pioneer
超级版主
       
积分 4563
发帖 4545
注册 2007-7-16 来自 BJ
|
#2
病毒分析
该样本程序被执行后,将建立名为“Av Love Av Av Av Av Av”的互斥体,随后将自身权限提升至“SeDebugPrivilege”,通过注册表查找360安全卫士的安装设置信息,修改其注册表,企图使360安全卫士保护功能失效,相关注册表项如下:
Quote: | 项:“HKEY_LOCAL_MACHINE\SOFTWARE\360Safe\safemon”
键:“ExecAccess”
数据:“0”,
键:“MonAccess”
数据:“0”,
键:“LeakShowed”
数据:“0”,
键:“SiteAccess”
数据:“0”,
键:“UDiskAccess”
数据:“0”,
键:“weeken”
数据:“0”, |
|
遍历进程,查找以下字符串:
Quote: | “木马”
“FireWall”
“Virus”
“Anti”
“NOD32”
“瑞星”
“监视”
“Sniffer”
“Debug”
“IDA”
“fly” |
|
发现后向其进程发送消息“WM_CLOSE”、“WM_DESTROY”、“WM_QUIT”、“WM_SYSTIMER”,企图使其退出。利用函数“CopyFile”将自身复制到系统目录“%SystemRoot%\system32”并重命名为“keepSafe.exe”,修改注册表,重定向下列软件至“%SystemRoot%\system32\keepSafe.exe”,使其无法正常运行。
safeboxtray.exe
360Safe.exe
360tray.exe
360rpt.exe
ravmond.exe
ravmon.exe
rav.exe
RavTask.exe
RavStub.exe
CCenter.exe
RavMonD.exe
RavMon.exe
Rav.exe
rfw.exe
AgentSvr.exe
AppSvc32.exe
autoruns.exe
avgrssvc.exe
AvMonitor.exe
avp.exe
ccSvcHst.exe
FileDsty.exe
FTCleanerShell.exe
HijackThis.exe
IceSword.exe
iparmo.exe
Iparmor.exe
isPwdSvc.exe
kabaload.exe
KaScrScn.SCR
KASMain.exe
KASTask.exe
KAV32.exe
KAVDX.exe
KAVPFW.exe
KAVSetup.exe
KAVStart.exe
KISLnchr.exe
KMailMon.exe
KMFilter.exe
KPFW32.exe
KPFW32X.exe
KPFWSvc.exe
KRegEx.exe
KRepair.COM
KsLoader.exe
KVCenter.kxp
KvDetect.exe
KvfwMcl.exe
KVMonXP.kxp
KVMonXP_1.kxp
kvol.exe
kvolself.exe
KvReport.kxp
KVSrvXP.exe
KVStub.kxp
kvupload.exe
kvwsc.exe
KvXP.kxp
KWatch.exe
KWatch9x.exe
KWatchX.exe
loaddll.exe
MagicSet.exe
mcconsol.exe
mmqczj.exe
mmsk.exe
NAVSetup.exe
nod32krn.exe
nod32kui.exe
PFW.exe
PFWLiveUpdate.exe
QHSET.exe
Ras.exe
RegClean.exe
rfwcfg.exe
RfwMain.exe
rfwProxy.exe
rfwsrv.exe
RsAgent.exe
Rsaupd.ex
runiep.exe
safelive.exe
scan32.exe
shcfg32.exe
SmartUp.exe
SREng.exe
symlcsvc.exe
SysSafe.exe
TrojanDetector.exe
Trojanwall.exe
TrojDie.kxp
UIHost.exe
UmxAgent.exe
UmxAttachment.exe
UmxCfg.exe
UmxFwHlp.exe
UmxPol.exe
UpLive.EXE
WoptiClean.exe
zxsweep.exe
sos.exe
auto.exe
UFO.exe
AutoRun.exe
XP.exe
taskmgr.exe
guangd.exe
appdllman.exe
kernelwind32.exe
logogo.exe
TNT.Exe
SDGames.exe
TxoMoU.Exe
cross.exe
regedit.Exe
regedit32.Exe
Wsyscheck.exe
servet.exe
Discovery.exe
pagefile.exe
pagefile.pif
niu.exe
~.exe
AoYun.exe
修改注册表,添加启动项,相关键值如下:
Quote: | 项:“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer”
键:“TXMouie”
数据:“C:\WINDOWS\system32\keepSafe.exe”
项:“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run”
键:“dsfghjgj”
数据:“C:\WINDOWS\system32\keepSafe.exe”
项:“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce”
键:“vcbbjf”
数据:“C:\WINDOWS\system32\keepSafe.exe”
项:“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run”
键:“ilortgdg”
数据:“C:\WINDOWS\system32\keepSafe.exe”
项:“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce”
键:“cvhnykzx”
数据:“C:\WINDOWS\system32\keepSafe.exe”
项:“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx”
键:“deryheruxc”
数据:“C:\WINDOWS\system32\keepSafe.exe” |
|
使用函数“URLDownloadToFile”下载文件列表“http://www.ha***di.com/blog/help/dow.txt”,保存至目录“%SystemRoot%\system32”命名为“Contxt.dat”,读取列表中的文件并进行下载,下载成功后运行。
病毒还将读取病毒制造者的MAC地址、操作系统版本,发送至“http://www.ha***di.com/blog/help/Count.asp”进行感染统计。
完成后将自身属性设置为“系统”、“隐藏”,并且修改注册表,企图隐藏自身,相关注册表项如下:
Quote: | 项:“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced”
键:“Hidden”
数据:“2”
项:“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL”
键:“CheckedValue”
数据:“0” |
|
[ Last edited by pioneer on 2008-11-27 at 16:37 ]
|
※文章所有权归【pioneer】与【东方微点论坛】共同所有,转载请注明出处!※
|
 |
|