process file type

Symantec Mobile InsightUnable to process file type

TrustlookUnable to process file type

关键行为

行为描述:跨进程写入数据
详情信息:

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b34

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b34

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffdb238, Size = 0x00000004 TargetPID = 0x00000b34

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b8c

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b8c

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000b8c

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b90

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b90

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000b90

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b70

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b70

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffd5238, Size = 0x00000004 TargetPID = 0x00000b70

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000b18

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000b18

TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe, WriteAddress = 0x7ffde238, Size = 0x00000004 TargetPID = 0x00000b18

行为描述:修改硬盘引导扇区
详情信息:

NtWriteFile

行为描述:获取TickCount值
详情信息:

TickCount = 161662, SleepMilliseconds = 100.

TickCount = 161678, SleepMilliseconds = 100.

TickCount = 161693, SleepMilliseconds = 100.

TickCount = 161709, SleepMilliseconds = 100.

TickCount = 161740, SleepMilliseconds = 100.

TickCount = 161756, SleepMilliseconds = 100.

TickCount = 161834, SleepMilliseconds = 100.

TickCount = 161865, SleepMilliseconds = 100.

TickCount = 162381, SleepMilliseconds = 100.

TickCount = 162521, SleepMilliseconds = 100.

TickCount = 162537, SleepMilliseconds = 100.

TickCount = 162553, SleepMilliseconds = 100.

TickCount = 162568, SleepMilliseconds = 100.

TickCount = 192484, SleepMilliseconds = 30000.

TickCount = 162600, SleepMilliseconds = 100.

行为描述:获取窗口截图信息
详情信息:

Foreground window Info: HWND = 0x00010010, DC = 0x02010994.

Foreground window Info: HWND = 0x00010010, DC = 0x1101099b.

Foreground window Info: HWND = 0x00010010, DC = 0x0101090f.

Foreground window Info: HWND = 0x00010010, DC = 0x080108c5.

Foreground window Info: HWND = 0x00010010, DC = 0x06010ab2.

Foreground window Info: HWND = 0x00010010, DC = 0x09010b57.

Foreground window Info: HWND = 0x00010010, DC = 0x0c010ab2.

行为描述:关机或重启
详情信息:

NtRaiseHardError ErrorStatus = C0000022

行为描述:设置特殊文件夹属性
详情信息:

C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5

C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies

C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5

C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache

C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized

C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low

C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low

C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low

C:\Users\Administrator\AppData\Local\Microsoft\Feeds Cache

C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache

C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~

C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~

行为描述:直接获取CPU时钟
详情信息:

EAX = 0x6ed468ba, EDX = 0x00000089

EAX = 0xb836e2ef, EDX = 0x00000089

EAX = 0xc3a2b276, EDX = 0x00000089

EAX = 0xf19291f7, EDX = 0x00000089

EAX = 0xca709dec, EDX = 0x00000089

EAX = 0xc908b122, EDX = 0x00000089

EAX = 0xc908b16e, EDX = 0x00000089

EAX = 0xcd239d68, EDX = 0x00000089

EAX = 0xc908b1ba, EDX = 0x00000089

EAX = 0xde0258a0, EDX = 0x00000089

EAX = 0xc908b206, EDX = 0x00000089

EAX = 0xf4459173, EDX = 0x00000089

EAX = 0xf44591bf, EDX = 0x00000089

EAX = 0xcb90818f, EDX = 0x00000089

EAX = 0xe08a2829, EDX = 0x00000089

进程行为

  • 创建进程
  • 枚举进程
  • 跨进程写入数据

文件行为

  • 创建文件
  • 创建可执行文件
  • 查找文件
  • 删除文件
  • 设置特殊文件夹属性
  • 修改文件内容

网络行为

  • 下载文件
  • 打开指定IE网页
  • 连接指定站点
  • 打开HTTP连接
  • 建立到一个指定的套接字连接
  • 读取网络文件
  • 发送HTTP包
  • 打开HTTP请求
  • 按名称获取主机地址

注册表行为

  • 修改注册表
  • 删除注册表键值

其他行为

  • 检测自身是否被调试
  • 隐藏指定窗口
  • 启动系统服务
  • 获取光标位置
  • 直接操作物理设备
  • 可执行文件签名信息
  • 加载新释放的文件
  • 关机或重启
  • 可执行文件MD5
  • 创建互斥体
  • 获取TickCount值
  • 打开事件
  • 获取窗口截图信息
  • 直接获取CPU时钟
  • 创建事件对象
  • 查找指定窗口
  • 修改硬盘引导扇区
  • 窗口信息
  • 调整进程token权限
  • 枚举窗口
  • 调用Sleep函数
  • 打开互斥体
  • 哈勃分析;腾讯哈勃分析系统-已完成 (qq.com)
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值