Ransom.Win64.ABYSSLOCKER.YPEDR
Ransom:Win32/Babuk.MAK!MTB (MICROSOFT)
Windows

恶意软件类型:
Ransomware
有(yǒu)破坏性?:
没有(yǒu)
加密?:
没有(yǒu)
In the Wild:
是的
概要
它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。
技(jì )术详细信息
新(xīn)病毒详细信息
它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。
安(ān)装(zhuāng)
它植入下列文(wén)件:
- {malware directory}/work.log
- %User Temp%\readme.bmp → desktop wallpaper ransom
(注意: %User Temp% 是当前用(yòng)户的 Temp 文(wén)件夹。通常位于 C:\Documents and Settings\{user name}\Local Settings\Temp (Windows 2000(32-bit)、XP 和 Server 2003(32-bit))、C:\Users\{user name}\AppData\Local\Temp (Windows Vista、7、8、8.1、2008(64-bit)、2012(64-bit) 和 10(64-bit)。)
它添加下列进程:
- vssadmin.exe delete shadows /all /quiet
- wmic SHADOWCOPY DELETE
- bcdedit / set{ default } recoveryenabled No
- bcdedit / set{ default } bootstatuspolicy ignoreallfailures
它添加下列互斥条目,确保一次只会运行一个副本:
- DontWorryBeHappy
其他(tā)系统修改
它通过修改下列注册表项,更改桌面壁纸:
HKEY_CURRENT_USER\Control Panel\Desktop
Wallpaper = %User Temp%\readme.bmp
进程终止
它终止在受感染的系统上运行的下列服務(wù):
- MSSQLServerADHelper100
- MSSQL$ISARS
- MSSQL$MSFW
- SQLAgent$ISARS
- SQLAgent$MSFW
- SQLBrowser
- ReportServer$ISARS
- SQLWriter
- WinDefend
- mr2kserv
- MSExchangeADTopology
- MSExchangeFBA
- MSExchangeIS
- MSExchangeSA
- ShadowProtectSvc
- SPAdminV4
- SPTimerV4
- SPTraceV4
- SPUserCodeV4
- SPWriterV4
- SPSearch4
- IISADMIN
- firebirdguardiandefaultinstance
- ibmiasrw
- QBCFMonitorService
- QBVSS
- QBPOSDBServiceV12
- IBM Domino Server (CProgramFilesIBMDominodata)
- IBM Domino Diagnostics (CProgramFilesIBMDomino)
- Simply Accounting Database Connection Manager
- QuickBooksDB1
- QuickBooksDB2
- QuickBooksDB3
- QuickBooksDB4
- QuickBooksDB5wrapper
- DefWatch
- ccEvtMgr
- ccSetMgr
- SavRoamSqlservr
- sqlagent
- sqladhlp
- Culserver
- RTVscansqlbrowser
- SQLADHLP
- QBIDPService
- IntuitQuickBooksFCS
- msmdsrv
- tomcat6
- zhudongfangyu
- vmware - usbarbitator64
- vmware - converter
- dbsrv12
- dbeng8
- MSSQL$MICROSOFT##WID
- MSSQL$VEEAMSQL2012
- SQLAgent$VEEAMSQL2012
- FishbowlMySQ
- MySQL57MSSQL$KAV_CS_ADMIN_KIT
- SQLAgent$KAV_CS_ADMIN_KIT
- msftesql - Exchange
- MSSQL$MICROSOFT##SSEE
- MSSQL$SBSMONITORING
- MSSQL$SHAREPOINT
- MSSQLFDLauncher$SBSMONITORING
- MSSQLFDLauncher$SHAREPOINT
- SQLAgent$SBSMONITORING
- SQLAgent$SHAREPOINT
- QBFCService
- YooBackup
- YooIT
- vsssqlsvc$
- MSSQL
- MSSQL$
- memtas
- mepocs
- sophos
- veeam
- backup
- bedbg
- PDVFSService
- BackupExecVSSProvider
- BackupExecAgentAccelerator
- BackupExecAgentBrowser
- BackupExecDiveciMediaService
- BackupExecJobEngine
- BackupExecManagementService
- BackupExecRPCService
- MVArmorMVarmor64
- stc_raw_agent
- VSNAPVSS
- VeeamTransportSvc
- VeeamDeploymentService
- VeeamNFSSvc
- AcronisAgent
- ARSM
- AcrSch2Svc
- CASAD2DWebSvc
- CAARCUpdateSvc
- WSBExchange
- MSExchange
- MSExchange$GxVss
- GxBlr
- GxFWD
- GxCVD
- GxCIMgr
它终止在受感染的系统内存中(zhōng)运行的下列进程:
- 360doctor.exe
- 360se.exe
- ADExplorer.exe
- ADExplorer64.exe
- ADExplorer64a.exe
- Adobe CEF.exe
- Adobe Desktop Service.exe
- AdobeCollabSync.exe
- AdobeIPCBroker.exe
- AutodeskDesktopApp.exe
- Autoruns.exe
- Autoruns64.exe
- Autoruns64a.exe
- Autorunsc.exe
- Autorunsc64.exe
- Autorunsc64a.exe
- AvastUI.exe
- BrCcUxSys.exe
