123   1  /  3  页   跳转

一只隐蔽的灰鸽子winlogon.exe

一只隐蔽的灰鸽子winlogon.exe

这只鸽子提示:中招后,贴日志求助的日子即将结束!做好系统基础安全防护是每个用户的当务之急。“基础安全防护”绝不仅仅是打几个补丁的问题。熟悉一两个性能好的安全软件的使用也是必要的。否则,中招后,你自己就着急吧!
这只鸽子的要害是c:\windows\winlogon.dll。如果想办法禁止这个dll加载运行,鸽子的文件全部可见(见20楼的图)


这是Movgear.exe中捆绑的一只灰鸽子(Movgear.exe样本来自安全12公里)。winlogon.exe的MD5值为:2de9f62c2b405e16cb66773747cf0f2d。


一、自Movgear.exe中提取winlogon.exe并将其植入系统后,autoruns、HijackThis、SREng日志中均无任何异常发现。
winlogon.exe释放的文件有:
1、c:\windows\winlogon.exe
2、c:\windows\winlogon.dll
3、c:\windows\winlogonKey.dll
这两个dll插入IE浏览器进程。
即使不打开IE浏览器,IceSword的进程列表中依然可见iexplore.exe。
c:\windows\winlogonKey.dll动态跟踪所有应用程序进程(一旦开启,立即插入。)
注意:即使显示隐藏文件,用WINDOWS的资源管理器也看不到灰鸽子释放的这三个文件。用IceSword才能看到。
二、注册表改动包括:
1、在HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
添加:winlogon.exe(指向c:\windows\winlogon.exe)
2、在HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Extensions\CmdMapping
添加:
"{92780B25-18CC-41C8-B9BE-3C9C571A8263}"=dword:00002002
"{DEDEB80D-FA35-45d9-9460-4983E5A8AFE6}"=dword:00002002
"{FB5F1910-F110-11d2-BB9E-00C04F795683}"=dword:00002001
3、在HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Connection Wizard
添加:"Completed"=hex:01,00,00,00
4、在HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser
添加:
"ITBarLayout"=hex:11,00,00,00,5c,00,00,00,00,00,00,00,34,00,00,00,1f,00,00,00,56,\
  00,00,00,01,00,00,00,20,07,00,00,a0,0f,00,00,05,00,00,00,62,05,\
  00,00,26,00,00,00,02,00,00,00,21,07,00,00,a0,0f,00,00,04,00,00,\
  00,21,01,00,00,a0,0f,00,00,03,00,00,00,20,03,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00
"{01E04581-4EEE-11D0-BFE9-00AA005B4383}"=hex:81,45,e0,01,ee,4e,d0,11,bf,e9,00,aa,00,5b,43,83,10,00,00,00,00,\
  00,00,00,01,e0,32,f4,01,00,00,00
"{0E5CBF21-D15F-11D0-8301-00AA005B4383}"=hex:21,bf,5c,0e,5f,d1,d0,11,83,01,00,aa,00,5b,43,83,22,00,1c,00,08,\
  00,00,00,06,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  00,00,4c,00,00,00,01,14,02,00,00,00,00,00,c0,00,00,00,00,00,00,\
  46,81,00,00,00,10,00,00,00,a0,8f,ff,ba,9d,d4,c6,01,00,9e,02,bb,\
  9d,d4,c6,01,a0,8f,ff,ba,9d,d4,c6,01,00,00,00,00,00,00,00,00,01,\
  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,5d,01,14,00,1f,50,\
  e0,4f,d0,20,ea,3a,69,10,a2,d8,08,00,2b,30,30,9d,19,00,2f,43,3a,\
  5c,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,5c,\
  00,31,00,00,00,00,00,3a,31,09,3c,10,00,44,4f,43,55,4d,45,7e,31,\
  00,00,44,00,03,00,04,00,ef,be,3a,31,9c,36,2a,35,f7,29,14,00,00,\
  00,44,00,6f,00,63,00,75,00,6d,00,65,00,6e,00,74,00,73,00,20,00,\
  61,00,6e,00,64,00,20,00,53,00,65,00,74,00,74,00,69,00,6e,00,67,\
  00,73,00,00,00,18,00,4c,00,31,00,00,00,00,00,2a,35,cb,2e,16,00,\
  4e,45,54,57,4f,52,7e,31,00,00,34,00,03,00,04,00,ef,be,3a,31,11,\
  39,2a,35,cb,2e,14,00,00,00,4e,00,65,00,74,00,77,00,6f,00,72,00,\
  6b,00,53,00,65,00,72,00,76,00,69,00,63,00,65,00,00,00,18,00,56,\
  00,31,00,00,00,00,00,2a,35,cb,2e,11,00,46,41,56,4f,52,49,7e,31,\
  00,00,3e,00,03,00,04,00,ef,be,2a,35,cb,2e,2a,35,cb,2e,14,00,28,\
  00,46,00,61,00,76,00,6f,00,72,00,69,00,74,00,65,00,73,00,00,00,\
  40,73,68,65,6c,6c,33,32,2e,64,6c,6c,2c,2d,31,32,36,39,33,00,18,\
  00,30,00,35,00,00,00,00,00,2a,35,f1,2e,10,00,fe,94,a5,63,00,00,\
  1c,00,03,00,04,00,ef,be,2a,35,f1,2e,2a,35,f1,2e,14,00,00,00,fe,\
  94,a5,63,00,00,14,00,00,00,60,00,00,00,03,00,00,a0,58,00,00,00,\
  00,00,00,00,6c,69,6e,62,61,6f,68,65,00,00,00,00,00,00,00,00,1e,\
  8c,63,4d,34,72,b3,48,8a,de,83,67,8f,38,be,10,b1,a9,fd,89,90,40,\
  db,11,b2,29,00,d0,59,c0,b8,59,1e,8c,63,4d,34,72,b3,48,8a,de,83,\
  67,8f,38,be,10,b1,a9,fd,89,90,40,db,11,b2,29,00,d0,59,c0,b8,59,\
  00,00,00,00
5、在HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState
添加:"Settings"=hex:0c,00,02,00,0a,01,ef,75,60,00,00,00
6、在HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\
添加:
{0055C089-8582-441B-A0BF-17B458C2A3A8}
{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}
{92780B25-18CC-41C8-B9BE-3C9C571A8263}
{AE7CD045-E861-484F-8273-0445EE161910}
{DEDEB80D-FA35-45D9-9460-4983E5A8AFE6}
{FB5F1910-F110-11D2-BB9E-00C04F795683}
7、在HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\链接
添加:"Order"=hex:08,00,00,00,02,00,00,00,0c,00,00,00,01,00,00,00,00,00,00,00

