分(fēn)析者: Ricardo III Valdez   

 :

Trojan:Win32/Seheq!rfn (MICROSOFT)

 平台:

Windows

 总體(tǐ)风险等级:
 潜在破坏:
 潜在分(fēn)布:
 感染次数:
 信息暴露:

  • 恶意软件类型:
    Ransomware

  • 有(yǒu)破坏性?:
    没有(yǒu)

  • 加密?:
    是的

  • In the Wild:
    是的

  概要

感染途徑: ???????, ?????????

它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。

????????,????????

  技(jì )术详细信息

文(wén)件大小(xiǎo): 3,237,376 bytes
报告日期: EXE
内存驻留: 没有(yǒu)
初始樣本接收日期: 2023年8月9日
Payload: ??? URL/Ip, ????/???, ??????
N

???????

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

??

???????:

  • %Application Data%\{21 Random Capital Letters}\{21 Random Capital Letters} ? Encrypted shellcode from a PNG file
  • %User Temp%\{8 Random Alpha Numeric Characters} ? Encrypted shellcode
  • %User Temp%\rgb9rast.exe ? Legitimate 7-zip Standalone Console Application
  • {Malware File Path}\KNIGHT_LOG.txt

(??: %Application Data% ?????? Application Data ???,???? C:\Windows\Profiles\{user name}\Application Data (Windows 98 ? ME)?C:\WINNT\Profiles\{user name}\Application Data (Windows NT)?C:\Documents and Settings\{user name}\Local Settings\Application Data (Windows 2000(32-bit)?XP ? Server 2003(32-bit)) ? C:\Users\{user name}\AppData\Roaming (Windows Vista?7?8?8.1?2008(64-bit)?2012(64-bit) ? 10(64-bit))?. %User Temp% ?????? Temp ???????? C:\Documents and Settings\{user name}\Local Settings\Temp (Windows 2000(32-bit)?XP ? Server 2003(32-bit))?C:\Users\{user name}\AppData\Local\Temp (Windows Vista?7?8?8.1?2008(64-bit)?2012(64-bit) ? 10(64-bit)?)

???????:

  • %Windows%\SysWOW64\cmd.exe ? Malicious codes are injected in this process
  • %User Temp%\rgb9rast.exe ? Malicious codes are hollowed in this process
  • cmd.exe /c %System%\WMIC.exe shadow copy where "ID='{ID}'" delete ? Deletes shadow copies

(??: %Windows% ? Windows ???,???? C:\WINDOWS ? C:\WINNT?. %User Temp% ?????? Temp ???????? C:\Documents and Settings\{user name}\Local Settings\Temp (Windows 2000(32-bit)?XP ? Server 2003(32-bit))?C:\Users\{user name}\AppData\Local\Temp (Windows Vista?7?8?8.1?2008(64-bit)?2012(64-bit) ? 10(64-bit)?. %System% ? Windows ? system ???,???? C:\Windows\System (Windows 98 ? ME)?C:\WINNT\System32 (Windows NT ? 2000) ? C:\WINDOWS\system32 (Windows 2000(32-bit)?XP?Server 2003(32-bit)?Vista?7?8?8.1?2008(64-bit),2012(64bit) ? 10(64-bit))?)

????????:

  • %Application Data%\{21 Random Capital Letters}

(??: %Application Data% ?????? Application Data ???,???? C:\Windows\Profiles\{user name}\Application Data (Windows 98 ? ME)?C:\WINNT\Profiles\{user name}\Application Data (Windows NT)?C:\Documents and Settings\{user name}\Local Settings\Application Data (Windows 2000(32-bit)?XP ? Server 2003(32-bit)) ? C:\Users\{user name}\AppData\Roaming (Windows Vista?7?8?8.1?2008(64-bit)?2012(64-bit) ? 10(64-bit))?)

?????????,????????????:

  • knight_0_0_1

????

