VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:b927b65ea304989415e1d7156c5130d9
file type:EXE
Production company:
version:1.0.0.0---1.0.0.0
Shell or compiler information:PACKER:UPolyX v0.5
Key behavior
Behavior description:直接调用系统关键API
details:Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x0069699F
Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x0069699F
Behavior description:直接获取CPU时钟
details:EAX = 0x500eb2c4, EDX = 0x000000b5
EAX = 0xa71b58dc, EDX = 0x000000b5
EAX = 0xa71b5928, EDX = 0x000000b5
EAX = 0xa71b5974, EDX = 0x000000b5
EAX = 0xa71b59c0, EDX = 0x000000b5
EAX = 0xa71b5a0c, EDX = 0x000000b5
EAX = 0xa71b5a58, EDX = 0x000000b5
EAX = 0xa71b5aa4, EDX = 0x000000b5
EAX = 0xa71b5af0, EDX = 0x000000b5
EAX = 0xa71b5b3c, EDX = 0x000000b5
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = c:\Del.bat
Behavior description:创建进程
details:[0x00000aa0]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c c:\Del.bat
[0x00000b24]ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\delay.vbs"
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2656, ThreadID = 2668, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: wscript.exe, InheritedFromPID = 2720, ProcessID = 2852, ThreadID = 2860, StartAddress = 01002FD4, Parameter = 008E4078
TargetProcess: wscript.exe, InheritedFromPID = 2720, ProcessID = 2852, ThreadID = 2864, StartAddress = 765E964D, Parameter = 001BCB80
File behavior
Behavior description:创建文件
details:C:\Del.bat
C:\Documents and Settings\Administrator\Local Settings\Temp\delay.vbs
Behavior description:修改脚本文件
details:C:\Del.bat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\delay.vbs ---> Offset = 0
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\delay.vbs
C:\Del.bat
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:查找文件
details:FileName = c:\Del.bat
FileName = C:\Del.bat
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\delay.vbs
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
Network behavior
Behavior description:连接指定站点
details:WinHttpConnect: ServerName = lo****om, PORT = 4300, UserName = , Password = , hSession = 0x012d3100, hConnect = 0x012d3200, Flags = 0x00000000
Behavior description:打开HTTP连接
details:WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x012d3100
Behavior description:建立到一个指定的套接字连接
details:URL: lo****om, IP: **.133.40.**:4300, SOCKET = 0x000001b8
Behavior description:发送HTTP包
details:GET /pt_get_uins?callback=ptui_getuins_CB&r=0.3924898656297480&pt_local_tk=0.0841995584797301 HTTP/1.1 Cookie: pt_local_token=0.0841995584797301; Accept: */* Referer: http://localhost.ptlogin2.qq.com:4300/pt_get_uins?callback=ptui_getuins_CB&r=0.3924898656297480&pt_local_tk=0.0841995584797301 Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) Host: lo****om:4300 Connection: Keep-Alive
Behavior description:打开HTTP请求
details:WinHttpOpenRequest: lo****om:4300/pt_get_uins?callback=ptui_getuins_cb&r=0.3924898656297480&pt_local_tk=0.0841995584797301, hConnect = 0x012d3200, hRequest = 0x01360000, Verb: GET, Referer: , Flags = 0x00000080
Behavior description:按名称获取主机地址
details:GetAddrInfoW: lo****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\System32\WScript.exe
Other behavior
Behavior description:直接调用系统关键API
details:Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x0069699F
Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x0069699F
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Local\!IETld!Mutex
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.2852
MSFT.VSA.IEC.STATUS.6c736db0
Global\crypt32LogoffEvent
Behavior description:直接获取CPU时钟
details:EAX = 0x500eb2c4, EDX = 0x000000b5
EAX = 0xa71b58dc, EDX = 0x000000b5
EAX = 0xa71b5928, EDX = 0x000000b5
EAX = 0xa71b5974, EDX = 0x000000b5
EAX = 0xa71b59c0, EDX = 0x000000b5
EAX = 0xa71b5a0c, EDX = 0x000000b5
EAX = 0xa71b5a58, EDX = 0x000000b5
EAX = 0xa71b5aa4, EDX = 0x000000b5
EAX = 0xa71b5af0, EDX = 0x000000b5
EAX = 0xa71b5b3c, EDX = 0x000000b5
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号