三、进行上述观察后,重启系统。
重启后,卡巴斯基报警(我的卡巴斯基为启动加载):发现灰鸽子。但卡巴斯基仅仅将c:\windows\winlogon.dll删除;c:\windows\winlogon.exe和c:\windows\winlogonKey.dll卡巴斯基并不报毒。汗!!卡巴斯基越来越不争气了
另外发现其winlogonKey.log文件。文件内容为:

#?>.?:4?74;<jk7h8萃GMKULome}~omkSULome}~omkSmk]ya|j鼻苴焙怀跺佥拿顾皇朗拆ULome}~omkSjbbjbbEkw铣而jbb朗拆茧棋gULome}~omkSGK辍挝腮出铰GKGmk]ya|j皇出铰限裤剞芪频鼻蝉gkvb~ULome}~omkSULome}~omkS~ba|k kvkULome}~omkSULome}~omkS佻硷裤妒浮掘桅?

四、查杀流程:
1、打开注册表编辑器,展开HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
删除灰鸽子的服务项:winlogon.exe
2、重启系统。用IceSword找到并删除鸽子释放的那三个文件。
4、清理注册表(删除鸽子添加的注册表项)。


最后编辑2007-01-01 09:23:28
分享到:
gototop
 

引用:
【独孤豪侠的贴子】猛.....样本..玩玩zkkgsg@163.com
………………

已发
gototop
 

引用:
【艾玛的贴子】原来你早拿到了,我发给你的呢
………………

下午在安全12公里拿到的
gototop
 

引用:
【艾玛的贴子】


我早晨就发给你啦


没想到你下午才来


报的人家较少,是因为压缩的原因吧flysfx好象是
………………


稀里糊涂地中了这只鸽子,就全部指望杀软了。贴SReng、HijackThis、autoruns日志求助,恐怕是“缘木求鱼”了!
这鸽子算有些水平。
【建议】:系统异常,但SReng、HijackThis、autoruns日志无异常发现者,最好SSM观察“服务”。SSM可见这只鸽子的服务项。
gototop
 

引用:
【大连蓝天的贴子】【回复“baohe”的帖子】麻烦猫把病毒样本发我这里jcwcn_lj@163.com
………………

已发
gototop
 

引用:
【独孤豪侠的贴子】IceSword日志??

冰刃什么时候也能扫日志了?
………………

刚才上面的回贴是笔误。应该是“SSM”,而不是“IceSword”。
不过,IceSword确实可以导出服务、进程等日志。
gototop
 

这只鸽子的要害是那个c:\windows\winlogon.dll。
如果用SSM禁止c:\windows\winlogon.dll加载运行,则这只鸽子的文件全部可见。

附件附件:

下载次数:260
文件类型:image/pjpeg
文件大小:
上传时间:2006-9-10 16:43:59
描述:
预览信息:EXIF信息



gototop
 

引用:
【无限001的贴子】版主很勤快,
想向你讨教如何发现及分析这些病毒的种种迹象,非常感兴趣,
给个方法,我也研究研究!
………………

这个,要根据自己系统的实际情况而定。
我的系统(IBM的本本,XPSP2系统),同时加载运行PowerShadow、Tiny、SSM三个安全软件——没有任何问题。
所以,我观察病毒一般是在PowerShadow的Full Shadow模式下运行病毒(保险起见),获得初步信息(用Tiny和SSM监控)。
根据初步信息判断病毒的侵害范围及严重程度后,调整Tiny的防护设置,再次在Single Shadow模式下详细观察、记录。
大致就是这样。
这样做的前提条件是:熟悉Tiny和ssm的设置,并能根据实际问题灵活应用。Tiny和ssm设置的灵活调整需要经验积累。
gototop
 

引用:
【无限001的贴子】


感谢版主提供方法,回贴好快,
想问一下,Tiny和卡巴的防火墙有冲突吗?
不知用过winpatrol没,和ssm相比如何?
………………

如果会用Tiny,咔吧的墙可以扔掉!
winpatrol我没用过。
我习惯用SSM。
gototop
 

引用:
【缘于无梦的贴子】请教版主若winlogon.exe是在c:\windows\system32
里面会不会是灰鸽子呢?
………………

c:\windows\system32\winlogon.exe是正常的系统文件。
gototop
 
123   1  /  3  页   跳转
页面顶部
Powered by Discuz!NT