文件: stkhost.exe
大小: 933888 字节
MD5: E3BE9940343FD192D2B776C475B51F8F
SHA1: E4DC1911DEAD472646DE7C839A2AB3AA444A6D04
CRC32: DFD2F124
加壳类型: Armadillo
编写语言: 不详
简单行为分析:
创建文件:
%system32%\Drivers\npf.sys
%system32%\packet.dll
%system32%\stkhost.exe
%system32%\wpcap.dll
%Documents and Settings%\All Users\Application Data\TEMP\466F9D5D.TMP
加载npf.sys安装驱动程序:
HKLM\SYSTEM\CurrentControlSet\Services\NPF: "%system32%\drivers\npf.sys";
删除注册表破坏windows自动更新:
HKLM\SYSTEM\ControlSet001\Services\wuauserv
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv;
运行%system32%\stkhost.exe并退出自身进程,完成以下行为:
添加注册表启动项:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Keyboard Driver: "stkhost.exe"
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices: "stkhost.exe";
添加注册表值:
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\Instance\InitPropertyBag\CLSID: "{13709620-C279-11CE-A49E-444553540000}"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\Instance\InitPropertyBag\command: "@shell32.dll,-12708"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\Instance\InitPropertyBag\method: "FindFiles"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\shellex\ContextMenuHandlers\{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}\: ""
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\shellex\MayChangeDefaultMenu\: ""
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\zptotxwOw\: "nCwOFEfFLXqzc@tKwLTEb~IJ}IyC]ZU"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\zboyfhOoAHs\: "PUlidlXfz@t^}EINKV~hoaGY~"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\ShellFolder\Attributes: 0x00000000
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\mCkwx\: "kOOLSfzRjjHxpvC{F"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\lwxbAbhuoa\: "}hz{Cq]Dk^ce|\~tINaj\F\JTddi"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\kNcnnjb\: "K\FSWQ^]kcPiiZPriLDfmsDvCTA@Ao@d"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\jIdqcD\: "Zmyd"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\Instance\CLSID: "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\InProcServer32\: "%SystemRoot%\system32\shdocvw.dll"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\InProcServer32\ThreadingModel: "Apartment"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\DefaultIcon\: "%SystemRoot%\system32\shell32.dll,-23"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\DbdxwX\: "tb}uZhkwdnyoABOoCWeWKKPQgzT"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\: "搜索"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\LocalizedString: "@explorer.exe,-7020"
HKLM\SOFTWARE\Classes\CLSID\{CD363BEC-7150-B887-530D-5F3E2E0424EA}\InfoTip: "@explorer.exe,-7000";
修改注册表:
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous: "00000001";
启用服务:
RemoteAccess
Router;
出站TCP访问:
193.202.63.20 (ns3.belcom.hu):1311 (rxmon)
删除原文件;
手工清理:
1.结束进程stkhost.exe;
2.删除文件:
%system32%\Drivers\npf.sys
%system32%\packet.dll
%system32%\stkhost.exe
%system32%\wpcap.dll
%Documents and Settings%\All Users\Application Data\TEMP\466F9D5D.TMP
3.删除注册表:
HKLM\SYSTEM\CurrentControlSet\Services\NPF
HKLM\SYSTEM\ControlSet001\Services\wuauserv
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv;;
4.在注册表添加新键和值:
HKLM\SYSTEM\ControlSet001\Services\wuauserv\Security\Security: 01 00 14 80 78 00 00 00 84 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 00 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 48 00 03 00 00 00 00 00 14 00 9D 00 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 FF 01 0F 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\ControlSet001\Services\wuauserv\Parameters\ServiceDll: "C:\WINDOWS\system32\wuauserv.dll"
HKLM\SYSTEM\ControlSet001\Services\wuauserv\Type: 0x00000020
HKLM\SYSTEM\ControlSet001\Services\wuauserv\Start: 0x00000004
HKLM\SYSTEM\ControlSet001\Services\wuauserv\ErrorControl: 0x00000001
HKLM\SYSTEM\ControlSet001\Services\wuauserv\ImagePath: "%systemroot%\system32\svchost.exe -k netsvcs"
HKLM\SYSTEM\ControlSet001\Services\wuauserv\DisplayName: "自动更新"
HKLM\SYSTEM\ControlSet001\Services\wuauserv\ObjectName: "LocalSystem"
HKLM\SYSTEM\ControlSet001\Services\wuauserv\Description: "启用下载和安装 Windows 更新。如果此服务被禁用,这台计算机将无法使用“自动更新”功能和 Windows Update 网站。"
HKLM\SYSTEM\CurrentControlSet\Services\KmxFile\CreatedFilesTimestamp\C:\Documents and Settings\Administrator\Local Settings\Temp\Perflib_Perfdata_d78.dat: A0 53 B3 ED 8F 3D C9 01 B8 E2 E0 85 10 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\Security\Security: 01 00 14 80 78 00 00 00 84 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 00 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 48 00 03 00 00 00 00 00 14 00 9D 00 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 FF 01 0F 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\Parameters\ServiceDll: "C:\WINDOWS\system32\wuauserv.dll"
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\Type: 0x00000020
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\Start: 0x00000004
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\ImagePath: "%systemroot%\system32\svchost.exe -k netsvcs"
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\DisplayName: "自动更新"
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\ObjectName: "LocalSystem"
HKLM\SYSTEM\CurrentControlSet\Services\wuauserv\Description: "启用下载和安装 Windows 更新。如果此服务被禁用,这台计算机将无法使用“自动更新”功能和 Windows Update 网站。"
5.修改注册表:
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous: "00000000";
6.视个人使用情况决定启用或禁用以下服务:
RemoteAccess
Router;
注:%System32%是一个可变路径。病毒通过查询操作系统来决定当前System文件夹的位置。
%Windir% WINDODWS所在目录
%DriveLetter% 逻辑驱动器根目录
%ProgramFiles% 系统程序默认安装目录
%HomeDrive% 当前启动的系统的所在分区
%Documents and Settings% 当前用户文档根目录
%Temp% \Documents and Settings
\当前用户\Local Settings\Temp
%System32% 系统的 System32文件夹
Windows2000/NT中默认的安装路径是C:\Winnt\System32
windows95/98/me中默认的安装路径是C:\Windows\System
windowsXP中默认的安装路径是C:\Windows\System