楼主: wegon
收起左侧

[病毒样本] 伪压缩包程序让人防不胜防,非HIPS党不要双击运行!

  [复制链接]
z2665
发表于 2010-1-2 09:33:32 | 显示全部楼层
又是这个东西。。。
• File Info
NameValue
Size128401
MD5bef762f333fc2e6eb4efa09cfdb2d11b
SHA1d78239b719c58dcc82624aaf529de016140ead7f
SHA2567e87c5dac9d0a950b10452fcc79ec595a042e9752d9a8cc6cbd2210988256ee3
ProcessActive
• Keys Created• Keys Changed• Keys Deleted• Values Created
NameTypeSizeValue
CU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shellREG_SZ94"explorer.exe,C:\WINDOWS\system32\360WDtray.exe"
LM\System\CurrentControlSet\Control\Session Manager\PendingFileRenameOperationsREG_MULTI_SZ198"\??\C:\DOCUME~1\User\LOCALS~1\Temp\~nsu.tmp\Au_.exe"
• Values Changed• Values Deleted• Directories Created
NameLast Write TimeCreation TimeLast Access TimeAttr
C:\Documents and Settings\User\Local Settings\Temp\~nsu.tmp2009.01.12 15:12:48.8592009.01.12 15:12:48.8592009.01.12 15:12:48.8590x10
C:\Documents and Settings\User\Local Settings\Temp\RarSFX02009.01.12 15:12:49.7502009.01.12 15:12:46.7182009.01.12 15:12:49.7500x10
• Directories Changed• Directories Deleted• Files Created
NameSizeLast Write TimeCreation TimeLast Access TimeAttr
C:\88642.txt112009.01.12 15:12:54.7962009.01.12 15:12:54.5312009.01.12 15:12:54.5310x20
C:\Documents and Settings\User\Local Settings\Temp\~nsu.tmp\Au_.exe353562009.01.12 15:12:48.1872009.01.12 15:12:48.8592009.01.12 15:12:48.8590x20
C:\Documents and Settings\User\Local Settings\Temp\RarSFX0\m.url562010.01.01 08:45:01.6122009.01.12 15:12:47.0152009.01.12 15:12:47.0150x20
C:\WINDOWS\system32\360WDtray.exe163842009.12.31 15:31:58.0002009.12.31 15:31:58.0002009.01.12 15:12:47.9210x20
• Files Changed• Files Deleted• Directories Hidden• Files Hidden• Drivers Loaded• Drivers Unloaded• Processes Created
PIdProcess NameImage Name
0x4ecIEXPLORE.EXEC:\Program Files\Internet Explorer\iexplore.exe
0x724360WDtray.exeC:\WINDOWS\system32\360WDtray.exe
• Processes Terminated• Threads Created
PIdProcess NameTIdStartStart MemWin32 StartWin32 Start Mem
0x2aclsass.exe0x2980x7c810856MEM_IMAGE0x77e76bf0MEM_IMAGE
0x348svchost.exe0xf80x7c810856MEM_IMAGE0x7c910760MEM_IMAGE
0x3f4svchost.exe0x67c0x7c810856MEM_IMAGE0x77e76bf0MEM_IMAGE
0x4ecIEXPLORE.EXE0x4640x7c810867MEM_IMAGE0x402451MEM_IMAGE
0x724360WDtray.exe0x6100x7c810867MEM_IMAGE0x40a001MEM_IMAGE
• Modules Loaded
PIdProcess NameBaseSizeFlagsImage Name
0x348svchost.exe0x76fd00000x7f0000x800c4004C:\WINDOWS\system32\CLBCATQ.DLL
0x348svchost.exe0x770500000xc50000x800c4006C:\WINDOWS\system32\COMRes.dll
0x348svchost.exe0x77b400000x220000x800c4004C:\WINDOWS\system32\Apphelp.dll
• Windows Api Calls• DNS Queries
DNS Query Text
www.666t.com IN A +
• HTTP Queries
HTTP Query Text
www.666t.com GET /index3.htm HTTP/1.1
• Verdict
Auto Analysis Verdict
Suspicious
• Description
Suspicious Actions Detected
Creates files in windows system directory
• Mutexes  Created or Opened
PIdImage NameAddressMutex Name
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x76ee3a34RasPbFile
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x771ba3ae_!MSFTHISTORY!_
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x771bc21cWininetConnectionMutex
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x771bc23dWininetProxyRegistryMutex
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x771bc2ddWininetStartupMutex
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x771d9710c:!documents and settings!user!cookies!
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x771d9710c:!documents and settings!user!local settings!history!history.ie5!
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x771d9710c:!documents and settings!user!local settings!temporary internet files!content.ie5!
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x777904d3WininetStartupMutex
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x77f76e78Shell.CMruPidlList
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x7c81a838ShimCacheMutex
0x684C:\TEST\sample.exe0x77f76e78_SHuassist.mtx
0x684C:\TEST\sample.exe0x7c81a838ShimCacheMutex
• Events Created or Opened
PIdImage NameAddressEvent Name
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x769c4ec2Global\userenv:  User Profile setup event
0x4ecC:\Program Files\Internet Explorer\iexplore.exe0x77de5f48Global\SvcctrlStartEvent_A3752DX
0x684C:\TEST\sample.exe0x769c4ec2Global\userenv:  User Profile setup event
0x684C:\TEST\sample.exe0x77a89422Global\crypt32LogoffEvent
0x684C:\TEST\sample.exe0x7ca66917ShellCopyEngineRunning
0x684C:\TEST\sample.exe0x7ca66957ShellCopyEngineFinished
0x724C:\WINDOWS\system32\360WDtray.exe0x7473d2a8CTF.ThreadMIConnectionEvent.00000628.00000000.00000005
0x724C:\WINDOWS\system32\360WDtray.exe0x7473d2a8CTF.ThreadMarshalInterfaceEvent.00000628.00000000.00000005
0x724C:\WINDOWS\system32\360WDtray.exe0x7473d2a8MSCTF.SendReceive.Event.ICG.IC
0x724C:\WINDOWS\system32\360WDtray.exe0x7473d2a8MSCTF.SendReceiveConection.Event.ICG.IC
wsc47621
发表于 2010-1-2 09:37:40 | 显示全部楼层
回報紅傘~
username
发表于 2010-1-2 09:52:32 | 显示全部楼层
这是压缩包啊
不过是自解的= =
po几个关键的

