Location>code7788 >text

Windows Emergency Response - Auto Virus

Popularity:211 ℃/2024-10-05 17:56:51

catalogs
  • Emergency response context
  • Analytical Sample
    • Turn on monitoring
    • virus infection
    • View Monitor
    • Analyzing Virus Behavior
      • analyze
      • 2. Abnormal connection
      • 3. Process troubleshooting
      • 4. Startup Item Exhaustion
  • check and kill (a pest)
    • 1. Delete the file first
    • 2. Use xuetr to kill the process
    • 3. Startup item removal
    • restart troubleshooting
      • Normal Flow of Intrusion Detection

Emergency response context

The operation and maintenance personnel are ready to distribute the software installation for the company's employees through the windows shared document method, after opening forget to close, and other people can delete and replace the files under the shared folder modification, there are spoofing people through the shared folder, bundled with a virus in some of the files, leading to the company's employees to download and install the virus when they were hit.
The symptoms are shown below, with the right keyboard character appearing Auto
在这里插入图片描述
Internet research found to be auto virus, the first characteristic is the existence of files under the disk drive, later analysis will find this file, and every time you double-click the disk drive will be based on the file to re-run the file specified in the program files, that is to say, it will be re-infected with the virus once.

Analytical Sample

After getting the sample in the shared folder first drop it to the VM to monitor the behavior of the sample to see what the next specific tampering has been done.
Monitoring Tool UsageD Shield
/s/13hCSYpV5Mn_1JMzy4nSkSQ?pwd=kott


Turn on monitoring

D Shield allows you to turn on file monitoring, mainly to see what the virus has done, focusing on what files were created
在这里插入图片描述
That's it. We're ready for surveillance.
在这里插入图片描述

virus infection

Drop the virus sample into the virtual machine, and remember to set the virtual machine NIC mode to host-only mode to avoid some viruses infecting the physical machine as well.
在这里插入图片描述

View Monitor

Upon double clicking it is obvious that two weird files have been created

Clue Card:
:\\
:\\system32\

在这里插入图片描述

Analyzing Virus Behavior

analyze

First check out the file, right click to open the disk drive, here you can also see that it has indeed been infected with a virus
在这里插入图片描述
When I saw the c disk did not see it, I knew that it must have been done to hide the file, but only on the tool!
Since this experiment is using WinServer 2003, it is possible to use theXueTrI'm just going to go ahead and analyze the killing process.XueTrUp.
XueTrTool download address:
/s/1ZT-80vNkQs6gWOuvLAxTcg?pwd=d55s
在这里插入图片描述
We choose to copy the file out
在这里插入图片描述
To view the contents of the file, we need to knowThe role is:Allow a specified file to be run automatically when the disk is double-clicked. That means that double-clicking on the disk drive will infect the virus again, and you can see that the file is in theC:\\Windows\System32folder, then that confirms the behavior that our d-shield monitors, which is indeed correct.
在这里插入图片描述
But here it is, not what is written in the d-shield, for reasons unknown, but it still prevails, as it is the virus counterpart.
Modify Clue Card ↓

Clue Card:
:\\
:\\system32\

2. Abnormal connection

No external connection anomalies found
在这里插入图片描述

3. Process troubleshooting

Open the process management view, there is a capital DLLHOST, this has been confirmed to be a virus, but the lowercase dllhost process we do not pack the ticket is normal, but the Internet can also be found that this file is the system originally have, so focus on the capital process first.
在这里插入图片描述
Check the process corresponding to the service, there is no abnormal service found, there is only one process running

tasklist /svc | findstr "4036"

在这里插入图片描述
Then it's time to get on the tool and analyze it

A look at the process module confirms that it is indeed a virus, with only one abnormal process module.
在这里插入图片描述
I continued to look at the other dllhost after that, and found no anomalies either
Then here is the process file to follow up, or look at the file path corresponding to the process, I forgot to take a screenshot here, it shows.

Clue Card:
:\\
:\\system32\

4. Startup Item Exhaustion

xuetr opens the startup items to see the startup items created by the virus
在这里插入图片描述
Open the registry and look at it, and again, I find that there are writes to the registry

Clue Card:
:\\
:\\system32\
3. Startup items
4. Registry: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows

在这里插入图片描述

check and kill (a pest)

We're done analyzing. We'll start killing based on the clues we've got.

Clue Card:
:\\
:\\system32\
3. Startup items
4. Registry: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows

1.Delete the file first.

Open the disk drive remember to use the right click, then open, do not directly double click, otherwise it will be infected again all over again!
在这里插入图片描述
No files were found, and as stated in the previous analysis, the files were hidden and could only be deleted with the xuetr utility
在这里插入图片描述
Like virus-related files, it's best to check Delete Files and Block Regeneration -> then right-click again to force deletion
在这里插入图片描述

2. Use xuetr to kill the process

Here I observed that he is deleted under my dllhost folder, that is, I copied in the source of the virus deleted, did not delete the system32 that folder under the file, here a simple analysis can be known as a cover-up, we reboot will automatically find the system32 that file, because the process will be rebooted to re-run, the startup item corresponding to the The DLLHOST corresponds to the program files in the system32 folder.
在这里插入图片描述
So we're going toc:\\system32\However, this process corresponds to a file that is also hidden, so you should use a professional tool to remove it.
在这里插入图片描述

3. Startup item removal

First locate the registry
在这里插入图片描述
Because I don't know load from time to time the system comes with the catalog entries, so here it is best to delete the value can be
在这里插入图片描述
在这里插入图片描述
Then I went back to the startup items to see that they were gone and needed to be removed if they were still in DLLHOST.
在这里插入图片描述

restart troubleshooting

Now open the disk drive without auto, you can normally double-click the disk drive to enter the
在这里插入图片描述

Normal Flow of Intrusion Detection

The first step was to re-examine the behavior of the previous virus operation.

  • No process exceptions (DLLHOST)
    在这里插入图片描述

  • c:\\Windows\System\non-existent
    在这里插入图片描述

  • Startup items, normal (registry normal)


Then the rest of the invasions were cleared.

  • Abnormal connections (netstat -ano)
  • Account troubleshooting (net user)
    Looked directly at it with d-shield, here you can also go to the registry to see if there are any hidden accounts
    在这里插入图片描述
  • Service Troubleshooting
  • timed task

Emergency completed, this is a small understanding of the virus emergency, auto virus is also a long time, mainly through the u-disk transmission, because some people he will plug in the u-disk double-click to open, then this time will be infected with the virus, so through this experiment to raise the alarm, u-disk is usually best or right-click to open the way into the safer.