zoukankan      html  css  js  c++  java
  • 魔兽盗号样本bigfoot2分析

    运行后连续释放以下文件并运行:

    "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\T200645150560000027841\BigFoot.exe"

    "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\T200646380243000028112\BigFoot.exe"

    "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\T200647210381000028253\BigFoot.exe"

    其中第一个是正常的大脚程序,后面的两个均是捆绑的恶意程序。

    第一个恶意程序(第二个exe)较小:41KB,MD5:c0097ebdfca5250cc18c6888202ed154

    第二个恶意程序(第三个exe)较大:232KB,MD5:6c20ad3c3023f26af774d4b5dbecdb0d

    首先分析第二个恶意程序:

    解压自身资源段中的代码,以覆盖的方式写入系统dll"C:\WINDOWS\system32\msxmlfilta.dll"中,创建注册表:

    0012FC74   80000001  |hKey = HKEY_CURRENT_USER
    0012FC78 00920878 |Subkey = "Software\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-F46FB2FBAAA1}"
    0012FC7C 00000000 |Reserved = 0
    0012FC80 0002001F |Access = KEY_QUERY_VALUE|KEY_SET_VALUE|KEY_CREATE_SUB_KEY|KEY_ENUMERATE_SUB_KEYS|KEY_NOTIFY|20000
    0012FC84 0012FC8C \pHandle = 0012FC8C
    "DisplayName"  

    00401F21 |. 68 D8834000 push bigfoot_.004083D8 ; ASCII "http://www.baidu.com//s?wd={searchTerms}&rls=com.microsoft:{language}&ie={inputEncoding}&oe={outputEncoding}&tn=s001_dg&cl=3"
    00401F26 |. 68 D0834000 push bigfoot_.004083D0 ; ASCII "URL"
    00401626  |.  FF15 08804000 call dword ptr ds:[<&ADVAPI32.RegCreateK>; \RegCreateKeyExA

    0012FC54 80000000 |hKey = HKEY_CLASSES_ROOT
    0012FC58 00920878 |Subkey = "CLSID\{21C0F86B-4348-4C88-AF0C-9149DE70E132}"
    0012FC5C 00000000 |Reserved = 0
    0012FC60 00000000 |Class = NULL
    0012FC64 00000000 |Options = REG_OPTION_NON_VOLATILE
    0012FC68 0002001F |Access = KEY_QUERY_VALUE|KEY_SET_VALUE|KEY_CREATE_SUB_KEY|KEY_ENUMERATE_SUB_KEYS|KEY_NOTIFY|20000
    0012FC6C 00000000 |pSecurity = NULL
    0012FC70 0012FC7C |pHandle = 0012FC7C
    0012FC74 0012FC98 \pDisposition = 0012FC98
    00401FC7  |.  68 8C834000   push bigfoot_.0040838C                   ;  ASCII "Windows HttpFilter"


    00401FDC |. 68 64834000 push bigfoot_.00408364 ; ASCII "{73A7FFA7-AA3A-49E5-A777-713B7DB78E9C}"
    00401FE1 |. 68 54814000 push bigfoot_.00408154 ; ASCII "AppID"

    0012FC98 00920878 |Arg2 = 00920878 ASCII "CLSID\{21C0F86B-4348-4C88-AF0C-9149DE70E132}\InprocServer32"

    SET "C:\WINDOWS\system32\msxmlfilta.dll"
    0040209B  |.  68 58834000   push bigfoot_.00408358                   ;  ASCII "Apartment"
    004020A0 |. 68 48834000 push bigfoot_.00408348 ; ASCII "ThreadingModel"

    004020BD |> \68 14834000 push bigfoot_.00408314 ; ASCII "CLSID\{21C0F86B-4348-4C88-AF0C-9149DE70E132}\ProgID"

    0040213B |. 68 FC824000 push bigfoot_.004082FC ; ASCII "MsHttpApp.HttpFilter.1"


    0040215D |> \68 C0824000 push bigfoot_.004082C0 ; ASCII "CLSID\{21C0F86B-4348-4C88-AF0C-9149DE70E132}\Programmable"

