瑞星卡卡安全论坛技术交流区可疑文件交流 20.47.32 无反应的 iewoptimem.exe, 疑似灰鸽子

1   1  /  1  页   跳转

20.47.32 无反应的 iewoptimem.exe, 疑似灰鸽子

20.47.32 无反应的 iewoptimem.exe, 疑似灰鸽子


 附件: 您所在的用户组无法下载或查看附件

解压密码: virus

文件说明符 : D:\test\iewoptimem.exe
属性 : A---
M$签名:否
PE文件:是
语言 : 中文(中国)
文件版本 : 3.1.7.613
说明 : Wopti 内存整理
版权 : Copyright (C) 2000-2007 Wopti
产品版本 : 3.1
产品名称 : Wopti 内存整理
公司名称 : 共软网络
合法商标 : Wopti
内部名称 : Wopti Memory Defreg
源文件名 : WoptiMem.exe
创建时间 : 2008-6-5 21:2:8
修改时间 : 2008-6-5 21:2:13
大小 : 230416 字节 225.16 KB
MD5 : 7df8562e7bc081246048678380e1b704
SHA1: 91BC62D1CDBA550E0E95F13F2C6054D1E564323E
CRC32: e39d4e9d

文件 iewoptimem.exe 接收于 2008.06.05 15:07:04 (CET)
反病毒引擎版本最后更新扫描结果
AhnLab-V32008.5.30.12008.06.05-
AntiVir7.8.0.262008.06.05-
Authentium5.1.0.42008.06.05-
Avast4.8.1195.02008.06.05Win32:GrayBird-PY
AVG7.5.0.5162008.06.05Generic10.AEDH
BitDefender7.22008.06.05-
CAT-QuickHeal9.502008.06.04Win32.Packed.NSAnti.r
ClamAV0.92.12008.06.05-
DrWeb4.44.0.091702008.06.05-
eSafe7.0.15.02008.06.04suspicious Trojan/Worm
eTrust-Vet31.6.58502008.06.05-
Ewido4.02008.06.05-
F-Prot4.4.4.562008.06.05-
F-Secure6.70.13260.02008.06.05W32/Suspicious_N.gen
Fortinet3.14.0.02008.06.05-
GData2.0.7306.10232008.06.05Win32:GrayBird-PY
IkarusT3.1.1.26.02008.06.05Backdoor.Win32.GrayBird.EJ
Kaspersky7.0.0.1252008.06.05-
McAfee53102008.06.04-
Microsoft1.36042008.06.05-
NOD32v231612008.06.05-
Norman5.80.022008.06.04W32/Suspicious_N.gen
Panda9.0.0.42008.06.05-
Prevx1V22008.06.05-
Rising20.47.32.002008.06.05-
Sophos4.30.02008.06.05Mal/Packer
Sunbelt3.0.1145.12008.06.05-
Symantec102008.06.05-
TheHacker6.2.92.3352008.06.05-
VBA323.12.6.72008.06.05-
VirusBuster4.3.26:92008.06.04Packed/NSPack
Webwasher-Gateway6.6.22008.06.05Win32.Malware.gen (suspicious)

附加信息
File size: 230416 bytes
MD5...: 7df8562e7bc081246048678380e1b704
SHA1..: 91bc62d1cdba550e0e95f13f2c6054d1e564323e
SHA256: cbae208f7158d7a88085666f0014a0e498bee62c6a03811d73fd1819c1950b25
SHA512: fea635b576360ae30f5b8637ed4d5c84265dbe95a364e3f1a00c5f312732d779<BR>b1fe0558f08d95b3d215fae4b5568c8bba387ed1ca37d9379ca09429f51d55cd
PEiD..: NsPack v3.1 -> North Star (h)
PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x4a71bd<BR>timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 3 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.nsp0 0x1000 0xa3000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<BR>.nsp1 0xa4000 0x39000 0x38010 7.95 1e70be5401b69c07f886ab416881e8a1<BR>.nsp2 0xdd000 0x6d4 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<BR><BR>( 18 imports ) <BR>> KERNEL32.DLL: LoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess<BR>> USER32.DLL: GetKeyboardType<BR>> ADVAPI32.DLL: RegQueryValueExA<BR>> OLEAUT32.DLL: SysFreeString<BR>> KERNEL32.DLL: TlsSetValue<BR>> ADVAPI32.DLL: RegSetValueExA<BR>> KERNEL32.DLL: lstrcpyA<BR>> VERSION.DLL: VerQueryValueA<BR>> GDI32.DLL: UnrealizeObject<BR>> USER32.DLL: CreateWindowExA<BR>> KERNEL32.DLL: Sleep<BR>> OLEAUT32.DLL: SafeArrayPtrOfIndex<BR>> OLE32.DLL: CoTaskMemAlloc<BR>> COMCTL32.DLL: ImageList_SetIconSize<BR>> WINSPOOL.DRV: OpenPrinterA<BR>> SHELL32.DLL: Shell_NotifyIconA<BR>> SHELL32.DLL: SHGetSpecialFolderLocation<BR>> COMDLG32.DLL: ChooseFontA<BR><BR>( 0 exports ) <BR>
packers (Kaspersky): NSPack
packers (F-Prot): NSPack, PE_Patch


