VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:40
Behavior list
Basic Information
MD5:ae91612adf6751243385cd883f9a59ef
file type:zip
Production company:
version:
Shell or compiler information:
Subfile information:Sample Order PO.exe / e47713199d9d3446519286355adcfdda / EXE
Key behavior
Behavior description:获取TickCount值
details:TickCount = 239843, SleepMilliseconds = 20000.
TickCount = 239859, SleepMilliseconds = 20000.
TickCount = 219858, SleepMilliseconds = -1.
TickCount = 220859, SleepMilliseconds = 1000.
TickCount = 220875, SleepMilliseconds = 1000.
TickCount = 220375, SleepMilliseconds = 500.
TickCount = 219925, SleepMilliseconds = 50.
TickCount = 219940, SleepMilliseconds = 50.
TickCount = 219987, SleepMilliseconds = 50.
TickCount = 220003, SleepMilliseconds = 50.
TickCount = 220018, SleepMilliseconds = 50.
TickCount = 220050, SleepMilliseconds = 50.
TickCount = 220112, SleepMilliseconds = 50.
TickCount = 220175, SleepMilliseconds = 50.
TickCount = 220190, SleepMilliseconds = 50.
Behavior description:直接获取CPU时钟
details:EAX = 0x58589041, EDX = 0x000000b5
EAX = 0x3d9c1b8a, EDX = 0x000000b6
EAX = 0x3d9c1bd6, EDX = 0x000000b6
EAX = 0x3d9c1c22, EDX = 0x000000b6
EAX = 0x3d9c1c6e, EDX = 0x000000b6
EAX = 0x3d9c1cba, EDX = 0x000000b6
EAX = 0x3d9c1d06, EDX = 0x000000b6
EAX = 0x3d9c1d52, EDX = 0x000000b6
EAX = 0x3d9c1d9e, EDX = 0x000000b6
EAX = 0x4ac4b9f4, EDX = 0x000000b6
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WPA Service
Process behavior
Behavior description:创建本地线程
details:TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2848, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2852, StartAddress = 79F91FCF, Parameter = 001954B0
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2968, StartAddress = 79F91FCF, Parameter = 001E1D70
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2972, StartAddress = 79FD8897, Parameter = 0012E9AC
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2976, StartAddress = 79F91FCF, Parameter = 001E1D70
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2980, StartAddress = 79FCBA1E, Parameter = 00000000
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2984, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2988, StartAddress = 79F91FCF, Parameter = 001AC2D0
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 2992, StartAddress = 79F91FCF, Parameter = 001AC2D0
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 3164, StartAddress = 79F91FCF, Parameter = 001C7840
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 3364, StartAddress = 79F91FCF, Parameter = 001C7840
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 3400, StartAddress = 79F91FCF, Parameter = 001AC2D0
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 3428, StartAddress = 79F91FCF, Parameter = 001AC2D0
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 3460, StartAddress = 79F91FCF, Parameter = 001AC2D0
TargetProcess: Sample Order PO.exe, InheritedFromPID = 2000, ProcessID = 2812, ThreadID = 3540, StartAddress = 79F91FCF, Parameter = 001AC2D0
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Application Data\DCFF734B-BC3F-43CB-8911-9B5D467629CF\run.dat
C:\Program Files\WPA Service\wpasv.exe
Behavior description:创建可执行文件
details:C:\Program Files\WPA Service\wpasv.exe
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Application Data\DCFF734B-BC3F-43CB-8911-9B5D467629CF\run.dat ---> Offset = 0
C:\Program Files\WPA Service\wpasv.exe ---> Offset = 0
C:\Program Files\WPA Service\wpasv.exe ---> Offset = 65536
C:\Program Files\WPA Service\wpasv.exe ---> Offset = 131072
C:\Program Files\WPA Service\wpasv.exe ---> Offset = 196608
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Sample Order PO.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Sample Order PO.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Sample Order PO.exe ---> C:\Program Files\WPA Service\wpasv.exe
Network behavior
Behavior description:按名称获取主机地址
details:DnsQuery_W: williammurphy.myddns.me
GetAddrInfoW: wi****me
Registry behavior
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WPA Service
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Global\{17d196d7-aba4-4cdd-8e28-2b2b58ac7ba4}
Global\.net clr networking
Behavior description:创建事件对象
details:EventName = Global\CorDBIPCSetupSyncEvent_2812
Behavior description:打开互斥体
details:ShimCacheMutex
Global\CLR_CASOFF_MUTEX
Global\.net clr networking
Behavior description:加密数据
details:[CryptEncrypt] Data: 0x001C3B60, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
Behavior description:获取TickCount值
details:TickCount = 239843, SleepMilliseconds = 20000.
TickCount = 239859, SleepMilliseconds = 20000.
TickCount = 219858, SleepMilliseconds = -1.
TickCount = 220859, SleepMilliseconds = 1000.
TickCount = 220875, SleepMilliseconds = 1000.
TickCount = 220375, SleepMilliseconds = 500.
TickCount = 219925, SleepMilliseconds = 50.
TickCount = 219940, SleepMilliseconds = 50.
TickCount = 219987, SleepMilliseconds = 50.
TickCount = 220003, SleepMilliseconds = 50.
TickCount = 220018, SleepMilliseconds = 50.
TickCount = 220050, SleepMilliseconds = 50.
TickCount = 220112, SleepMilliseconds = 50.
TickCount = 220175, SleepMilliseconds = 50.
TickCount = 220190, SleepMilliseconds = 50.
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:可执行文件签名信息
details:C:\Program Files\WPA Service\wpasv.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 20000.
[2]: MilliSeconds = -1.
[3]: MilliSeconds = -1.
[4]: MilliSeconds = 1000.
[5]: MilliSeconds = 1000.
[6]: MilliSeconds = 500.
[7]: MilliSeconds = 50.
[8]: MilliSeconds = 50.
[9]: MilliSeconds = 50.
[10]: MilliSeconds = 50.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,WindowsForms10.Window.8.app.0.378734a]
Behavior description:可执行文件MD5
details:C:\Program Files\WPA Service\wpasv.exe ---> e47713199d9d3446519286355adcfdda
Behavior description:直接获取CPU时钟
details:EAX = 0x58589041, EDX = 0x000000b5
EAX = 0x3d9c1b8a, EDX = 0x000000b6
EAX = 0x3d9c1bd6, EDX = 0x000000b6
EAX = 0x3d9c1c22, EDX = 0x000000b6
EAX = 0x3d9c1c6e, EDX = 0x000000b6
EAX = 0x3d9c1cba, EDX = 0x000000b6
EAX = 0x3d9c1d06, EDX = 0x000000b6
EAX = 0x3d9c1d52, EDX = 0x000000b6
EAX = 0x3d9c1d9e, EDX = 0x000000b6
EAX = 0x4ac4b9f4, EDX = 0x000000b6
Behavior description:解密数据
details:[CryptDecrypt] Data: 0x001D1B20, CipherTextLen: 89392, PlainTextLen: 89392, Flags: 0x00000000
Behavior description:导入密钥
details:[CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001C33E8, DataLen: 20, Flags: 0x00000001
[CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001C3170, DataLen: 20, Flags: 0x00000001
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号