    004021C6 |> \68 88824000 push bigfoot_.00408288 ; ASCII "CLSID\{21C0F86B-4348-4C88-AF0C-9149DE70E132}\TypeLib"

    00402244 |. 68 60824000 push bigfoot_.00408260 ; ASCII "{04F7BD61-E11D-4BB3-B6FE-B730BCA713D4}"

    00402266 |> \68 18824000 push bigfoot_.00408218 ; ASCII "CLSID\{21C0F86B-4348-4C88-AF0C-9149DE70E132}\VersionIndependentProgID"

    004022E4 |. 68 00824000 push bigfoot_.00408200 ; ASCII "MsHttpApp.HttpFilter"

    00402306 |> \68 20854000 push bigfoot_.00408520 ; ASCII "PROTOCOLS\Name-Space Handler\http\{21C0F86B-4348-4C88-AF0C-9149DE70E132}"

    00402384 |. 68 F0814000 push bigfoot_.004081F0 ; ASCII "ms http handle"
    00402389 |. 68 00854000 push bigfoot_.00408500
    0040238E |. 8D4C24 1C lea ecx,dword ptr ss:[esp+1C]
    00402392 |. E8 59F3FFFF call bigfoot_.004016F0
    00402397 |. 6A 01 push 1
    00402399 |. 68 C8814000 push bigfoot_.004081C8 ; ASCII "{21C0F86B-4348-4C88-AF0C-9149DE70E132}"
    0040239E |. 68 4C814000 push bigfoot_.0040814C ; ASCII "CLSID"

    004023B4 |. 6A 04 push 4 ; /BufSize = 4
    004023B6 |. 8D5424 18 lea edx,dword ptr ss:[esp+18] ; |
    004023BA |. 52 push edx ; |Buffer
    004023BB |. 6A 04 push 4 ; |ValueType = REG_DWORD
    004023BD |. 53 push ebx ; |Reserved
    004023BE |. 68 14854000 push bigfoot_.00408514 ; |ValueName = "Last"
    004023C3 |. 56 push esi ; |hKey
    004023C4 |. 894C24 2C mov dword ptr ss:[esp+2C],ecx ; |
    004023C8 |. FF15 10804000 call dword ptr ds:[<&ADVAPI32.RegSetValu>; \RegSetValueExA


    这个不知道是不是BHO,还是类似的东西?

    覆写后的msxmlfilta.dll文件MD5:39d40d074eb693ca06ca35e435f29d9b,发现里面有以下字符串:

    http://www.go2easy.com/iso/
    http://www.sogou.com/features/ip.jsp
    所在位置:北京

    搜索了下,找到一篇文章:

    ie7 ie8地址栏搜索被劫持到百度联盟:
    http://www.fh.net.cn/home-space-uid-726-do-blog-id-4375.html

    看来分析于此类似,说是浏览器的搜索劫持,详细请查看原文链接。里面的两个网址,一个是“Windows加密大师”的,一个是搜狗的,看来冠冕堂皇的背后却在悄悄地做着流氓的勾当。

    ----------------------------------------------分割线-----------------------------------------

    下面分析第一个恶意程序,较小的那个,也是比较难分析的。

    该exe遍历查找名为“.Wpack”的节,经过解密处理。获取当前进程路径并以挂起的方式创建一个新的进程,然后将上面解密后的代码写到新进程的内存空间,

    然后唤醒进程。

    这个过程不是很好分析,为此我写了一个api跟踪的dll来监视api调用的流程,以下是输出信息:

