很恶劣的病毒,行为如下:
1、在Windows系统目录创建文件
2、创建系统服务或驱动程序
3、注入代码到其他进程
4、读取的系统驱动程序
5、修改系统文件
• Keys Created
Name Last Write Time
LM\System\CurrentControlSet\Services\UPDATEDATA 2009.01.12 15:12:48.828
LM\System\CurrentControlSet\Services\UPDATEDATA\Enum 2009.01.12 15:12:48.828
LM\System\CurrentControlSet\Services\UPDATEDATA\Security 2009.01.12 15:12:48.140
• Values Created
Name Type Size Value
LM\System\CurrentControlSet\Services\UPDATEDATA\DisplayName REG_SZ 22 "UPDATEDATA"
LM\System\CurrentControlSet\Services\UPDATEDATA\Enum\0 REG_SZ 56 "Root\LEGACY_UPDATEDATA\0000"
LM\System\CurrentControlSet\Services\UPDATEDATA\Enum\Count REG_DWORD 4 0x1
LM\System\CurrentControlSet\Services\UPDATEDATA\Enum\NextInstance REG_DWORD 4 0x1
LM\System\CurrentControlSet\Services\UPDATEDATA\ErrorControl REG_DWORD 4 0x0
LM\System\CurrentControlSet\Services\UPDATEDATA\ImagePath REG_EXPAND_SZ 86 "\??\C:\WINDOWS\system32\drivers\acpiec.sys"
LM\System\CurrentControlSet\Services\UPDATEDATA\Security\Security REG_BINARY 168 ?
LM\System\CurrentControlSet\Services\UPDATEDATA\Start REG_DWORD 4 0x3
LM\System\CurrentControlSet\Services\UPDATEDATA\Type REG_DWORD 4 0x1
• Files Created
Name Size Last Write Time Creation Time Last Access Time Attr
C:\WINDOWS\system32\func.dll 36864 2009.01.12 15:12:47.000 2009.01.12 15:12:46.921 2009.01.12 15:12:46.921 0x20
• Files Changed
Name Size Last Write Time Creation Time Last Access Time Attr
C:\WINDOWS\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb 3153920/3153920 2008.08.28 08:17:35.968/2009.01.12 15:12:50.046 2008.07.31 16:57:39.468/2008.07.31 16:57:39.468 2008.08.01 05:33:30.703/2008.08.01 05:33:30.703 0x20/0x20
C:\WINDOWS\system32\drivers\acpiec.sys 11648/12928 2007.07.27 12:00:00.000/2009.01.12 15:12:47.843 2007.07.27 12:00:00.000/2007.07.27 12:00:00.000 2008.08.01 04:46:06.655/2008.08.01 04:46:06.655 0x20/0x20
• Drivers Loaded
Base Size Flags Image Name
0xf8a46000 0x4000 0x9104000 \??\C:\WINDOWS\system32\drivers\acpiec.sys
• Drivers Unloaded
• Processes Created
PId Process Name Image Name
0x154 rundll32.exe C:\WINDOWS\system32\rundll32.exe
0x5d8 wmiprvse.exe C:\WINDOWS\system32\wbem\wmiprvse.exe
• Processes Terminated
• Threads Created
PId Process Name TId Start Start Mem Win32 Start Win32 Start Mem
0x154 rundll32.exe 0x570 0x7c810867 MEM_IMAGE 0x1001bdc MEM_IMAGE
0x154 rundll32.exe 0x6b8 0x7c810856 MEM_IMAGE 0x92146b MEM_IMAGE
0x25c csrss.exe 0x2d0 0x75b44616 MEM_IMAGE 0x0 MEM_PRIVATE
0x25c csrss.exe 0x5d4 0x75b44616 MEM_IMAGE 0x4b63 MEM_PRIVATE
0x274 winlogon.exe 0x638 0x7c810856 MEM_IMAGE 0x76c74a65 MEM_IMAGE
0x274 winlogon.exe 0x65c 0x7c810856 MEM_IMAGE 0x77a8964a MEM_IMAGE
0x2ac lsass.exe 0x57c 0x7c810856 MEM_IMAGE 0x77e76bf0 MEM_IMAGE
