抱歉挖一下这个老帖
刚才在32位虚拟机上测了一下SSF,发现结果略有不同
在样本利用svchost开始写启动项、加密之间,还存在着下面的动作:
2015/12/28 2:58:07,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,53,Allowed ;Execution of an application ("C:\Windows\system32\svchost.exe")
2015/12/28 2:58:20,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:58:26,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:58:29,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:58:34,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:58:39,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:58:43,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:58:50,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:58:52,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:58:55,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:59:00,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:59:03,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:59:06,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:59:08,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:59:10,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:59:12,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:59:14,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,29,Allowed ;Modifying process memory (svchost.exe(pid=3392))
2015/12/28 2:59:29,C:\Users\ABCDEFG\Downloads\virus\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b\6dbb913a9c28a63bb81a86bc483341246536f97aa71cd7620f28261a06ff2d7b.exe,36,Allowed ;Injecting dll (svchost.exe(pid=3392))
请注意,紫色的条目,SSF会直接提醒你这是典型的远程注入行为
而最后的红色条目,就是明明白白的注入DLL
我发现,只要在红色的这一步Deny(Deny即可,不需要Terminate),就不会有之后的写启动项和加密的动作 |