- BrCtrlCntr.exe
- CNTAoSMgr.exe
- CagService.exe
- CoreSync.exe
- Creative Cloud.exe
- Culture.exe
- Defwatch.exe
- DellSystemDetect.exe
- EnterpriseClient.exe
- GDscan.exe
- GWCtlSrv.exe
- GlassWire.exe
- Helper.exe
- InputPersonalization.exe
- MsDtSrvr.exe
- MsDtsSrvr.exe
- MsMpEng.exe
- ONENOTEM.exe
- PccNTMon.exe
- ProcessHacker.exe
- Procexp.exe
- Procexp64.exe
- QBDBMgr.exe
- QBDBMgrN.exe
- QBIDPService.exe
- QBW32.exe
- RAgui.exe
- RTVscan.exe
- Raccine.exe
- RaccineElevatedCfg.exe
- RaccineSettings.exe
- Raccine_x86.exe
- RdrCEF.exe
- ReportingServicesService.exe
- SQLAGENT.EXE
- Simply.SystemTrayIcon.exe
- SimplyConnectionManager.exe
- Sqlservr.exe
- Ssms.exe
- Sysmon.exe
- Sysmon64.exe
- SystemExplorer.exe
- SystemExplorerService.exe
- SystemExplorerService64.exe
- TMBMSRV.exe
- TeamViewer.exe
- TeamViewer_Service.exe
- TitanV, Ssms.exe
- TmCCSF.exe
- TmListen.exe
- TmPfw.exe
- TmProxy.exe
- Totalcmd.exe
- Totalcmd64.exe
- VeeamDeploymentSvc.exe
- WRSA.exe
- WireShark.exe
- ZhuDongFangYu.exe
- acwebbrowser.exe
- agntsvc.exe
- avp.exe
- avz.exe
- axlbridge.exe
- bedbh.exe
- benetns.exe
- bengien.exe
- beserver.exe
- dbeng50.exe
- dbsnmp.exe
- dumpcap.exe
- egui.exe
- encsvc.exe
- excel.exe
- fbguard.exe
- fbserver.exe
- fdhost.exe
- fdlauncher.exe
- firefox.exe
- httpd.exe
- infopath.exe
- isqlplussvc.exe
- j0gnjko1.exe
- java.exe
- msaccess.exe
- msftesql.exe
- msmdsrv.exe
- mspub.exe
- mydesktopqos.exe
- mydesktopservice.exe
- mysqld.exe
- node.exe
- notepad++.exe
- notepad.exe
- ntrtscan.exe
- ocautoupds.exe
- ocomm.exe
- ocssd.exe
- onenote.exe
- oracle.exe
- outlook.exe
- pg_ctl.exe
- postgres.exe
- powerpnt.exe
- procexp64a.exe
- procmon.exe
- procmon64.exe
- procmon64a.exe
- pvlsvr.exe
- qbupdate.exe
- raw_agent_svc.exe
- sam.exe
- sqbcoreservice.exe
- sql.exe
- sqlbrowser.exe
- sqlceip.exe
- sqlmangr.exe
- sqlservr.exe
- sqlwriter.exe
- steam.exe
- supervise.exe
- synctime.exe
- tbirdconfig.exe
- tcpview.exe
- tcpview64.exe
- tcpview64a.exe
- tdsskiller.exe
- thebat.exe
- thunderbird.exe
- tomcat6.exe
- tv_w32.exe
- tv_x64.exe
- visio.exe
- vsnapvss.exe
- vxmon.exe
- wdswfsafe.exe
- winword.exe
- wordpad.exe
- wsa_service.exe
- wxServer.exe
- wxServerView.exe
- xfssvccon.exe
其他(tā)详细信息
该程序执行以下操作(zuò):
- It empties the recycle bin of the affected system.
- Avoids encrypting the following network shares:
- ADMIN$
- IPC$
解决方案
Step 2
对于Windows ME和XP用(yòng)户,在扫描前,请确认已禁用(yòng)系统还原功能(néng),才可(kě)全面扫描计算机。
Step 3
注意:在此恶意软件/间谍软件/灰色软件执行期间,并非所有(yǒu)文(wén)件、文(wén)件夹和注册表键值和项都会安(ān)装(zhuāng)到您的计算机上。这可(kě)能(néng)是由于不完整的安(ān)装(zhuāng)或其他(tā)操作(zuò)系统条件所致。如果您没有(yǒu)找到相同的文(wén)件/文(wén)件夹/注册表信息,请继续进行下一步操作(zuò)。
Step 4
删除该注册表值
注意事项:错误编辑Windows注册表会导致不可(kě)挽回的系统故障。只有(yǒu)在您掌握后或在系统管理(lǐ)员的帮助下才能(néng)完成这步。或者,请先阅读Microsoft文(wén)章,然后再修改计算机注册表。
- In HKEY_CURRENT_USER\Control Panel\Desktop
- Wallpaper = %User Temp%\readme.bmp
- Wallpaper = %User Temp%\readme.bmp
Step 5
搜索和删除该文(wén)件
- {malware directory}/work.log
- %User Temp%\readme.bmp
Step 6
使用(yòng)亚信安(ān)全产(chǎn)品扫描计算机,并删除检测到的Ransom.Win64.ABYSSLOCKER.YPEDR文(wén)件 如果检测到的文(wén)件已被亚信安(ān)全产(chǎn)品清除、删除或隔离,则无需采取进一步措施。可(kě)以选择直接删除隔离的文(wén)件。请参阅知识库页(yè)面了解详细信息。
Step 7
从备份中(zhōng)恢复加密文(wén)件。