VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:18
Behavior list
Basic Information
MD5:de053fc639fafb4dac08935fed51f178
file type:EXE
Production company:Microsoft Corporation
version:7.2.3790.3959---7.2.3790.3959 (Windows_rtm.070216-1710)
Shell or compiler information:PACKER:UPolyX v0.5
Key behavior
Behavior description:设置特殊文件属性
details:C:\WINDOWS\system32\rundll32.exe
Behavior description:获取TickCount值
details:TickCount = 216211, SleepMilliseconds = 40.
TickCount = 216243, SleepMilliseconds = 40.
TickCount = 216493, SleepMilliseconds = 40.
TickCount = 216524, SleepMilliseconds = 40.
TickCount = 216540, SleepMilliseconds = 40.
TickCount = 216711, SleepMilliseconds = 40.
TickCount = 216727, SleepMilliseconds = 40.
TickCount = 216930, SleepMilliseconds = 40.
TickCount = 216946, SleepMilliseconds = 40.
TickCount = 216961, SleepMilliseconds = 40.
TickCount = 216977, SleepMilliseconds = 40.
TickCount = 216993, SleepMilliseconds = 40.
TickCount = 217008, SleepMilliseconds = 40.
TickCount = 217618, SleepMilliseconds = 40.
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:创建系统服务
details:[服务创建成功]: Fire In The Hole Servers, C:\WINDOWS\system32\rundll32.exe
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\WINDOWS\system32\rundll32.exe
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = C:\WINDOWS\System32\WScript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\5692.vbs"
Behavior description:创建进程
details:[0x00000b04]ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\5692.vbs"
Behavior description:创建本地线程
details:TargetProcess: wscript.exe, InheritedFromPID = 2692, ProcessID = 2820, ThreadID = 2828, StartAddress = 01002FD4, Parameter = 008E4408
TargetProcess: wscript.exe, InheritedFromPID = 2692, ProcessID = 2820, ThreadID = 2832, StartAddress = 765E964D, Parameter = 001BCAF8
File behavior
Behavior description:创建文件
details:C:\5692.vbs
Behavior description:创建可执行文件
details:C:\WINDOWS\system32\rundll32.exe
Behavior description:删除文件
details:C:\5692.vbs
Behavior description:覆盖已有文件
details:C:\WINDOWS\system32\rundll32.exe
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\WINDOWS\system32\rundll32.exe
Behavior description:设置特殊文件属性
details:C:\WINDOWS\system32\rundll32.exe
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\5692.vbs
FileName = C:\WINDOWS
FileName = C:\WINDOWS\System32
FileName = C:\WINDOWS\System32\WScript.exe
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\wscript.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:修改BAT脚本文件
details:C:\5692.vbs ---> Offset = 0
Behavior description:修改文件内容
details:C:\WINDOWS\system32\rundll32.exe ---> Offset = 0
C:\WINDOWS\system32\rundll32.exe ---> Offset = 65536
C:\WINDOWS\system32\rundll32.exe ---> Offset = 131072
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Fire In The Hole Servers\MarkTime
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Fire In The Hole Servers\Description
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\System32\WScript.exe
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\WINDOWS\system32\rundll32.exe
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
Behavior description:启动系统服务
details:[服务启动成功]: LocalSystem, Fire In The Hole Servers for Windows(R)., C:\WINDOWS\system32\rundll32.exe
Behavior description:获取TickCount值
details:TickCount = 216211, SleepMilliseconds = 40.
TickCount = 216243, SleepMilliseconds = 40.
TickCount = 216493, SleepMilliseconds = 40.
TickCount = 216524, SleepMilliseconds = 40.
TickCount = 216540, SleepMilliseconds = 40.
TickCount = 216711, SleepMilliseconds = 40.
TickCount = 216727, SleepMilliseconds = 40.
TickCount = 216930, SleepMilliseconds = 40.
TickCount = 216946, SleepMilliseconds = 40.
TickCount = 216961, SleepMilliseconds = 40.
TickCount = 216977, SleepMilliseconds = 40.
TickCount = 216993, SleepMilliseconds = 40.
TickCount = 217008, SleepMilliseconds = 40.
TickCount = 217618, SleepMilliseconds = 40.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\SvcctrlStartEvent_A3752DX
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.2820
MSFT.VSA.IEC.STATUS.6c736db0
Global\crypt32LogoffEvent
Behavior description:可执行文件签名信息
details:C:\WINDOWS\system32\rundll32.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 40.
Behavior description:可执行文件MD5
details:C:\WINDOWS\system32\rundll32.exe ---> de053fc639fafb4dac08935fed51f178
Behavior description:打开互斥体
details:Local\!IETld!Mutex
ShimCacheMutex
Behavior description:创建系统服务
details:[服务创建成功]: Fire In The Hole Servers, C:\WINDOWS\system32\rundll32.exe
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号