zcuSHbuD2Wn3.exe

转自:https://www.hybrid-analysis.com/sample/f41d0e00ffe1f8932eda937bb8d32a83c8992c1f596bd3a741c08190925c9e64?environmentId=1

zcuSHbuD2Wn3.exe

Analyzed on April 28th 2016 06:45:03 (CEST) to Windows 7 32 bit
Guest System: Windows 7 32 bit, Home Premium, 6.1 (build 7601), Service Pack 1
VxStream Sandbox v4.10 © Payload Security

Attention: this analysis ran with the legacy Usermode Monitor. It is highly recommended to use the Kernelmode Monitor.

Incident Response

Risk Assessment
Remote Access
Contains ability to listen for incoming connections
Spyware/Leak
POSTs files to a webserver
Ransomware
The input sample dropped a known ransomware file
Deletes volume snapshots (often used by Ransomware)
Fingerprint
Reads the cryptographic machine GUID
Contains ability to lookup the windows account name
Network Behavior
Contacts 1 host. View the network section for more details.

Indicators

Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.

File Details

All Details:
zcuSHbuD2Wn3.exe
Filename
zcuSHbuD2Wn3.exe
Size
176KiB (179712 bytes)
Type
PE32 executable (GUI) Intel 80386, for MS Windows
Architecture
32 Bit
SHA256
f41d0e00ffe1f8932eda937bb8d32a83c8992c1f596bd3a741c08190925c9e64
Resources
Language
ENGLISH
Icon
Sample Icon
Visualization
Input File (PortEx)
PE Visualization
Version Info
LegalCopyright
Copyright 2005-2015 Piriform Ltd
InternalName
ecleaner
FileVersion
5, 11, 00, 5408
CompanyName
Piriform Ltd
Comments
CCleaner
ProductName
ECleaner
ProductVersion
5, 11, 00, 5408
FileDescription
ECleaner
OriginalFilename
ecleaner.exe
Translation
0x0409 0x04b0
Classification (TrID)
  • 42.1% (.EXE) Win32 Executable MS Visual C++ (generic)
  • 37.3% (.EXE) Win64 Executable (generic)
  • 8.8% (.DLL) Win32 Dynamic Link Library (generic)
  • 6.0% (.EXE) Win32 Executable (generic)
  • 2.7% (.EXE) Generic Win/DOS Executable

File Sections

File Imports

BuildExplicitAccessWithNameW
ChangeServiceConfigW
CloseServiceHandle
ControlService
CreateProcessAsUserW
CreateServiceW
DeleteService
DeregisterEventSource
DuplicateTokenEx
EnumDependentServicesW
GetNamedSecurityInfoW
GetTokenInformation
OpenProcessToken
OpenSCManagerW
OpenServiceW
QueryServiceStatusEx
RegCloseKey
RegCreateKeyExW
RegCreateKeyW
RegEnumKeyW
RegisterEventSourceW
RegisterServiceCtrlHandlerExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
ReportEventW
RevertToSelf
SetEntriesInAclW
SetNamedSecurityInfoW
SetServiceStatus
SetTokenInformation
StartServiceCtrlDispatcherW
StartServiceW

Screenshots


Hybrid Analysis

Tip: Click an analysed process below to view more details.

Analysed 3 processes in total (System Resource Monitor).

Network Analysis

DNS Requests

No relevant DNS requests were made.

Contacted Hosts

Host AddressHost PortHost ProtocolHost Details
31.41.44.24680TCPRussian Federation
ASN: 49505 (OOO Network of data-centers Selectel)
Port Protocol Description
Port 80: Hypertext Transfer Protocol (HTTP)

Contacted Countries

HTTP Traffic

EndpointMethod/ResponseURL/Code
31.41.44.246:80POST/userinfo.php
31.41.44.246:80POST/userinfo.php
31.41.44.246:80POST/userinfo.php
31.41.44.246:80POST/userinfo.php

Emerging Threats

EventCategoryDescriptionSID
31.41.44.246:80 (TCP)A Network Trojan was detectedET TROJAN Generic - POST To .php w/Extended ASCII Characters2017259
31.41.44.246:80 (TCP)Potentially Bad TrafficET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 12018358
31.41.44.246:80 (TCP)A Network Trojan was detectedET TROJAN Generic - POST To .php w/Extended ASCII Characters2017259
31.41.44.246:80 (TCP)A Network Trojan was detectedET TROJAN Win32/Necurs Common POST Header Structure2021995
31.41.44.246:80 (TCP)Potentially Bad TrafficET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 12018358
31.41.44.246:80 (TCP)A Network Trojan was detectedET TROJAN Generic - POST To .php w/Extended ASCII Characters2017259
31.41.44.246:80 (TCP)Potentially Bad TrafficET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 12018358
31.41.44.246:80 (TCP)A Network Trojan was detectedET TROJAN Generic - POST To .php w/Extended ASCII Characters2017259
31.41.44.246:80 (TCP)Potentially Bad TrafficET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 12018358
ET rules applied using Suricata.

Extracted Strings


评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值