用户系统信息:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; Maxthon; .NET CLR 1.1.4322; .NET CLR 2.0.50727)
http://blog.csdn.net/purpleendurer

宠辱不惊,笑看堂前花开花落; 去留无意,漫随天外云卷云舒。
分享到:
gototop
 

回复:20.47.32 无反应的 iewoptimem.exe, 疑似灰鸽子

应该是因NSPack壳误报,正常文件
gototop
 

回复:20.47.32 无反应的 iewoptimem.exe, 疑似灰鸽子

错了, 加花指令了.
我玩鸽子加个跳转瑞星就没办法了,连壳都不用加,加壳只是为了让肉鸡下载省时间而已
gototop
 

回复:20.47.32 无反应的 iewoptimem.exe, 疑似灰鸽子

文件已收
gototop
 

是否是灰鸽子的初步判断方法

先用ESP定律把NSPack的壳给手脱了。附件为脱壳后的程序,压缩包无密码。

脱壳后再提交多引擎病毒扫描,出来的结果如下:

文件 iewoptimem_u.exe 接收于 2008.06.06 05:50:21 (CET)

反病毒引擎版本最后更新扫描结果
AhnLab-V32008.5.30.12008.06.05-
AntiVir7.8.0.262008.06.05-
Authentium5.1.0.42008.06.05-
Avast4.8.1195.02008.06.06Win32:GrayBird-PY
AVG7.5.0.5162008.06.05-
BitDefender7.22008.06.06-
CAT-QuickHeal9.502008.06.05-
ClamAV0.92.12008.06.06-
DrWeb4.44.0.091702008.06.05-
eSafe7.0.15.02008.06.05-
eTrust-Vet31.6.58502008.06.05-
Ewido4.02008.06.05-
F-Prot4.4.4.562008.06.05-
F-Secure6.70.13260.02008.06.06-
Fortinet3.14.0.02008.06.06-
GData2.0.7306.10232008.06.06Win32:GrayBird-PY
IkarusT3.1.1.26.02008.06.06-
Kaspersky7.0.0.1252008.06.06-
McAfee53112008.06.05-
Microsoft1.36042008.06.06-
NOD32v231622008.06.05-
Norman5.80.022008.06.05-
Panda9.0.0.42008.06.05-
Prevx1V22008.06.06-
Rising20.47.32.002008.06.05-
Sophos4.30.02008.06.06-
Sunbelt3.0.1145.12008.06.05-
Symantec102008.06.06-
TheHacker6.2.92.3372008.06.06-
VBA323.12.6.72008.06.05-
VirusBuster4.3.26:92008.06.05-
Webwasher-Gateway6.6.22008.06.06Win32.Malware.gen (suspicious)

