查看: 2903|回复: 14
收起左侧

[病毒样本] 机房产物。。。

[复制链接]
Redevil
发表于 2007-11-23 10:23:43 | 显示全部楼层 |阅读模式
RT
Technical Details
Analysis Number 1
Parent ID 0
Process ID 1780
Filename C:\file.exe
Filesize 19005 bytes
MD5 4d9143a18b691b517815edf5e89f8f76
Start Reason AnalysisTarget
Termination Reason NormalTermination
Start Time 00:00.094
Stop Time 00:05.188
DLL-Handling
Loaded DLLs

























Filesystem
New Files
C:\WINDOWS\system32\del.bat
Opened Files
\\.\PIPE\lsarpc
\SystemRoot\AppPatch\sysmain.sdb
\SystemRoot\AppPatch\systest.sdb
\Device\NamedPipe\ShimViewer
C:\WINDOWS\system32\del.bat
Chronological order
Get File Attributes: C:\WINDOWS\SYSTEM32\702AF42.EXE Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:\WINDOWS\ Flags: (SECURITY_ANONYMOUS)
Open File: \\.\PIPE\lsarpc (OPEN_EXISTING)
Create File: C:\WINDOWS\system32\del.bat
Open File: \SystemRoot\AppPatch\sysmain.sdb (OPEN_EXISTING)
Open File: \SystemRoot\AppPatch\systest.sdb (OPEN_EXISTING)
Open File: \Device\NamedPipe\ShimViewer (OPEN_EXISTING)
Open File: C:\WINDOWS\system32\del.bat ()
Find File: del.bat
Registry
Changes
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\577B2F0B "DisplayName" = 577B2F0B
HKEY_CURRENT_USER\SYSTEM\CurrentControlSet\Services\577B2F0B "DisplayName" = 577B2F0B
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\577B2F0B "Description" = 37AFE3
HKEY_CURRENT_USER\SYSTEM\CurrentControlSet\Services\577B2F0B "Description" = 37AFE3
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\577B2F0B "ErrorControl" = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\577B2F0B "ImagePath" = C:\WINDOWS\system32\702AF42.EXE -k
HKEY_CURRENT_USER\SYSTEM\CurrentControlSet\Services\577B2F0B "ImagePath" = C:\WINDOWS\system32\702AF42.EXE -k
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\577B2F0B "ObjectName" = LocalSystem
HKEY_CURRENT_USER\SYSTEM\CurrentControlSet\Services\577B2F0B "ObjectName" = LocalSystem
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\577B2F0B "Start" = [REG_DWORD, value: 00000002]
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\577B2F0B "Type" = [REG_DWORD, value: 00000010]
Reads
HKEY_LOCAL_MACHINE\SYSTEM\WPA\MediaCenter "Installed"
Process Management Creates Process - Filename () CommandLine: (C:\WINDOWS\system32\del.bat) As User: () Creation Flags: ()
Kill Process - Filename () CommandLine: () Target PID: (1780) As User: () Creation Flags: ()
Enum Processes
Open Process - Filename (C:\WINDOWS\Explorer.EXE) Target PID: (1452)
Service Management Open Service Manager - Name: "SCM"
System Info Get System Directory
Window Find Window - Class Name (#32770) Window Name (½ðɽ¶¾°Ô)
Enum Windows
Analysis Number 2
Parent ID 0
Process ID 712
Filename
Filesize -1 bytes
MD5
Start Reason SCM
Termination Reason Unknown
Start Time 00:04.578
Stop Time 00:00.000
Analysis Number 3
Parent ID 0
Process ID 712
Filename
Filesize -1 bytes
MD5
Start Reason SCM
Termination Reason Unknown
Start Time 00:04.609
Stop Time 00:00.000
The following process was started by process: 1
Analysis Number 4
Parent ID 1
Process ID 1376
Filename C:\WINDOWS\system32\del.bat
Filesize 388608 bytes
MD5 eeb024f2c81f0d55936fb825d21a91d6
Start Reason CreateProcess
Termination Reason NormalTermination
Start Time 00:04.922
Stop Time 00:05.922
DLL-Handling
Loaded DLLs


















