查看: 3080|回复: 13
收起左侧

[病毒样本] c7c1bd 红伞 sophos vba32 drweb报 其余不报

[复制链接]
lanvin
发表于 2007-11-11 03:17:33 | 显示全部楼层 |阅读模式
 沙盘报告:

2.a)sample.exe - Registry Activities         - Registry Keys Created:

HKLM\​SYSTEM\​ControlSet003
HKLM\​SYSTEM\​ControlSet003\​Services
HKLM\​SYSTEM\​ControlSet003\​Services\​BITS
HKLM\​SYSTEM\​ControlSet003\​Services\​BITS\​Parameters


         + Registry Values Modified:
         


 .b) sample.exe - File Activities          - Files Created:
         
C:\WINDOWS\system32\help.dll



 .c) sample.exe - Windows Service Activities          - Services Started:
         
BITS


         - Services Changed:
         
BITS
BITS
BITS



 .d) sample.exe - Process Activities          - Thread Overview:
         
Time        Number of threads
 fter 6 seconds        1



 .e) sample.exe - Other Activities          - Mutexes Created:
         
DBWinMutex
min


         + Windows SEH exceptions:
         


 . services.exe         - General information about this executable
         
 nalysis Reason:        A service was started.
 ilename:        services.exe
 D5:        c6ce6eec82f187615d1002bb3bb50ed4
 HA-1:        b958912d139cb8dbfeeacdd38ba048c4f452174e
File Size:        108032 Bytes
 ommand Line:        C:\WINDOWS\system32\services.exe
 rocess-status at analysis end:        alive
 xit Code:        0


         + Load-time Dlls
         


 .a) services.exe - Registry Activities         - Registry Keys Created:
         
HKLM\​System\​CurrentControlSet\​Enum\​Root\​LEGACY_BITS\​0000\​Control


         + Registry Values Modified:
         

         + Registry Values Read:
         


 .b) services.exe - File Activities          - Files Created:
         
pipe\net\NtControlPipe9


         - Files Read:
         
pipe\net\NtControlPipe9


         - Files Modified:
         
C:\WINDOWS\system32\config\SysEvent.Evt


         - File System Control Communication:
         
File        Control Code        Times
 ipe\net\NtControlPipe9         0x00110008         1
 ipe\net\NtControlPipe9         0x0011C017         1



 .c) services.exe - Process Activities          - Processes Created:
         
Executable        Command Line
         C:\WINDOWS\system32\svchost.exe -k netsvcs



 . svchost.exe         - General information about this executable
         
 nalysis Reason:        Started by services.exe
 ilename:        svchost.exe
 D5:        8f078ae4ed187aaabc0a305146de6716
 HA-1:        da0ff4006859a7580aba81f486f692dead2014fe
File Size:        14336 Bytes
 ommand Line:        C:\WINDOWS\system32\svchost.exe -k netsvcs
 rocess-status at analysis end:        alive
 xit Code:        0


         + Load-time Dlls
         

         + Run-time Dlls
         


 .a) svchost.exe - Registry Activities         - Registry Keys Created Or Opened:
         
HKLM\​SOFTWARE\​CLASSES


         + Registry Values Modified:
         

         + Registry Values Read:
         


 .b) svchost.exe - File Activities          - Files Deleted:
         
C:\sample.exe


         - Files Read:
         
PIPE\lsarpc
pipe\net\NtControlPipe9


         - Files Modified:
         
PIPE\lsarpc
\Device\RasAcd


         - File System Control Communication:
         
File        Control Code        Times
 IPE\lsarpc         0x0011C017         3
 DosDevices\pipe\         0x00110018         1


         - Device Control Communication:
         


         - Memory Mapped Files:
         
File Name
C:\WINDOWS\system32\rpcss.dll
C:\WINDOWS\system32\winlogon.exe



 .c) svchost.exe - Windows Service Activities          - Services Changed:
         
BITS



 .d) svchost.exe - Process Activities          - Thread Overview:
         
Time        Number of threads
 fter 41 seconds        1



 .e) svchost.exe - Network Activity          + DNS Queries:
         

         + TCP Conversation from 192.168.0.2:1074 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1072 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1078 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1076 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1082 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1080 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1054 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1052 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1084 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1058 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1088 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1056 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1086 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1062 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1060 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1066 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1064 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1070 to 222.173.188.18:80
         

         + TCP Conversation from 192.168.0.2:1068 to 222.173.188.18:80
         

         +  HTTP Conversations:
         

         +  TCP Connection Attempts:
         


 .f) svchost.exe - Other Activities          - Mutexes Created:
         
DBWinMutex
netsrv


         + Windows SEH exceptions:

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
mofunzone
发表于 2007-11-11 03:49:16 | 显示全部楼层
Starting the file scan:

Begin scan in 'C:\Users\morgan\Documents\sample.rar'
C:\Users\morgan\Documents\
  sample.rar
    [0] Archive type: RAR
    --> sample.exe
        [DETECTION] Contains suspicious code HEUR/Malware
        [WARNING]   Infected files in archives cannot be repaired!
        [WARNING]   The file was ignored!
微点卫士
发表于 2007-11-11 07:07:44 | 显示全部楼层
KILL PASS
woai_jolin
发表于 2007-11-11 10:07:20 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Nerazzurri
发表于 2007-11-11 10:19:56 | 显示全部楼层
Kaspersky Internet Security 7.0
The requested URL http://bbs.kafan.cn/attachment.php?aid=151968 is infected with Trojan.Win32.Agent.cra virus
29159011
发表于 2007-11-11 10:25:33 | 显示全部楼层
程序:
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\桌面\SAMPLE\SAMPLE.EXE
病毒程序生成以下文件:
1) C:\WINDOWS\SYSTEM32\HELP.DLL
是否删除木马程序及其衍生物?
cy6266812
发表于 2007-11-11 11:38:34 | 显示全部楼层
AVAST没报
BING126
头像被屏蔽
发表于 2007-11-11 11:43:30 | 显示全部楼层
McAfee MISS
qigang
发表于 2007-11-11 16:42:21 | 显示全部楼层
RX20.17.60未报毒。。
zeroten
发表于 2007-11-11 16:55:43 | 显示全部楼层
我用微点,运行貌似没反应
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-5-18 05:11 , Processed in 0.145980 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表