| File name: | apitools.exe |
| Full analysis: | https://app.any.run/tasks/5b6e46c6-b265-499e-a213-c3f83c7cb6a6 |
| Verdict: | Malicious activity |
| Analysis date: | April 20, 2021, 06:37:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
| MD5: | E2C668202944D56CEED73E514C92D47F |
| SHA1: | BAF1A8EE04452C0469EFBDF84FF4591A0E72FE07 |
| SHA256: | B5B2C5AF78EA01CA24F1C25D6F8C0FAF0003F30D9ADDB12D71B310D01D4768F0 |
| SSDEEP: | 98304:Fbk32bdKWV+o3G90PwhkB2WEgvdITgFvEB/1S9NN9vRBesPzaYFn/PB7SKHc31Y5:FeqQ1q2kB2wYKN/pwsPzBF5cFtq |
| .exe | | | UPX compressed Win32 Executable (39.3) |
|---|---|---|
| .exe | | | Win32 EXE Yoda's Crypter (38.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (9.5) |
| .exe | | | Win32 Executable (generic) (6.5) |
| .exe | | | Generic Win/DOS Executable (2.9) |
| Comments: | 该工具的所有功能只是调用阿里云提供的对外api接口实现,你可以参考https://api.aliyun.com/ 开发文档实现所有功能。仅允许管理员管理自己的云服务的情况下使用该工具,勿利用此工具用于任何情况下的违法犯罪情景,一切后果由使用者自行承担,否则请立刻停止并删除本工具。 |
|---|---|
| LegalCopyright: | 该工具的所有功能只是调用阿里云提供的对外api接口实现,你可以参考https://api.aliyun.com/ 开发文档实现所有功能。仅允许管理员管理自己的云服务的情况下使用该工具,勿利用此工具用于任何情况下的违法犯罪情景,一切后果由使用者自行承担,否则请立刻停止并删除本工具。 |
| CompanyName: | ckk |
| ProductVersion: | 1.0.0.0 |
| ProductName: | ckk阿里云服务API工具 |
| FileDescription: | 通过阿里云提供的api命令使用accessKeyId accessSecret认证通过后即可快速管理云服务 |
| FileVersion: | 1.0.0.0 |
| CharacterSet: | Unicode |
| LanguageCode: | Chinese (Simplified) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x0000 |
| ProductVersionNumber: | 1.0.0.0 |
| FileVersionNumber: | 1.0.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | - |
| OSVersion: | 4 |
| EntryPoint: | 0x4f7a40 |
| UninitializedDataSize: | 1347584 |
| InitializedDataSize: | 73728 |
| CodeSize: | 3858432 |
| LinkerVersion: | 6 |
| PEType: | PE32 |
| TimeStamp: | 2021:04:19 06:06:05+02:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 19-Apr-2021 04:06:05 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000118 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 3 |
| Time date stamp: | 19-Apr-2021 04:06:05 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
UPX0 | 0x00001000 | 0x00149000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
UPX1 | 0x0014A000 | 0x003AE000 | 0x003ADC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.78983 |
.rsrc | 0x004F8000 | 0x00012000 | 0x00011800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.00378 |
ADVAPI32.dll |
COMCTL32.dll |
GDI32.dll |
KERNEL32.DLL |
OLEAUT32.dll |
SHELL32.dll |
USER32.dll |
WINMM.dll |
WINSPOOL.DRV |
WS2_32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1760 | "C:\Users\admin\AppData\Local\Temp\apitools.exe" | C:\Users\admin\AppData\Local\Temp\apitools.exe | explorer.exe | ||||||||||||
User: admin Company: ckk Integrity Level: MEDIUM Description: 通过阿里云提供的api命令使用accessKeyId accessSecret认证通过后即可快速管理云服务 Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1760 | apitools.exe | C:\Users\admin\AppData\Local\Temp\aliyuntools.lock | binary | |
MD5:93B885ADFE0DA089CDF634904FD59F71 | SHA256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D | |||
| 1760 | apitools.exe | C:\Users\admin\AppData\Local\Temp\E2EECore.2.7.2.dll | executable | |
MD5:8B6C94BBDBFB213E94A5DCB4FAC28CE3 | SHA256:982A177924762F270B36FE34C7D6847392B48AE53151DC2011078DCEEF487A53 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1760 | apitools.exe | GET | 200 | 172.67.154.159:80 | http://a.ckk.pw/aly/?regions=1&toolsver=1 | US | binary | 523 b | suspicious |
1760 | apitools.exe | GET | 200 | 172.67.154.159:80 | http://a.ckk.pw/aly/?toolsver=1 | US | binary | 73 b | suspicious |
1760 | apitools.exe | POST | 400 | 140.205.155.65:80 | http://rds.aliyuncs.com/?AccessKeyId=11&Action=DescribeRegions&Format=JSON&RegionId=cn-hangzhou&Signature=2I32cgsMmN3FPydbCD37ERXEHdI%3D&SignatureMethod=HMAC-SHA1&SignatureNonce=64914895-c114-4d18-bc91-a22ba7a0cbee&SignatureVersion=1.0&Timestamp=2021-04-20T07%3A38%3A09Z&Version=2014-08-15 | CN | text | 313 b | unknown |
1760 | apitools.exe | POST | 400 | 106.11.172.2:80 | http://ecs-cn-hangzhou.aliyuncs.com/?AccessKeyId=11&Action=DescribeInstances&Format=JSON&PageSize=100&RegionId=cn-hangzhou&Signature=zht6%2BxGyergeQE8yb1cM9YV15Rw%3D&SignatureMethod=HMAC-SHA1&SignatureNonce=c24faddc-117c-4599-a6c0-b6587a9f821b&SignatureVersion=1.0&Timestamp=2021-04-20T07%3A38%3A09Z&Version=2014-05-26 | CN | text | 325 b | unknown |
1760 | apitools.exe | POST | 400 | 106.11.172.2:80 | http://ecs-cn-hangzhou.aliyuncs.com/?AccessKeyId=11&Action=DescribeInstances&Format=JSON&PageSize=100&RegionId=cn-hangzhou&Signature=8KLr23zMYGlZmLdWFlC7mwDgKO4%3D&SignatureMethod=HMAC-SHA1&SignatureNonce=4ef35ee9-7bdc-4a85-bd88-f5f8ec037907&SignatureVersion=1.0&Timestamp=2021-04-20T07%3A38%3A28Z&Version=2014-05-26 | CN | text | 325 b | unknown |
1760 | apitools.exe | POST | 400 | 140.205.155.65:80 | http://rds.aliyuncs.com/?AccessKeyId=11&Action=DescribeRegions&Format=JSON&RegionId=cn-hangzhou&Signature=RtKfhaB8oyoKP8CVlYJoxvRxEZI%3D&SignatureMethod=HMAC-SHA1&SignatureNonce=e4d8ca06-b0b8-4357-9441-c82696d04d35&SignatureVersion=1.0&Timestamp=2021-04-20T07%3A38%3A28Z&Version=2014-08-15 | CN | text | 313 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1760 | apitools.exe | 172.67.154.159:80 | a.ckk.pw | — | US | suspicious |
1760 | apitools.exe | 140.205.155.65:80 | rds.aliyuncs.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | unknown |
1760 | apitools.exe | 106.11.172.2:80 | ecs-cn-hangzhou.aliyuncs.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | unknown |
Domain | IP | Reputation |
|---|---|---|
a.ckk.pw |
| suspicious |
rds.aliyuncs.com |
| unknown |
ecs-cn-hangzhou.aliyuncs.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1048 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
1760 | apitools.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
1760 | apitools.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |