12
返回列表 发新帖
楼主: 江湖的fans
收起左侧

[病毒样本] 帮我看看这个有什么动作

[复制链接]
尤金卡巴斯基
发表于 2009-7-12 17:46:24 | 显示全部楼层
Hello,

New malicious software was found in the attached file. Its detection will be included in the next update.
Thank you for your help.

Trojan-Spy.Win32.Agent.axde

Sincerely yours,
Gashkin Alex,
Virus Analyst.

10/1, 1st Volokolamsky Proezd, Moscow, 123060, Russia
Tel./Fax: + 7 (495) 797 8700
http://www.kaspersky.com http://www.viruslist.com
xppara
发表于 2009-7-12 18:07:16 | 显示全部楼层
McAfee 吃剛光光了
xxl
发表于 2009-7-12 18:26:06 | 显示全部楼层
2009-7-12 18:25:18        http://bbs.kafan.cn/attachment.p ... 2c&t=1247394302        Internet Explorer        处理错误: Trojan-Spy.Win32.Agent.axde        启发式分析计算的威胁级别值较高       
2009-7-12 18:25:18        http://bbs.kafan.cn/attachment.p ... 7394302//BO5703.exe        Internet Explorer        处理错误: Trojan-Spy.Win32.Agent.axde        启发式分析计算的威胁级别值较高       
KIS8.0 KILL
2009-7-12 18:25:18        http://bbs.kafan.cn/attachment.p ... O5703.exe//data0004        Internet Explorer        拒绝: Trojan-Spy.Win32.Agent.axde        启发式分析计算的威胁级别值较高       
2009-7-12 18:25:18        http://bbs.kafan.cn/attachment.p ... O5703.exe//data0004        Internet Explorer        检测到: Trojan-Spy.Win32.Agent.axde        启发式分析计算的威胁级别值较高
zlb1111
发表于 2009-7-12 18:35:58 | 显示全部楼层
程序:
D:\PROGRAM FILES\360\360SE3\SHIELD\SANDBOX\360SEBOX\USER\CURRENT\LOCAL SETTINGS\TEMP\RAR$EX00.328\BO5703.EXE
木马程序生成以下文件:
1) D:\PROGRAM FILES\360\360SE3\SHIELD\SANDBOX\360SEBOX\USER\CURRENT\LOCAL SETTINGS\TEMP\MESSENGER\MQTRIG.DLL
2) D:\PROGRAM FILES\360\360SE3\SHIELD\SANDBOX\360SEBOX\USER\CURRENT\LOCAL SETTINGS\TEMP\MESSENGER\SETUP.EXE
3) D:\PROGRAM FILES\360\360SE3\SHIELD\SANDBOX\360SEBOX\DRIVE\C\WINDOWS\SYSTEM32\VSPLI.DLL
4) D:\PROGRAM FILES\360\360SE3\SHIELD\SANDBOX\360SEBOX\DRIVE\C\WINDOWS\SYSTEM32\EHKOR.EXE
是否删除木马程序及其衍生物?
周勃
发表于 2009-7-12 18:48:31 | 显示全部楼层
• Directories Created
NameLast Write TimeCreation TimeLast Access TimeAttr
C:\Documents and Settings\User\Local Settings\Temp\Messenger2009.01.12 14:47:55.5002009.01.12 14:47:55.4212009.01.12 14:47:55.5000x10
• Files Created
NameSizeLast Write TimeCreation TimeLast Access TimeAttr
C:\Documents and Settings\User\Local Settings\Temp\Messenger\mqtrig.dll1402882007.02.16 22:43:24.0002007.02.16 22:43:24.0002009.01.12 14:47:55.4530x20
C:\Documents and Settings\User\Local Settings\Temp\Messenger\setup.exe204802009.07.11 06:27:56.0002009.07.11 06:27:56.0002009.01.12 14:47:55.4840x20
C:\WINDOWS\system32\lifby.dll737282009.07.11 06:04:58.0002009.07.11 06:04:58.0002009.01.12 14:47:55.4840x20
C:\WINDOWS\system32\mjgcz.ini432009.07.11 06:28:56.0002009.07.11 06:28:56.0002009.01.12 14:47:55.4530x20
C:\WINDOWS\system32\mssrcid.ini162009.01.12 14:48:01.4682009.01.12 14:48:01.4682009.01.12 14:48:01.4680x20
C:\WINDOWS\system32\oruyb.exe409602009.07.11 06:01:40.0002009.07.11 06:01:40.0002009.01.12 14:47:55.5000x20
• Processes Created
PIdProcess NameImage Name
0x36csetup.exeC:\DOCUME~1\User\LOCALS~1\Temp\Messenger\setup.exe
• Threads Created
PIdProcess NameTIdStartStart MemWin32 StartWin32 Start Mem
0x344svchost.exe0x1700x7c810856MEM_IMAGE0x7c910760MEM_IMAGE
0x36csetup.exe0x3700x7c810867MEM_IMAGE0x401f2fMEM_IMAGE
• Windows Api Calls
PIdImage NameAddressFunction ( Parameters ) | Return Value
0x208C:\WINDOWS\system32\oruyb.exe0x4027d1CreateServiceA(hSCManager: 0x1523b8, lpServiceName: "DSPLALER", lpDisplayName: "DCOM Server Process Lookup and Launcher", dwDesiredAccess: 0xf01ff, dwServiceType: 0x10, dwStartType: 0x2, dwErrorControl: 0x1, lpBinaryPathName: "C:\WINDOWS\system32\oruyb.exe", lpLoadOrderGroup: "(null)", lpdwTagId: 0x0, lpDependencies: 0x408278, lpServiceStartName: "(null)", lpPassword: 0x0)|0x152280
• DNS Queries
DNS Query Text
www.baidupn.cn IN A +
• HTTP Queries
HTTP Query Text
www.baidupn.cn GET /up/update.htm HTTP/1.0
www.baidupn.cn GET /page/gt.asp?ver=1072&id=0&cid=0&src=init&k=1234 HTTP/1.1
• Verdict
Auto Analysis Verdict
Suspicious+
• Description
Suspicious Actions Detected
Creates files in windows system directory
Creates system services or drivers
• Mutexes Created or Opened
PIdImage NameAddressMutex Name
0x380C:\WINDOWS\system32\rundll32.exe0x928acfUSMSVC_CLICK555
0x3f4C:\WINDOWS\system32\oruyb.exe0x76ee3a34RasPbFile
0x3f4C:\WINDOWS\system32\oruyb.exe0x771ba3ae_!MSFTHISTORY!_
0x3f4C:\WINDOWS\system32\oruyb.exe0x771bc21cWininetConnectionMutex
0x3f4C:\WINDOWS\system32\oruyb.exe0x771bc23dWininetProxyRegistryMutex
0x3f4C:\WINDOWS\system32\oruyb.exe0x771bc2ddWininetStartupMutex
0x3f4C:\WINDOWS\system32\oruyb.exe0x771d96e1c:!documents and settings!localservice!cookies!
0x3f4C:\WINDOWS\system32\oruyb.exe0x771d96e1c:!documents and settings!localservice!local settings!history!history.ie5!
0x3f4C:\WINDOWS\system32\oruyb.exe0x771d96e1c:!documents and settings!localservice!local settings!temporary internet files!content.ie5!
0x3f4C:\WINDOWS\system32\oruyb.exe0x77267e1bZonesCacheCounterMutex
0x3f4C:\WINDOWS\system32\oruyb.exe0x77267e1bZonesLockedCacheCounterMutex
0x3f4C:\WINDOWS\system32\oruyb.exe0x772689fcZonesCounterMutex
0x560C:\WINDOWS\system32\rundll32.exe0x928acfUSMSVC_CLICK555
• Events Created or Opened
PIdImage NameAddressEvent Name
0x208C:\WINDOWS\system32\oruyb.exe0x77de5f48Global\SvcctrlStartEvent_A3752DX
0x380C:\WINDOWS\system32\rundll32.exe0x77a89410Global\crypt32LogoffEvent
0x3e4C:\WINDOWS\system32\net1.exe0x77de5f48Global\SvcctrlStartEvent_A3752DX
0x3f4C:\WINDOWS\system32\oruyb.exe0x76b443c5DINPUTWINMM
0x3f4C:\WINDOWS\system32\oruyb.exe0x77de5f48Global\SvcctrlStartEvent_A3752DX
0x560C:\WINDOWS\system32\rundll32.exe0x77a89422Global\crypt32LogoffEvent
wcj20236
头像被屏蔽
发表于 2009-7-12 18:52:15 | 显示全部楼层
微点主防杀。。。
allinwonderi
发表于 2009-7-12 19:55:47 | 显示全部楼层