????????????????????:

  • agntsvc.exe
  • dbeng50.exe
  • dbsnmp.exe
  • encsvc.exe
  • excel.exe
  • firefox.exe
  • isqlplussvc.exe
  • msaccess.exe
  • mspub.exe
  • mydesktopservice.com
  • mydesktopservice.exe
  • notepad.exe
  • ocautoupds.exe
  • ocomm.exe
  • ocssd.exe
  • onenote.exe
  • oracle.exe
  • outlook.exe
  • powerpnt.exe
  • sqbcoreservice.exe
  • sql.exe
  • steam.exe
  • synctime.exe
  • tbirdconfig.exe
  • thebat.exe
  • thunderbird.exe
  • visio.exe
  • winword.exe
  • wordpad.exe
  • xfssvccon.exe

????

???????:

  • OS Version
  • Native System Info
  • Computer Name
  • User Name
  • Host name

??????

????????,???????:

  • https://{BLOCKED}i.org
  • https://i.{BLOCKED}b.co/Gp95Qcw/2286401330.png

?????????:

  • It is capable of encrypting network drives.
  • It empties the recycle bin.
  • It deletes shadow copies using wmic.exe.
  • The main encryptor is capable of accepting the following parameters:
    • -h {host.txt} ? Contains the server names or the DNS/NETBIOS of the remote server
    • -p {path.txt} ? Contains the targeted directories to encrypt
    • -m {local} ? Only encrypt local drives
    • -m {net} ? Only encrypt network drives
    • -log enabled ? Creates a text file for logging
  • When encrypting network drives, it will check if the IP address starts with the following to ensure that it is encrypting local and non-internet systems:
    • 10.
    • 169.
    • 172.
    • 192.168.
  • It adds the following processes to its white list to avoid termination:
    • explorer.exe
    • vmcompute.exe
    • vmms.exe
    • svchost.exe
    • teamviewer.exe

  解决方案

最小(xiǎo)扫描引擎: 9.800
First VSAPI Pattern File: 18.624.05
VSAPI 第一样式发布日期: 2023年8月9日
VSAPI OPR样式版本: 18.625.00
VSAPI OPR样式发布日期: 2023年8月10日

Step 2

??Windows ME?XP??,????,????????????,??????????

Step 3

注意:在此恶意软件/间谍软件/灰色软件执行期间,并非所有(yǒu)文(wén)件、文(wén)件夹和注册表键值和项都会安(ān)装(zhuāng)到您的计算机上。这可(kě)能(néng)是由于不完整的安(ān)装(zhuāng)或其他(tā)操作(zuò)系统条件所致。如果您没有(yǒu)找到相同的文(wén)件/文(wén)件夹/注册表信息,请继续进行下一步操作(zuò)。

Step 4

?????Ransom.Win64.CYCLOPS.A??????

[ 更多(duō) ]
  1. ??Windows 98?ME??,Windows??????????????????????,????????????(??Process Explorer)??????/????/???????????????????
  2. ???????????Windows??????Process Explorer??????,??????????????????????????
  3. ??????????Windows??????Process Explorer???,????????

Step 5

?????????

[ 更多(duō) ]
?????????????????"????"?????????????????,??????????????????
  • %Application Data%\{21 Random Capital Letters}\{21 Random Capital Letters}
  • %User Temp%\{8 Random Alpha Numeric Characters}
  • %User Temp%\rgb9rast.exe
  • {Malware File Path}\KNIGHT_LOG.txt
  • {All Available Drives}\How To Restore Your Files.txt
DATA_GENERIC_FILENAME_1
  • ??????????,??
  • ???????????
  • ????,?????,????SHIFT+DELETE???????
  • ?????????2?4?:
      • %Application Data%\{21 Random Capital Letters}\{21 Random Capital Letters}
      • %User Temp%\{8 Random Alpha Numeric Characters}
      • %User Temp%\rgb9rast.exe
      • {Malware File Path}\KNIGHT_LOG.txt
      • {All Available Drives}\How To Restore Your Files.txt
  • Step 6

    ??????????

    [ 更多(duō) ]
    ?????????????????????????,???????????????;
    • %Application Data%\{21 Random Capital Letters}
    ???????
  • ????,??????,????SHIFT+DELETE????????
  • Step 7

    ?????????????,???????Ransom.Win64.CYCLOPS.A?? ????????????????????????,????????????????????????????????????????

    Step 8

    从备份中(zhōng)恢复加密文(wén)件。