Filesystem
Opened Files
C:\WINDOWS\system32\del.bat
Deleted Files
C:\file.exe
C:\WINDOWS\system32\del.bat
Chronological order
Get File Attributes: C:\ Flags: (SECURITY_ANONYMOUS)
Find File: C:\
Find File: C:\WINDOWS\system32\del.bat
Open File: C:\WINDOWS\system32\del.bat (OPEN_EXISTING)
Get File Attributes: C:\FILE.EXE Flags: (SECURITY_ANONYMOUS)
Find File: C:\FILE.EXE
Delete File: C:\file.exe
Get File Attributes: C:\WINDOWS\system32\del.bat Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:\WINDOWS\system32 Flags: (SECURITY_ANONYMOUS)
Delete File: C:\WINDOWS\system32\del.bat
Registry
Reads
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor "DisableUNCCheck"
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor "EnableExtensions"
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor "DelayedExpansion"
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor "DefaultColor"
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor "CompletionChar"
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor "PathCompletionChar"
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor "AutoRun"
HKEY_CURRENT_USER\Software\Microsoft\Command Processor "DisableUNCCheck"
HKEY_CURRENT_USER\Software\Microsoft\Command Processor "EnableExtensions"
HKEY_CURRENT_USER\Software\Microsoft\Command Processor "DelayedExpansion"
HKEY_CURRENT_USER\Software\Microsoft\Command Processor "DefaultColor"
HKEY_CURRENT_USER\Software\Microsoft\Command Processor "CompletionChar"
HKEY_CURRENT_USER\Software\Microsoft\Command Processor "PathCompletionChar"
HKEY_CURRENT_USER\Software\Microsoft\Command Processor "AutoRun"
Process Management Kill Process - Filename () CommandLine: () Target PID: (1376) As User: () Creation Flags: ()

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Redevil
 楼主| 发表于 2007-11-23 10:25:14 | 显示全部楼层
反病毒引擎版本最后更新扫描结果
AhnLab-V32007.11.23.02007.11.22-
AntiVir7.6.0.342007.11.22TR/Crypt.NSPM.Gen
Authentium4.93.82007.11.21-
Avast4.7.1074.02007.11.22Win32:AutoRun-IC
AVG7.5.0.5032007.11.22Downloader.Generic6.VCR
BitDefender7.22007.11.23Win32.Worm.Winko.I
CAT-QuickHeal9.002007.11.22-
ClamAV0.91.22007.11.23-
DrWeb4.44.0.091702007.11.22Trojan.Popwin.679
eSafe7.0.15.02007.11.21suspicious Trojan/Worm
eTrust-Vet31.3.53162007.11.22-
Ewido4.02007.11.22-
FileAdvisor12007.11.23-
Fortinet3.14.0.02007.11.23-
F-Prot4.4.2.542007.11.22W32/Injector.A.gen!Eldorado
F-Secure6.70.13030.02007.11.23-
IkarusT3.1.1.122007.11.23Trojan-PWS.Win32.Agent.BU
Kaspersky7.0.0.1252007.11.21-
McAfee51692007.11.22New Poly Win32
Microsoft1.30072007.11.23VirTool:Win32/Obfuscator.A
NOD32v226792007.11.22Win32/TrojanDownloader.Flux
Norman5.80.022007.11.22-
Panda9.0.0.42007.11.23Suspicious file
Graybird
发表于 2007-11-23 10:25:49 | 显示全部楼层
Starting the file scan:

Begin scan in 'E:\auto.rar'
E:\auto.rar
  [0] Archive type: RAR
  --> auto.exe
      [DETECTION] Is the Trojan horse TR/Crypt.NSPM.Gen
      [INFO]      The file was deleted!
SONGBOWEN
发表于 2007-11-23 11:02:22 | 显示全部楼层
Begin scan in 'C:\Documents and Settings\Administrator\桌面\auto.rar'
C:\Documents and Settings\Administrator\桌面\auto.rar
  [0] Archive type: RAR
  --> auto.exe
      [DETECTION] Is the Trojan horse TR/Crypt.NSPM.Gen
      [WARNING]   The file was ignored!

又报壳?!……
我恶心了……
KIS7过
2007-11-23 11:01:18        文件: C:\Documents and Settings\Administrator\桌面\auto.rar/auto.exe//#        正常        已扫描
tonger2003
发表于 2007-11-23 11:08:14 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
啊弥陀佛
发表于 2007-11-23 11:10:56 | 显示全部楼层
微点砍掉

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Roboon
发表于 2007-11-23 11:20:18 | 显示全部楼层
Roboon:程序:
D:\我的文档\桌面\AUTO.EXE
木马程序生成以下文件:
1) C:\WINDOWS\SYSTEM32\1730B18.EXE
2) C:\WINDOWS\SYSTEM32\3957BDED.DLL
是否删除木马程序及其衍生物?
wangjay1980
发表于 2007-11-23 11:20:43 | 显示全部楼层
来挂主防吧

扫描一会杀

[ 本帖最后由 wangjay1980 于 2007-11-23 11:31 编辑 ]
傻猪猪米走鸡
发表于 2007-11-23 11:52:22 | 显示全部楼层
D:\firefox download\auto.rar ?RAR ?auto.exe - Win32/TrojanDownloader.Flux 特洛伊木马 的变种
wu19934718
发表于 2007-11-23 13:02:05 | 显示全部楼层
费尔,杀一木马
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-21 15:39 , Processed in 0.137886 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表