SandBox

[ General information ]
    * Creating several executable files on hard-drive.
    * Application uses MFC.DLL.
    * File length:       141356 bytes.
    * MD5 hash: c65cf37bd0fba699c9a6a139dd1dd717.

[ Changes to filesystem ]
    * Creates directory C:\WINDOWS\TEMP\.
    * Creates file C:\WINDOWS\TEMP\nsw8624.tmp.
    * Deletes file C:\WINDOWS\TEMP\nsw8624.tmp.
    * Creates directory C:\WINDOWS.
    * Creates directory C:\WINDOWS\TEMP.
    * Creates directory C:\WINDOWS\TEMP\Messenger.
    * Creates file C:\WINDOWS\TEMP\Messenger\mqtrig.dll.
    * Creates file C:\WINDOWS\TEMP\Messenger\nvsys.ini.
    * Creates file C:\WINDOWS\TEMP\Messenger\setup.exe.
    * Creates file C:\WINDOWS\TEMP\Messenger\sysmain.dat.
    * Creates file C:\WINDOWS\TEMP\Messenger\sysvc.dat.

[ Process/window information ]
    * Creates process "setup.exe"".

[ Signature Scanning ]
    * C:\WINDOWS\TEMP\Messenger\mqtrig.dll (140288 bytes) : no signature detection.
    * C:\WINDOWS\TEMP\Messenger\nvsys.ini (43 bytes) : no signature detection.
    * C:\WINDOWS\TEMP\Messenger\setup.exe (20480 bytes) : no signature detection.
    * C:\WINDOWS\TEMP\Messenger\sysmain.dat (73728 bytes) : no signature detection.
    * C:\WINDOWS\TEMP\Messenger\sysvc.dat (40960 bytes) : no signature detection.
allinwonderi
发表于 2009-7-12 19:56:56 | 显示全部楼层

to Avira

Suspicious Files and Miscellaneous Uploads
Thank you for your submission. Below you can see the current status of the uploaded files.

A listing of files alongside their results can be found below:
File ID Filename Size (Byte)Result
25396249 BO5703.exe 138.04 KB UNDER ANALYSIS

Please find a detailed report concerning each individual sample below:
FilenameResult
BO5703.exe UNDER ANALYSIS

The file 'BO5703.exe' has been determined to be 'UNDER ANALYSIS'.

Please note that you will receive an email which will contain theresults shown above. In case the final outcome of the analysis is notyet finished for all files the notification will be sent once ready.

[ 本帖最后由 allinwonderi 于 2009-7-12 19:59 编辑 ]
自制照片
发表于 2009-7-13 16:27:24 | 显示全部楼层
是可以的啊,可能楼主的瑞星病毒库没有升级,建议先升级,进入安全模式再看看。
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2026-1-8 11:14 , Processed in 0.079599 second(s), 3 queries , Redis On.

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表