    00000009    0.11675199    [592] GetCurrentProcess    
    00000010 0.11732692 [592] VirtualProtect
    00000011 0.11738782 [592] FlushInstructionCache
    00000012 0.12691809 [592] WSAGetLastError
    00000013 0.12713823 [592] RegOpenKeyExW:Software\Microsoft\Windows NT\CurrentVersion\Diagnostics
    00000014 0.12747011 [592] GetModuleFileNameW:C:\WINDOWS\system32\msvcrt.dll
    00000015 0.12754218 [592] RegOpenKeyExW:SYSTEM\Setup
    00000016 0.19361930 [592] GetModuleFileNameW:C:\WINDOWS\system32\SHELL32.dll
    00000017 0.19382073 [592] LoadLibraryW:comctl32.dll
    00000018 0.22545603 [592] CreateFileW(C:\WINDOWS\WindowsShell.Manifest,80000000,00000005,00000000,00000003,00000000,00000000)
    00000019 0.22575998 [592] RegOpenKeyExW:Control Panel\Desktop
    00000020 0.22588485 [592] RegOpenKeyExW:software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
    00000021 0.22631508 [592] RegOpenKeyExW:Software\Microsoft\Windows NT\CurrentVersion\LanguagePack
    00000022 0.22653298 [592] LoadLibraryW:comctl32.dll
    00000023 0.22662266 [592] GetVersionExA
    00000024 0.22688806 [592] HeapCreate
    00000025 0.22694673 [592] GetModuleHandleA
    00000026 0.22699533 [592] InitializeCriticalSectionAndSpinCount
    00000027 0.22703835 [592] TlsAlloc
    00000028 0.22709143 [592] GetCommandLineA
    00000029 0.22717887 [592] GetEnvironmentStringsW
    00000030 0.22723000 [592] WideCharToMultiByte
    00000031 0.22733755 [592] FreeEnvironmentStringsW
    00000032 0.22737974 [592] GetStartupInfoA
    00000033 0.22742221 [592] GetStdHandle
    00000034 0.22746550 [592] GetFileType
    00000035 0.22755072 [592] LockResource
    00000036 0.22759373 [592] GetCPInfo
    00000037 0.22764011 [592] MultiByteToWideChar
    00000038 0.22769095 [592] LCMapStringW
    00000039 0.22773927 [592] GetModuleFileNameA
    00000040 0.22779627 [592] GetModuleFileNameW:C:\Documents and Settings\Administrator\桌面\bigfoot_1.exe
    00000041 0.22786835 [592] DisableThreadLibraryCalls
    00000042 0.22792730 [592] GetModuleFileNameW:C:\WINDOWS\system32\comctl32.dll
    00000043 0.23956089 [592] CreateActCtxW
    00000044 0.23967655 [592] ProcessIdToSessionId
    00000045 0.23973075 [592] RegisterClipboardFormatW
    00000046 0.23979360 [592] SystemParametersInfoW
    00000047 0.23984417 [592] GetSystemMetrics
    00000048 0.24003386 [592] RegOpenCurrentUser
    00000049 0.24015650 [592] OpenProcessToken
    00000050 0.24020930 [592] AllocateAndInitializeSid
    00000051 0.24025959 [592] CheckTokenMembership
    00000052 0.24030988 [592] FreeSid
    00000053 0.24036379 [592] RegOpenKeyExW:Control Panel\Desktop
    00000054 0.24041463 [592] RegQueryValueExW
    00000055 0.24049397 [592] RegCloseKey
    00000056 0.24053727 [592] GetSysColor
    00000057 0.24057890 [592] GetSysColorBrush
    00000058 0.24066047 [592] GetStockObject
    00000059 0.24073562 [592] LoadLibraryW:imm32.dll
    00000060 0.24077949 [592] ActivateActCtx
    00000061 0.24083062 [592] LoadCursorW
    00000062 0.24122563 [592] RegisterClassW
    00000063 0.24131754 [592] DeactivateActCtx
    00000064 0.24138822 [592] GetModuleFileNameW:C:\Documents and Settings\Administrator\桌面\bigfoot_1.exe
    00000065 0.24143180 [592] GetModuleFileNameW:C:\Documents and Settings\Administrator\桌面\bigfoot_1.exe
    00000066 0.24148795 [592] GetTempPathA
    00000067 0.24153125 [592] DeleteFileA:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsad11.exe
    00000068 0.24159327 [592] CopyFileA:C:\Documents and Settings\Administrator\桌面\bigfoot_1.exe -> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsad11.exe
    00000069 0.24200618 [592] CreateFileW(C:\Documents and Settings\Administrator\桌面\bigfoot_1.exe,80000000,00000001,00000000,00000003,08200000,00000000)
    00000070 0.24209110 [592] CreateFileW(DBWIN_DATA_READY,80000000,00000003,00000000,00000003,08200000,00000000)
    00000071 0.24215676 [592] CreateFileW(DBWIN_DATA_READY,80000000,00000001,00000000,00000003,08000000,00000000)
    00000072 0.24221683 [592] CreateFileW(DBWIN_DATA_READY,80000000,00000003,00000000,00000003,08000000,00000000)