附加信息
File size: 914944 bytes
MD5...: f3526ba7f6ad11a18cc39063e1356b6a
SHA1..: c441a85100db092b1fc55473afd125e2f8ef13b5
SHA256: e42f2df688f308f3d4a5a25ac92e89e9db395cdd41df161305edefa44c4aa4b2
SHA512: 8d4b0884144c8399d4656032a2fc847c231fc2a70949c28270d6d080af2c780b<BR>b93da85128ab592dfa1b7a1215eb682144e7514f9054762429d4e18c328c3197
PEiD..: -
PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x484b48<BR>timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 4 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.nsp0 0x1000 0xa3000 0xa3000 5.97 83feacb135e944436365b63c22a8a4cb<BR>.nsp1 0xa4000 0x39000 0x39000 7.89 d73c0f8d6a9875e315b748b300110a90<BR>.nsp2 0xdd000 0x6d4 0x6d4 0.00 6156a687057bd02c80f35ed9155a23c5<BR>.idata2 0xde000 0x2000 0x1e00 5.18 300f4265ca3fcf74d114467d86ae5789<BR><BR>( 17 imports ) <BR>> kernel32.dll: DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlen, lstrcpyn, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle<BR>> USER32.DLL: GetKeyboardType, LoadStringA, MessageBoxA, CharNextA<BR>> ADVAPI32.DLL: RegQueryValueExA, RegOpenKeyExA, RegCloseKey<BR>> OLEAUT32.DLL: SysFreeString, SysReAllocStringLen, SysAllocStringLen<BR>> kernel32.dll: TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA<BR>> ADVAPI32.DLL: RegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegDeleteValueA, RegCreateKeyExA, RegCloseKey, GetUserNameA<BR>> kernel32.dll: lstrcpy, lstrcmp, WritePrivateProfileStringA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetProcessWorkingSetSize, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReleaseMutex, ReadFile, OpenProcess, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalMemoryStatus, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetPrivateProfileStringA, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileAttributesA, GetEnvironmentVariableA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentProcess, GetComputerNameA, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateMutexA, CreateFileA, CreateEventA, CompareStringA, CloseHandle<BR>> VERSION.DLL: VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA<BR>> GDI32.dll: UnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExtTextOutA, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt<BR>> USER32.DLL: CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, SendDlgItemMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterClipboardFormatA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessage, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetAsyncKeyState, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyCursor, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout<BR>> kernel32.dll: Sleep<BR>> OLEAUT32.DLL: SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit<BR>> ole32.dll: CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize<BR>> WINSPOOL.DRV: OpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter<BR>> SHELL32.DLL: Shell_NotifyIcon, ShellAboutA<BR>> SHELL32.DLL: SHGetSpecialFolderLocation, SHGetPathFromIDList, SHGetMalloc<BR>> COMDLG32.DLL: ChooseFontA<BR><BR>( 0 exports ) <BR>

可以看到,之前报毒而现在不报的,显然是报壳的。

剩下只有三家报,两家还是报鸽子,一家报可疑。

那么我们就来先简单判断一下它是不是鸽子。

鸽子,众所周知,是Delphi写的win32服务程序,运行之后复制自身到某个目录(通常为系统目录)下,注册为服务,然后将病毒主体以系统服务的方式启动。

那么,其创建并运行自身服务的过程,必须包括对OpenSCManagerA、CreateServiceA、OpenServiceA、StartServiceA等API的调用。
其程序以服务启动之后,必须调用StartServiceCtrlDispatcherA来将其线程与SCManager相连接,使之能够对系统服务控制的指令进行响应。
在其服务控制响应线程中,必须调用RegisterServiceCtrlHandlerA、SetServiceStatus等API来完成对系统服务控制的响应

以上就是一个灰鸽子作为一个win32服务应用程序,并且作为病毒能够自己创建并启动自身的服务,所必须具有的要件。

以上提到的API,均由ADVAPI32.DLL导出,理应存在于脱壳后文件的输入表。


并且,灰鸽子完成服务功能,所使用的是Delphi提供的TService类,该类对以上这些服务操作进行了封装,使用者在此类的基础上派生自己的服务程序类。在TService类中,以上提到的功能应是一应俱全的,因此这几个API是必然会出现在输入表的。

然而从上述扫描结果可以看到,输入表中并没有出现这几个API。同样的,也不可能全部用GetProcAddress临时获取。

因此,该程序缺乏win32服务应用程序的必要要件,它不但没有创建服务的功能,如以系统服务方式启动该程序,也会在启动后将因为没有注册响应系统服务控制的例程,而被系统中止,从而不可能以服务形式常驻内存。

当然你可以说现在的灰鸽子直接注入IE之后就结束自身了。但是结束自身是它自己退出,而不是因为没有正常的服务响应而被系统强制中止。

综上,通过以上的判断,已经可以断定,该程序不是灰鸽子,杀软的报毒为误报。

附件附件:

您所在的用户组无法下载或查看附件

本帖被评分 1 次
最后编辑轩辕小聪 最后编辑于 2008-06-06 12:51:02
gototop
 

回复:20.47.32 无反应的 iewoptimem.exe, 疑似灰鸽子

嗯, Avast不像某些人传说的这么牛
http://blog.csdn.net/purpleendurer

宠辱不惊,笑看堂前花开花落; 去留无意,漫随天外云卷云舒。
gototop
 

回复:20.47.32 无反应的 iewoptimem.exe, 疑似灰鸽子

Avast取特征码一直有不小的问题,倒是小红伞,总被人说误报高,但却表现越来越好
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT