12
返回列表 发新帖
楼主: 至高神
收起左侧

[可疑文件] 高质量还是无害?求鉴定

[复制链接]
hx1997
发表于 2011-4-4 02:02:57 | 显示全部楼层
确实是盗号的 - -
小心啊小心
最近不给力啊
Oxalis 扫描日志

扫描设置
启发式分析(Detective): 打开
云扫描(Cloud): 云 1、云 2 启用

扫描目标: G:\Documents and Settings\Administrator.HX-C0987054243B\桌面\sample.exe

扫描于 2011-4-4 1:59:58 开始。

共计 0 个威胁。
共计 1 个对象。
扫描于 8 秒内完成。
扫描于 2011-4-4 2:00:06 结束。

留侯
发表于 2011-4-5 11:01:48 | 显示全部楼层
大蜘蛛clean,已上报
438194610
发表于 2011-4-8 08:59:58 | 显示全部楼层
金山卫士下载保护报了,360SD右键扫描尽然安全
Hacker29cn
发表于 2011-4-8 09:29:17 | 显示全部楼层
本帖最后由 Hacker29cn 于 2011-4-8 09:30 编辑

Threads Created
PIdProcess NameTIdStartStart MemWin32 StartWin32 Start Mem
0x348svchost.exe0x7840x7c810856MEM_IMAGE0x7c910760MEM_IMAGE
0x420svchost.exe0xdc0x7c810856MEM_IMAGE0x77df9981MEM_IMAGE
• Modules Loaded• Windows Api Calls• DNS Queries
DNS Query Text
www.cyzjy.com IN A +
• HTTP Queries
HTTP Query Text
www.cyzjy.com GET /a/ad.txt HTTP/1.1
• Mutexes Created or Opened
PIdImage NameAddressMutex Name
0xd8C:\TEST\sample.exe0x771ba3ae_!MSFTHISTORY!_
0xd8C:\TEST\sample.exe0x771bc21cWininetConnectionMutex
0xd8C:\TEST\sample.exe0x771bc23dWininetProxyRegistryMutex
0xd8C:\TEST\sample.exe0x771bc2ddWininetStartupMutex
0xd8C:\TEST\sample.exe0x771d9710c:!documents and settings!user!cookies!
0xd8C:\TEST\sample.exe0x771d9710c:!documents and settings!user!local settings!history!history.ie5!
0xd8C:\TEST\sample.exe0x771d9710c:!documents and settings!user!local settings!temporary internet files!content.ie5!
• Events Created or Opened
PIdImage NameAddressEvent Name
0xd8C:\TEST\sample.exe0x77a89422Global\crypt32LogoffEvent


我们发现这个程序触发了Global\crypt32LogoffEvent事件,同时读取了有关c:!documents and settings!user!cookies!的内容,而crypt32LogoffEvent本身就是后门的基础
以下是来自微软的报告

Based on my research, I don't think the "crypt32LogoffEvent" event is
related with locking system. For more information, you may refer to the
following information:

When AuditBaseObjects is enabled, the operating system attaches a default
System Access Control List (SACL) to the object. SACLs are used by Windows
to audit access to files, registry keys, and other objects. When
AuditBaseObjects is disabled, no SACL is attached to newly created system
objects.

When a process requests a handle to an object, the caller must provide a
set of security credentials and a bitmask representing the type of access
required. If the security identity provided by the caller doesn't have the
access rights requested in the call, then the object access fails with
Access Denied. In the failure response, however, the operating system also
returns a bit mask telling the caller what permissions it does have. The
caller can request access again -- this time with a modified access mask --
and get a handle to the object.

This pattern can be seen in the audit logs if both Success and Failure
audits are recorded for object access, and looks similar to the following
events. First, a failure audit is logged:

Event Type: Failure Audit
Event Source: Security
Event Category: Object Access
Event ID: 560
Date: 10/26/2002
Time: 13:53:01
User: RESKIT\Administrator
Computer: SEA-FS-01
Description:
Object Open:
Object Server: Security
Object Type: Event
Object Name: \BaseNamedObjects\crypt32LogoffEvent
New Handle ID: -
Operation ID: {0,156054}
Process ID: 1320
Primary User Name: Administrator
Primary Domain: RESKIT
Primary Logon ID: (0x0,0xB4BE)
Client User Name: -
Client Domain: -
Client Logon ID: -
Accesses DELETE
READ_CONTROL
WRITE_DAC
WRITE_OWNER
SYNCHRONIZE
Query event state
Modify event state

Privileges -



This is followed immediately by a success audit:

Event Type: Success Audit
Event Source: Security
Event Category: Object Access
Event ID: 560
Date: 10/26/2002
Time: 13:53:01
User: RESKIT\Administrator
Computer: SEA-FS-01
Description:
Object Open:
Object Server: Security
Object Type: Event
Object Name: \BaseNamedObjects\crypt32LogoffEvent
New Handle ID: 392
Operation ID: {0,156057}
Process ID: 1320
Primary User Name: Administrator
Primary Domain: RESKIT
Primary Logon ID: (0x0,0xB4BE)
Client User Name: -
Client Domain: -
Client Logon ID: -
Accesses SYNCHRONIZE

Privileges -

In this example, an application with the Process ID of 1320 and running in
the security context of the domain administrator attempted to access the
object \BaseNamedObjects\crypt32LogoffEvent. In the first attempt, the
process requested DELETE, READ_CONTROL, WRITE_DAC, WRITE_OWNER,
SYNCHRONIZE, "Query event state", and "Modify event state" access.
This
request failed because the process had insufficient permissions on this
object. Process 1320 immediately requested another
handle to the same object, but this time it requested only SYNCHRONIZE
access. This request succeeded. Note that the two events occurred within
the same second.

Audit events that match this pattern should be considered by design.
Failure audits that do not match this pattern may indicate that a running
process is attempting access system objects inappropriately. It is
impossible, however, to determine this unless both Success and Failure
object access auditing is enabled in the computer's effective audit policy.

Microsoft recommends that AuditBaseObjects be enabled only if stringent
security requirements of a particular server require this level of
auditing. This setting can be resource intensive in the amount of disk
space required to adequately store the security logs, and also add an
increased administrative burden.

Hope this helps!

Have a nice day!

Sincerely,
Tom Che
Microsoft Online Partner Support
Get Secure! - www.microsoft.com/security

注意红字部分,那是 改变文件读写和访问方式的基础……有鉴于此,我们认为这是一个后门程序的可疑程度很大
再加上金山的病毒报告,建议谨慎使用!
Hacker29cn
发表于 2011-4-8 09:32:40 | 显示全部楼层
回复 14楼 Hacker29cn 的帖子

这是防火墙阻止其访问网络的情况


本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
至高神
 楼主| 发表于 2011-4-8 09:38:42 | 显示全部楼层
回复 14楼 Hacker29cn 的帖子

很详细的分析 ,感谢
Hacker29cn
发表于 2011-4-8 09:40:25 | 显示全部楼层
回复 16楼 phyrus 的帖子

不用客气,应该的,O(∩_∩)O哈哈~
想和你去吹吹风
发表于 2011-4-8 16:49:32 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
qianyuqx
头像被屏蔽
发表于 2011-4-14 12:54:32 | 显示全部楼层
to mse
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-6-14 14:44 , Processed in 0.093332 second(s), 16 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表