    00000073 0.24227074 [592] LoadLibraryA:Kernel32.dll
    00000074 0.24232325 [592] LoadLibraryA:ADVAPI32.dll
    00000075 0.24236795 [592] GetSystemDirectoryA
    00000076 0.24244115 [592] RegOpenKeyExA
    00000077 0.24247187 [592] Sleep
    00000078 0.73963284 [592] CreateRemoteThread
    00000079 0.73989373 [592] CreateThread
    00000080 0.74028265 [592] ApiTracer: DllMain DLL_THREAD_ATTACH
    00000081 0.74034411 [592] FindWindowA
    00000082 0.74090648 [592] ApiTracer: DllMain DLL_THREAD_ATTACH
    00000083 0.77042723 [592] FindResourceA
    00000084 0.77049428 [592] LoadResource
    00000085 0.77063507 [592] SizeofResource
    00000086 0.77072144 [592] CreateFileA(C:\WINDOWS\system32\wksbqizm.tmp,C0000000,00000000,00000000,00000002,00000000,00000000)
    00000087 0.77402937 [592] CreateFileW(C:\WINDOWS\system32\wksbqizm.tmp,C0000000,00000000,00000000,00000002,00000000,00000000)
    00000088 0.77412099 [592] FreeResource
    00000089 0.77417547 [592] CreateFileA(C:\WINDOWS\system32\wksbqizm.tmp,40000000,00000002,00000000,00000003,00000000,00000000)
    00000090 0.77419758 [592] CreateFileW(C:\WINDOWS\system32\wksbqizm.tmp,40000000,00000002,00000000,00000003,00000000,00000000)
    00000091 0.77429843 [592] GetTickCount
    00000092 0.78551579 [592] SetFilePointer
    00000093 0.87909049 [592] CreateFileA(C:\Documents and Settings\Administrator\桌面\bigfoot_1.exe,80000000,00000001,00000000,00000003,00000000,00000000)
    00000094 0.87923717 [592] CreateFileW(C:\Documents and Settings\Administrator\桌面\bigfoot_1.exe,80000000,00000001,00000000,00000003,00000000,00000000)
    00000095 0.87932491 [592] ReadFile
    00000096 0.87938887 [592] GetSystemTime
    00000097 0.88373411 [592] SystemTimeToFileTime
    00000098 0.88379222 [592] CreateFileA(C:\WINDOWS\system32\wksbqizm.tmp,C0000000,00000001,00000000,00000003,00000000,00000000)
    00000099 0.88384420 [592] CreateFileW(C:\WINDOWS\system32\wksbqizm.tmp,C0000000,00000001,00000000,00000003,00000000,00000000)
    00000100 0.88392186 [592] SetFileTime
    00000101 0.88457751 [592] RegOpenKeyA
    00000102 0.88471860 [592] MoveFileExA:C:\WINDOWS\system32\wksbqizm.tmp -> C:\WINDOWS\system32\wksbqizm.dll
    00000103 0.88485968 [592] ApiTracer: DllMain DLL_THREAD_ATTACH
    00000104 0.88863558 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000105 0.88909096 [592] RegCreateKeyA:InProcServer32
    00000106 0.88920158 [592] MoveFileExA:C:\WINDOWS\system32\wksbqizm.tmp -> C:\WINDOWS\system32\wksbqizm.dll
    00000107 0.89008576 [592] GetFileAttributesA
    00000108 0.89016062 [592] MoveFileExA:C:\WINDOWS\system32\wksbqizm.tmp -> C:\WINDOWS\system32\wksbqizm.dll
    00000109 0.89029777 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000110 0.89063919 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000111 0.89359456 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000112 0.89365548 [592] SleepEx
    00000113 0.89430809 [592] RegQueryValueExA
    00000114 0.89451480 [592] RegSetValueExA:wksbqizm.dll,data:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000115 0.89493579 [592] RegSetValueExA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C},data:(null)
    00000116 2.89548540 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000117 2.89559031 [592] RegCreateKeyA:InProcServer32
    00000118 2.89567256 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000119 2.89587092 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000120 2.89598632 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000121 4.87972498 [592] WinExec:
    00000122 4.89684963 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000123 4.89699173 [592] RegCreateKeyA:InProcServer32
    00000124 4.89707708 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000125 4.89712191 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000126 4.89718342 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000127 6.89585352 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000128 6.89605188 [592] RegCreateKeyA:InProcServer32
