魔盾安全Yara规则检测结果 - 高危
Informational: PowerShell Detected
Critical: A non-Windows executable contains win32 API functions names
Warning: Detected function to spread Malware via desktop or autorun files
Warning: Detected function for installing itself for autorun at Windows startup
Critical: Spotted potential malicious behaviors from a small size target, like process manipultion, privilege, token and files
网络分析
访问主机记录
直接访问 |
IP地址 |
国家名 |
否 |
20.42.65.92 |
United States |
域名解析
域名 |
响应 |
watson.microsoft.com |
A 20.42.65.92
CNAME legacywatson.trafficmanager.net
CNAME onedsblobprdeus17.eastus.cloudapp.azure.com
|
TCP连接
IP地址 |
端口 |
23.223.198.226 |
80 |
UDP连接
IP地址 |
端口 |
192.168.122.1 |
53 |
192.168.122.1 |
53 |
HTTP请求
URL |
HTTP数据 |
http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip |
GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1
Accept: */*
If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT
User-Agent: IPM
Host: acroipm.adobe.com
Connection: Keep-Alive
Cache-Control: no-cache
|
行为分析
互斥量(Mutexes)
无信息
执行的命令
- C:\Windows\system32\cmd.exe /c ver
- reg query HKU\S-1-5-19
- mode con cols=98 lines=30
- choice /C:123456789 /N /M "> \xe5\x9c\xa8\xe9\x94\xae\xe7\x9b\x98\xe4\xb8\x8a\xe8\xbe\x93\xe5\x85\xa5\xe4\xbd\xa0\xe7\x9a\x84\xe9\x80\x89\xe6\x8b\xa9 [1,2,3,4,5,6,7,8,9] : "
创建的服务
无信息
启动的服务
无信息
进程
cmd.exe PID: 2592, 上一级进程 PID: 2196
cmd.exe PID: 2744, 上一级进程 PID: 2592
cmd.exe PID: 2836, 上一级进程 PID: 2744
reg.exe PID: 2896, 上一级进程 PID: 2744
mode.com PID: 2964, 上一级进程 PID: 2744
choice.exe PID: 3044, 上一级进程 PID: 2744
访问的文件
- C:\Users\test\AppData\Local\Temp
- C:\Users
- C:\Users\test
- C:\Users\test\AppData
- C:\Users\test\AppData\Local
- C:\
- C:\Users\test\AppData\Local\Temp\MAS_1.4_AIO_CN.cmd
- C:\Windows\Globalization\Sorting\sortdefault.nls
- \Device\NamedPipe\
- C:\Windows\System32\cmd.exe
- C:\ProgramData\Oracle\Java\javapath\powershell.exe
- C:\Windows\System32\powershell.exe
- C:\Windows\powershell.exe
- C:\Windows\System32\wbem\powershell.exe
- C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
- C:\Windows
- C:\Windows\System32
- C:\Windows\System32\WindowsPowerShell
- C:\Windows\System32\WindowsPowerShell\v1.0
- \??\nul
- C:\Users\test\AppData\Local\Temp\reg.*
- C:\Users\test\AppData\Local\Temp\reg
- C:\ProgramData\Oracle\Java\javapath\reg.*
- C:\ProgramData\Oracle\Java\javapath\reg
- C:\Windows\System32\reg.*
- C:\Windows\System32\reg.COM
- C:\Windows\System32\reg.exe
- C:\Users\test\AppData\Local\Temp\mode.*
- C:\Users\test\AppData\Local\Temp\mode
- C:\ProgramData\Oracle\Java\javapath\mode.*
- C:\ProgramData\Oracle\Java\javapath\mode
- C:\Windows\System32\mode.*
- C:\Windows\System32\mode.com
- C:\Windows\Temp\_MAS\
- C:\Users\test\AppData\Local\Temp\
- C:\Users\test\AppData\Local\Temp\echo:
- C:\Users\test\AppData\Local\Temp\choice.*
- C:\Users\test\AppData\Local\Temp\choice
- C:\ProgramData\Oracle\Java\javapath\choice.*
- C:\ProgramData\Oracle\Java\javapath\choice
- C:\Windows\System32\choice.*
- C:\Windows\System32\choice.COM
- C:\Windows\System32\choice.exe
读取的文件
- C:\Users\test\AppData\Local\Temp\MAS_1.4_AIO_CN.cmd
- C:\Windows\Globalization\Sorting\sortdefault.nls
- \Device\NamedPipe\
删除的文件
无信息
注册表键
- HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System
- HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DisableUNCCheck
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\EnableExtensions
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DelayedExpansion
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DefaultColor
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\CompletionChar
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\PathCompletionChar
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\AutoRun
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DisableUNCCheck
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\EnableExtensions
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DelayedExpansion
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DefaultColor
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionChar
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\PathCompletionChar
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRun
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Locale
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Locale\Alternate Sorts
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Language Groups
- HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Locale\00000804
- HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Groups\a
- HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\Option
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Windows Error Reporting\WMR
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\Windows Error Reporting\WMR\Disable
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
- HKEY_USERS\S-1-5-19
读取的注册表键
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DisableUNCCheck
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\EnableExtensions
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DelayedExpansion
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DefaultColor
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\CompletionChar
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\PathCompletionChar
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\AutoRun
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DisableUNCCheck
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\EnableExtensions
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DelayedExpansion
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DefaultColor
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionChar
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\PathCompletionChar
- HKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRun
- HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Locale\00000804
- HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Groups\a
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\Windows Error Reporting\WMR\Disable
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
修改的注册表键
无信息
删除的注册表键
无信息
API解析
- kernel32.dll.SetThreadUILanguage
- kernel32.dll.CopyFileExW
- kernel32.dll.IsDebuggerPresent
- kernel32.dll.SetConsoleInputExeNameW
- advapi32.dll.SaferIdentifyLevel
- advapi32.dll.SaferComputeTokenFromLevel
- advapi32.dll.SaferCloseLevel
- kernel32.dll.SortGetHandle
- kernel32.dll.SortCloseHandle