VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:28
Behavior list
Basic Information
MD5:ee5b66af8cf1bb06229c5e0f3ed57179
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 [Overlay]
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = cmd /c start C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\\生成的木马.exe
ImagePath = , CmdLine = cmd /c start C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\\DolphinQ.exe
Behavior description:创建进程
details:[0x00000af8]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c start C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\\生成的木马.exe
[0x00000b3c]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c start C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\\DolphinQ.exe
Behavior description:创建新文件进程
details:[0x00000b34]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\生成的木马.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\\生成的木马.exe
[0x00000b60]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\DolphinQ.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\\DolphinQ.exe
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\krnln.fnr
C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\shell.fne
C:\Documents and Settings\Administrator\Local Settings\Temp\生成的木马.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\DolphinQ.exe
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\krnln.fnr
C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\shell.fne
C:\Documents and Settings\Administrator\Local Settings\Temp\生成的木马.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\DolphinQ.exe
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\krnln.fnr ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\shell.fne ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\生成的木马.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\DolphinQ.exe ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\生成的木马.exe
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\DolphinQ.exe
Network behavior
Behavior description:连接指定站点
details:WinHttpConnect: ServerName = lo****om, PORT = 4300, UserName = , Password = , hSession = 0x00ff3100, hConnect = 0x00ff3200, Flags = 0x00000000
WinHttpConnect: ServerName = lo****om, PORT = 4300, UserName = , Password = , hSession = 0x00ff3100, hConnect = 0x00ff3300, Flags = 0x00000000
Behavior description:打开HTTP连接
details:WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x00ff3100
Behavior description:建立到一个指定的套接字连接
details:URL: 9p****om, IP: **.133.40.**:5505, SOCKET = 0x00000704
URL: lo****om, IP: **.133.40.**:4300, SOCKET = 0x00000660
URL: lo****om, IP: **.133.40.**:4300, SOCKET = 0x00000680
URL: lo****om, IP: **.133.40.**:4300, SOCKET = 0x00000674
URL: 9p****om, IP: **.133.40.**:5505, SOCKET = 0x0000065c
URL: lo****om, IP: **.133.40.**:4300, SOCKET = 0x00000654
URL: lo****om, IP: **.133.40.**:4300, SOCKET = 0x00000688
URL: lo****om, IP: **.133.40.**:4300, SOCKET = 0x00000668
Behavior description:发送HTTP包
details:GET /pt_get_uins?callback=ptui_getuins_CB&pt_local_tk=0.3858416392467916 HTTP/1.1 Cookie: pt_local_token=0.3858416392467916; Accept: */* Referer: http://localhost.ptlogin2.qq.com:4300/pt_get_uins?callback=ptui_getuins_CB&pt_local_tk=0.3858416392467916 Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) Host: lo****om:4300 Connection: Keep-Alive
Behavior description:打开HTTP请求
details:WinHttpOpenRequest: lo****om:4300/pt_get_uins?callback=ptui_getuins_cb&pt_local_tk=0.3858416392467916, hConnect = 0x00ff3200, hRequest = 0x01040000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: lo****om:4300/pt_get_uins?callback=ptui_getuins_cb&pt_local_tk=0.3858416392467916, hConnect = 0x00ff3300, hRequest = 0x01040000, Verb: GET, Referer: , Flags = 0x00000080
Behavior description:按名称获取主机地址
details:gethostbyname: 9p****om
GetAddrInfoW: lo****om
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Wait For Buffer Return
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:窗口信息
details:Pid = 2868, Hwnd=0x10350, Text = 按钮, ClassName = Button.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\krnln.fnr(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\shell.fne(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\生成的木马.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\DolphinQ.exe(签名验证: 未通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,WTWindow]
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\krnln.fnr ---> 97c8fe752e354b2945e4c593a87e4a8b
C:\Documents and Settings\Administrator\Local Settings\Temp\E_4\shell.fne ---> d63851f89c7ad4615565ca300e8b8e27
C:\Documents and Settings\Administrator\Local Settings\Temp\生成的木马.exe ---> a8bb661505cace1773e97fabb0620516
C:\Documents and Settings\Administrator\Local Settings\Temp\DolphinQ.exe ---> 05393116b52ab6c30c51d7588a6672d4
Behavior description:打开互斥体
details:ShimCacheMutex
Behavior description:加载新释放的文件
details:Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\E_4\krnln.fnr.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\E_4\shell.fne.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号