    00000129 6.89613724 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000130 6.89618254 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000131 6.89624643 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000132 8.89569187 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000133 8.89588070 [592] RegCreateKeyA:InProcServer32
    00000134 8.89596558 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000135 8.89601040 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000136 8.89607334 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000137 10.89583778 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000138 10.89595222 [592] RegCreateKeyA:InProcServer32
    00000139 10.89612103 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000140 10.89617062 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000141 10.89623356 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000142 12.89584446 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000143 12.89597225 [592] RegCreateKeyA:InProcServer32
    00000144 12.89622688 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000145 12.89627838 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000146 12.89634323 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000147 14.89621544 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000148 14.89632416 [592] RegCreateKeyA:InProcServer32
    00000149 14.89640522 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000150 14.89644814 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000151 14.89651489 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000152 16.89616394 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000153 16.89627457 [592] RegCreateKeyA:InProcServer32
    00000154 16.89635468 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000155 16.89640045 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000156 16.89646339 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000157 18.89614105 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000158 18.89632607 [592] RegCreateKeyA:InProcServer32
    00000159 18.89640999 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000160 18.89645576 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000161 18.89651871 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000162 20.89516830 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000163 20.89536476 [592] RegCreateKeyA:InProcServer32
    00000164 20.89544868 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000165 20.89549446 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000166 20.89555550 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000167 22.89520454 [592] RegCreateKeyA:{B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    00000168 22.89532471 [592] RegCreateKeyA:InProcServer32
    00000169 22.89548683 [592] RegSetValueA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000170 22.89553642 [592] RegSetValueExA:(null),data:C:\WINDOWS\system32\wksbqizm.dll
    00000171 22.89560127 [592] RegSetValueExA:ThreadingModel,data:Apartment
    00000172 24.88182449 [592] GetTempFileNameA
    00000173 24.88211632 [592] CreateFileW(C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\1.tmp,80000000,00000000,00000000,00000001,00000080,00000000)
    00000174 24.88360977 [592] GetModuleFileNameW:C:\Documents and Settings\Administrator\桌面\bigfoot_1.exe
    00000175 24.88372803 [592] CreateFileA(C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\1.tmp.bat,40000000,00000003,0012F4A0,00000002,00000080,00000000)
    00000176 24.88378334 [592] CreateFileW(C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\1.tmp.bat,40000000,00000003,0012F4A0,00000002,00000080,00000000)
    00000177 24.88984871 [592] WinExec: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\1.tmp.bat
    00000178 24.89008331 [592] CreateFileW(C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\1.tmp.bat,80000000,00000003,00000000,00000003,00000080,00000000)
    00000179 24.89018250 [592] TerminateProcess

