查看: 568|回复: 12
收起左侧

[病毒样本] 1x

[复制链接]
Fadouse
发表于 2024-9-13 21:11:28 | 显示全部楼层 |阅读模式
AnyRun: https://app.any.run/tasks/aaa0ff0b-9203-4da5-a1cb-a80453eb389a/
Download: https://wormhole.app/Bl4Z0#0IaRkVQh4Nitf5yW_0F8Bw

Kaspersky Kill
  1. Event: Malicious object detected
  2. User: NT AUTHORITY\SYSTEM
  3. User type: System user
  4. Application name: DeepStaticService.exe
  5. Application path: C:\Program Files\DeepInstinct
  6. Component: File Anti-Virus
  7. Result description: Detected
  8. Type: Trojan
  9. Name: HEUR:Backdoor.MSIL.XWorm.gen
  10. Precision: Heuristic Analysis
  11. Threat level: High
  12. Object type: File
  13. Object name: pon.exe.bin
  14. Object path: E:\Code\Virus
  15. MD5 of an object: CC2AAB5D922F42262DAFB1BE8931CBC3
  16. Reason: Machine learning
  17. Databases release date: Today, 9/13/2024 7:39:00 PM
复制代码


GPT 报告
  1. The task involved the execution of a suspicious file named "pon.exe" from the temporary folder by a process with PID 5464 and PPID 4552. This process then modified a file in the "C:\\Users\\admin\\AppData\\Roaming\\System.32" directory, marking it as executable. Additionally, a registry key under "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" was written with the name "System" and the value pointing to the modified file path.

  2. The most interesting aspect of this task is the combination of file modification, process execution, and registry changes, which are typical behaviors exhibited by malware. The use of a temporary folder for execution, modification of a system file to be executable, and adding a registry key for persistence are all red flags for malicious activity. The naming of the registry key as "System" could be an attempt to blend in with legitimate system processes, further indicating malicious intent.

  3. In conclusion, the task involved the execution of a suspicious file, modification of a system file, and creation of a registry key for persistence. These actions collectively suggest a potentially malicious behavior aimed at establishing a foothold in the system. Malware analysts should pay attention to these indicators when investigating potential threats in a sandbox environment.
复制代码


评分

参与人数 1经验 +5 收起 理由
QVM360 + 5 版区有你更精彩: )

查看全部评分

dght432
发表于 2024-9-13 21:14:02 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
玛姆库特
发表于 2024-9-13 21:19:57 | 显示全部楼层
智量实机,双击秒杀

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
877906025Z
发表于 2024-9-13 21:31:16 | 显示全部楼层
江民

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
ongarabazanade
发表于 2024-9-13 21:32:24 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
btbtg
发表于 2024-9-13 22:12:47 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
biue
发表于 2024-9-13 22:35:54 | 显示全部楼层
腾讯电脑管家 1X

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
btbtg
发表于 2024-9-13 23:04:50 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
心醉咖啡
发表于 2024-9-13 23:40:58 | 显示全部楼层
火绒

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
1073328164
发表于 2024-9-14 09:10:08 | 显示全部楼层
迈克菲 kill

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-1-9 10:30 , Processed in 0.123050 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表