其他分享
首页 > 其他分享> > 2019-2020-2 20175322周弋鸿 《网络对抗技术》Exp4 恶意代码分析

2019-2020-2 20175322周弋鸿 《网络对抗技术》Exp4 恶意代码分析

作者:互联网

目录

一、实践目标与内容

1.实践目标

2.实践内容

二、实践步骤

1.使用schtasks指令监控系统

date /t >> c:\netstat5322.txt
time /t >> c:\netstat5322.txt
netstat -bn >> c:\netstat5322.txt

2.使用sysmon工具监控系统

<Sysmon schemaversion="3.10">
  <!-- Capture all hashes -->
  <HashAlgorithms>*</HashAlgorithms>
  <EventFiltering>
    <!-- Log all drivers except if the signature -->
    <!-- contains Microsoft or Windows -->
    <ProcessCreate onmatch="exclude">
      <Image condition="end with">chrome.exe</Image>
    </ProcessCreate>

    <ProcessCreate onmatch="include">
      <ParentImage condition="end with">cmd.exe</ParentImage>
    </ProcessCreate>

    <FileCreateTime onmatch="exclude" >
      <Image condition="end with">chrome.exe</Image>
    </FileCreateTime>

    <NetworkConnect onmatch="exclude">
      <Image condition="end with">chrome.exe</Image>
      <SourcePort condition="is">137</SourcePort>
      <SourceIp condition="is">127.0.0.1</SourceIp>
    </NetworkConnect>

    <NetworkConnect onmatch="include">
      <DestinationPort condition="is">80</DestinationPort>
      <DestinationPort condition="is">443</DestinationPort>
    </NetworkConnect>

    <CreateRemoteThread onmatch="include">
      <TargetImage condition="end with">explorer.exe</TargetImage>
      <TargetImage condition="end with">svchost.exe</TargetImage>
      <TargetImage condition="end with">winlogon.exe</TargetImage>
      <SourceImage condition="end with">powershell.exe</SourceImage>
    </CreateRemoteThread>
  </EventFiltering>
</Sysmon>

3.恶意软件分析

wireshark看到有大量数据包传输,可以判断有DATA数据在传输
日志更新了4条,可以看出是虚拟机在调用

从事件属性来看应该是后门程序调用了系统程序进行截屏

SearchFilterHost.exe是桌面搜索引擎的索引程序,主要作用是建立快速索引文件,让用户能够更好的搜索出电脑中的任意资料。它会在计算机空闲时自动扫描索引位置的文件名、属性信息和给定类别的文件内容,这些索引位置默认包括桌面、收藏夹、开始菜单、系统目录
总的来看,在没有针对性地绕过Sysmon监控的情况下,Sysmon也不能完全监控到恶意软件的攻击行为

DETALS

Basic Properties
MD5	eacc284432b24fc3124b446d1a1a4f83
SHA-1	8f4b847e68a7ad96be2cdeff769f73f90b4eb565
SHA-256	ea3ce855bdb1a187b716f730780f8f2239674c03aefb0fa3370274b91c261362
Vhash	01504d0d765d1bz3!z
Authentihash	044e10494d5bd57b239ab605f76809356707af45bd2701701c6d5d8981029507
Imphash	17a4bd9c95f2898add97f309fc6f9bcd
SSDEEP	3072:r85ys92PW2UZp5VR+Dm0aW/MGqvGQQQt:6yTQBVROm0aW/MD7
File type	Win32 EXE
Magic	PE32 executable for MS Windows (GUI) Intel 80386 32-bit
File size	113.50 KB (116224 bytes)

History
Creation Time	2020-03-31 07:05:50
First Submission	2020-03-31 07:39:54
Last Submission	2020-03-31 07:39:54
Last Analysis	2020-03-31 07:39:54

Names
zyh_upxed_Hyperion.exe

Portable Executable Info
Header
Target Machine	Intel 386 or later processors and compatible processors
Compilation Timestamp	2020-03-31 07:05:50
Entry Point	439788
Contained Sections	4

Sections
Name	Virtual Address	Virtual Size	Raw Size	Entropy	MD5
.bss	4096	319488	0	0	d41d8cd98f00b204e9800998ecf8427e
.data	323584	99872	100352	7.99	c5a811b729b12a4315252ff04f82d4fb
.text	425984	14057	14336	5.17	0db3da594560fbdee7cab4ec727c9f7b
.idata	442368	136	512	1.29	260d24d41289a4ffd343ab548a3e76cc

Imports
KERNEL32.DLL

ExifTool File Metadata
CodeSize	14336
EntryPoint	0x6b5ec
FileType	Win32 EXE
FileTypeExtension	exe
ImageFileCharacteristics	No relocs, Executable, No line numbers, No symbols, 32-bit
ImageVersion	0.0
InitializedDataSize	100864
LinkerVersion	1.71
MIMEType	application/octet-stream
MachineType	Intel 386 or later, and compatibles
OSVersion	1.0
PEType	PE32
Subsystem	Windows GUI
SubsystemVersion	4.0
TimeStamp	2020:03:31 08:05:50+01:00
UninitializedDataSize	0

三、实践报告

1.遇到的问题

2.基础问题回答

3.实验感想

标签:后门,文件,20175322,exe,快照,周弋鸿,恶意代码,程序,使用
来源: https://www.cnblogs.com/zyh5322/p/12704506.html