    可以看出释放的文件有:

    C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsad11.exe

    C:\WINDOWS\system32\wksbqizm.tmp

    C:\WINDOWS\system32\wksbqizm.dll

    C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\1.tmp.bat

    创建的注册表:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks
    {B38E77C6-E3E1-4b0f-BC51-6A8352868C4C}
    {B38E77C6-E3E1-4b0f-BC51-6A8352868C4C} :C:\WINDOWS\system32\wksbqizm.dll

    某次截获的"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\1.tmp.bat"文件内容:

    :try
    del "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsad11.exe"
    if exist "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsad11.exe" goto try
    del %0

    是为了实现自删除的。


    下面主要wksbqizm.dll,这个dll的防静态分析做得很好,OD搜索不到任何字符串,字符串全部用双字一组组写入。

    如果是在"verclsid.exe"进程中就安装钩子,0006F598 0006F6A8 ASCII "verclsid.exe"。

    10003EBE    A1 A4880010     mov eax,dword ptr ds:[100088A4]
    10003EC3 8B35 B4600010 mov esi,dword ptr ds:[<&USER32.SetWindowsHookExA>] ; USER32.SetWindowsHookExA
    10003EC9 6A 00 push 0
    10003ECB 50 push eax
    10003ECC 68 40400010 push 1.10004040
    10003ED1 6A 07 push 7
    10003ED3 FFD6 call esi
    10003ED5 8B0D A4880010 mov ecx,dword ptr ds:[100088A4]
    10003EDB 6A 00 push 0
    10003EDD 51 push ecx
    10003EDE 68 60400010 push 1.10004060
    10003EE3 6A 02 push 2
    10003EE5 A3 B0880010 mov dword ptr ds:[100088B0],eax
    10003EEA FFD6 call esi
    10003EEC 8B15 A4880010 mov edx,dword ptr ds:[100088A4]
    10003EF2 6A 00 push 0
    10003EF4 52 push edx
    10003EF5 68 20400010 push 1.10004020
    10003EFA 6A 04 push 4
    10003EFC A3 A8880010 mov dword ptr ds:[100088A8],eax
    10003F01 FFD6 call esi

    安装钩子主要是为了实现全局注入的,如果发现当前进程为:"360safebox.exe"、"safeboxTray.exe"则调用:

    1000114B |> \53 push ebx ; /ExitCode
    1000114C |. FF15 00600010 call dword ptr ds:[<&KERNEL32.GetCurrentProcess>] ; |[GetCurrentProcess
    10001152 |. 50 push eax ; |hProcess
    10001153 |. FF15 4C600010 call dword ptr ds:[<&KERNEL32.TerminateProcess>] ; \TerminateProcess

    如果是在explorer进程中创建两个线程,并创建事件进行通信。0006F598 0006F628 ASCII "Explorer.exe"

    这种利用事件通信的方式类似于双进程保护一样,这样确保dll不太容易被删除。

    下面到了重点,如果是在魔兽进程中:

    0006F634 0006F63C \s2 = "wow.exe"

    跟进去看,MD被vm掉了,于是乎就写api监控,结果只在里面拦截到了获取ws32里面的connect函数,其他的api没有断下。

    于是乎没有下文了……

    但是可以断定这是个魔兽的木马。











  • 相关阅读:
    使用 Sublime、WebStorm 开发 Jade
    3-微信小程序开发(小程序的目录结构说明)
    1-微信小程序开发(安装软件和运行第一个微信小程序)
    29-ESP8266 SDK开发基础入门篇--编写TCP 客户端程序(Lwip RAW模式,非RTOS版,精简入门)
    28-ESP8266 SDK开发基础入门篇--编写wifi模块TCP 客户端程序(官方API版,非RTOS版)
    27-ESP8266 SDK开发基础入门篇--编写Android SmartConfig一键配网程序
    26-ESP8266 SDK开发基础入门篇--编写WIFI模块 SmartConfig/Airkiss 一键配网
    25-ESP8266 SDK开发基础入门篇--控制WIFI连接路由器
    17-网页,网站,微信公众号基础入门(使用Adobe Dreamweaver CS6 制作网页/网站)
    15-网页,网站,微信公众号基础入门(网页版MQTT,做自己的MQTT调试助手)
  • 原文地址:https://www.cnblogs.com/daxingxing/p/2294744.html
Copyright © 2011-2022 走看看