0x348 svchost.exe 0xf8 0x7c810856 MEM_IMAGE 0x7c910760 MEM_IMAGE
0x3a0 svchost.exe 0x5a0 0x7c810856 MEM_IMAGE 0x4b22 MEM_FREE
0x3f4 svchost.exe 0x594 0x7c810856 MEM_IMAGE 0x4a8f MEM_FREE
0x3f4 svchost.exe 0x5b4 0x7c810856 MEM_IMAGE 0x762cf010 MEM_IMAGE
0x3f4 svchost.exe 0x5c0 0x7c810856 MEM_IMAGE 0x762cf010 MEM_IMAGE
0x3f4 svchost.exe 0x5c4 0x7c810856 MEM_IMAGE 0x762cf0a3 MEM_IMAGE
0x3f4 svchost.exe 0x5c8 0x7c810856 MEM_IMAGE 0x762cf010 MEM_IMAGE
0x3f4 svchost.exe 0x5f8 0x7c810856 MEM_IMAGE 0x4b27 MEM_FREE
0x3f4 svchost.exe 0x650 0x7c810856 MEM_IMAGE 0x7c929fae MEM_IMAGE
0x3f4 svchost.exe 0x670 0x7c810856 MEM_IMAGE 0x606b73ae MEM_IMAGE
0x3f4 svchost.exe 0x674 0x7c810856 MEM_IMAGE 0x606b73ae MEM_IMAGE
0x3f4 svchost.exe 0x68c 0x7c810856 MEM_IMAGE 0x606b73ae MEM_IMAGE
0x3f4 svchost.exe 0x6a0 0x7c810856 MEM_IMAGE 0x606b73ae MEM_IMAGE
0x3f4 svchost.exe 0x6b4 0x7c810856 MEM_IMAGE 0x7529edb3 MEM_IMAGE
0x3f4 svchost.exe 0x6bc 0x7c810856 MEM_IMAGE 0x7529e44b MEM_IMAGE
0x5d8 wmiprvse.exe 0x5a8 0x7c810856 MEM_IMAGE 0x716df2be MEM_IMAGE
0x5d8 wmiprvse.exe 0x5dc 0x7c810867 MEM_IMAGE 0x1024636 MEM_IMAGE
0x5d8 wmiprvse.exe 0x5e0 0x7c810856 MEM_IMAGE 0x77e76bf0 MEM_IMAGE
0x5d8 wmiprvse.exe 0x5e8 0x7c810856 MEM_IMAGE 0x0 MEM_FREE
0x5d8 wmiprvse.exe 0x5ec 0x7c810856 MEM_IMAGE 0x5f771c49 MEM_IMAGE
0x5d8 wmiprvse.exe 0x5f0 0x7c810856 MEM_IMAGE 0x0 MEM_FREE
0x5d8 wmiprvse.exe 0x5f4 0x7c810856 MEM_IMAGE 0x774f319a MEM_IMAGE
0x5d8 wmiprvse.exe 0x608 0x7c810856 MEM_IMAGE 0x0 MEM_FREE
0x5d8 wmiprvse.exe 0x60c 0x7c810856 MEM_IMAGE 0x100ce42 MEM_IMAGE
• Modules Loaded
PId Process Name Base Size Flags Image Name
0x348 svchost.exe 0x76fd0000 0x7f000 0x800c4004 C:\WINDOWS\system32\CLBCATQ.DLL
0x348 svchost.exe 0x77050000 0xc5000 0x800c4006 C:\WINDOWS\system32\COMRes.dll
0x348 svchost.exe 0x77b40000 0x22000 0x800c4004 C:\WINDOWS\system32\Apphelp.dll
0x3f4 svchost.exe 0x73d30000 0x17000 0x800c4004 C:\WINDOWS\system32\wbem\wbemcons.dll
0x3f4 svchost.exe 0x74ed0000 0xe000 0x80084004 C:\WINDOWS\system32\wbem\wbemsvc.dll
• Windows Api Calls
PId Image Name Address Function ( Parameters ) | Return Value
0x154 C:\WINDOWS\system32\rundll32.exe 0x923e2e CreateServiceA(hSCManager: 0x98e08, lpServiceName: "UPDATEDATA", lpDisplayName: "UPDATEDATA", dwDesiredAccess: 0x10, dwServiceType: 0x1, dwStartType: 0x3, dwErrorControl: 0x0, lpBinaryPathName: "C:\WINDOWS\system32\drivers\acpiec.sys", lpLoadOrderGroup: "(null)", lpdwTagId: 0x0, lpDependencies: 0x0, lpServiceStartName: "(null)", lpPassword: 0x0)|0x9b0b8
• Verdict
Auto Analysis Verdict
Rated as Suspicious
• Description
Suspicious Actions Detected
Creates files in windows system directory
Creates system services or drivers
Injects code into other processes
Load system drivers
Patches system files |