2010-1-2 09:48:41    创建文件    允许
进程: d:\emule\病毒样本\2009142o0122210762\65642.exe
目标: C:\WINDOWS\system32\360WDtray.exe
规则: [文件组][A]所有执行文件_ -> [文件]*; *.exe

2010-1-2 09:48:54    修改注册表值    阻止
进程: d:\emule\病毒样本\2009142o0122210762\65642.exe
目标: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell
值: explorer.exe,C:\WINDOWS\system32\360WDtray.exe
规则: [注册表组]WinLogon -> [注册表]*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon*

2010-1-2 09:49:26    创建文件    阻止
进程: c:\windows\system32\360wdtray.exe
目标: C:\网络赚钱宝典.url
规则: [文件组][A]系统关键文件_自订 -> [文件]?:\

2010-1-2 09:49:28    创建文件    阻止
进程: c:\windows\system32\360wdtray.exe
目标: C:\美女视频表演免费试看.url
规则: [文件组][A]系统关键文件_自订 -> [文件]?:\
humy123456
发表于 2010-1-2 11:00:33 | 显示全部楼层
11楼天书~
星空下的吻
发表于 2010-1-2 11:51:52 | 显示全部楼层
360 miss
hddu
发表于 2010-1-2 12:26:26 | 显示全部楼层
费尔 miss
囧神
头像被屏蔽
发表于 2010-1-2 12:41:29 | 显示全部楼层
囧,过a-squared 扫描版~ 不过被马马屠准确拦截。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
twtpy93123
发表于 2010-1-2 13:07:23 | 显示全部楼层
过kis2010,主防提示,同意运行后弹出网页http://xxx.666t.com/index3.htm
tomofood
发表于 2010-1-2 13:20:27 | 显示全部楼层
13楼正解,过红伞,但被 comodo拦截
aassddffgg961
发表于 2010-1-2 13:24:07 | 显示全部楼层
NOD报警了
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2026-4-20 06:10 , Processed in 0.073191 second(s), 4 queries , Redis On.

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表