本帖最后由 墨家小子 于 2016-3-1 12:40 编辑
SHA256: d15bf14ab76b79158f32291fa59239d3c4afeedcb9dbf9922c1555c8835ad619
File name: 6828.tmp.exe
Detection ratio: 6 / 55
Analysis date: 2016-03-01 04:28:08 UTC ( 1 minute ago )
https://www.virustotal.com/en/file/d15bf14ab76b79158f32291fa59239d3c4afeedcb9dbf9922c1555c8835ad619/analysis/1456806488/
Fortinet W32/Drokre.C!tr 20160301
Malwarebytes Ransom.TeslaCrypt 20160301
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.gc 20160301
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20160301
Rising PE:Malware.XPACK-LNR/Heur!1.5594 [F] 20160225
Tencent Win32.Trojan.Bp-ransomware.Ejqz 20160301
实机,换一个IP进去,就有不同挂马,IPS没有反应,下载智能分析提示,HMPA拦截!
HMPA拦截日志:
Mitigation CallerCheck
Platform 6.3.9600/x64 06_3d
PID 9632
Application C:\Program Files (x86)\Internet Explorer\iexplore.exe
Description Internet Explorer 11
Callee Type CreateProcess
C:\Users\AAA\AppData\Local\Temp\Low\6828.tmp.exe
Stack Trace
# Address Module Location
-- -------- ------------------------ ----------------------------------------
1 186307E6 (anonymous)
85c0 TEST EAX, EAX
7517 JNZ 0x18630801
e914ffffff JMP 0x18630703
2 186308D2 (anonymous)
3 776E919F kernel32.dll BaseThreadInitThunk +0xe
4 77C3A22B ntdll.dll RtlInitializeExceptionChain +0x84
5 77C3A201 ntdll.dll RtlInitializeExceptionChain +0x5a
Process Trace
1 C:\Program Files (x86)\Internet Explorer\iexplore.exe [9632]
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:792 CREDAT:267521 /prefetch:2
2 C:\Program Files\Internet Explorer\iexplore.exe [792]
"C:\Program Files\Internet Explorer\iexplore.exe" -private
3 C:\Windows\explorer.exe [4080]
4 C:\Windows\System32\userinit.exe [9132]
5 C:\Windows\System32\winlogon.exe [7292]
C:\windows\System32\WinLogon.exe -SpecialSession
6 C:\Windows\System32\smss.exe [7936]
\SystemRoot\System32\smss.exe 00000000 00000054 C:\windows\System32\WinLogon.exe -SpecialSession
类别: 下载智能分析
日期和时间,风险,活动,状态,活动
2016/3/1 12:22:12,低,下载智能分析已扫描 6828.tmp.exe,允许访问,已执行的威胁操作: 0
2016/3/1 11:03:00,低,下载智能分析已扫描 E1A1.tmp.exe,允许访问,已执行的威胁操作: 0
2016/3/1 10:15:45,低,下载智能分析已扫描 9B43.tmp.exe,允许访问,已执行的威胁操作: 0 |