Ransom.Win64.HORUSKRYPT.THIAGBD
Ransom:Win64/Akira.CCDR!MTB
Windows

恶意软件类型:
Ransomware
有(yǒu)破坏性?:
没有(yǒu)
加密?:
没有(yǒu)
In the Wild:
是的
概要
它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。
技(jì )术详细信息
新(xīn)病毒详细信息
它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。
安(ān)装(zhuāng)
它在受感染的系统中(zhōng)植入下列自身副本:
- %User Startup%\{32 random alphanumeric}.exe
(注意: %User Startup% 是当前用(yòng)户的启动文(wén)件夹,通常位于 C:\Windows\Profiles\{user name}\Start Menu\Programs\Startup (Windows 98 和 ME)、C:\WINNT\Profiles\{user name}\Start Menu\Programs\Startup (Windows NT)、C:\Documents and Settings\{User name}\Start Menu\Programs\Startup (Windows 2003(32-bit)、XP、2000(32-bit)) 和 C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (Windows Vista、7、8、8.1、2008(64-bit)、2012(64-bit)、10(64-bit))。)
它植入下列文(wén)件:
- %ProgramData%\{32 random alphanumeric}.ico → icon of encrypted files
- %ProgramData%\{32 random alphanumeric}.bmp → desktop wallpaper after encryption
它添加下列进程:
- vssadmin Delete Shadows /All /Quiet
- bcdedit /set {default} recoveryenabled No
- bcdedit /set {default} bootstatuspolicy ignoreallfailures
- wmic SHADOWCOPY /nointeractive
它添加下列互斥条目,确保一次只会运行一个副本:
- 51A301AD-3CCF-413A-AD80-A507DDCFF34C
其他(tā)系统修改
它添加下列注册表项:
HKEY_CLASSES_ROOT\.h0rus13\DefaultIcon
{default} = %ProgramData%\{32 random alphanumeric}.ic
HKEY_CURRENT_USER\Software\Krypt
public = {hex values}
HKEY_CURRENT_USER\Software\Krypt
full = {hex values}
它修改下列注册表项:
HKEY_LOCAL_MACHINESoftware\Policies\Microsoft\
Windows Defender
DisableAntiSpyware = 1
HKEY_LOCAL_MACHINESoftware\Policies\Microsoft\
Windows Defender
DisableRealtimeMonitoring = 1
HKEY_LOCAL_MACHINE\Software\Policies\
Microsoft\Windows NT\SystemRestore
DisableSR = 1
HKEY_LOCAL_MACHINE\Software\Policies\
Microsoft\Windows NT\SystemRestore
DisableConfig = 1
HKEY_LOCAL_MACHINE\Software\Policies\
Microsoft\Windows\WinRE
DisableSetup = 1
HKEY_LOCAL_MACHINE\Software\Policies\
Microsoft\Windows\Backup\
Client
DisableRestoreUI = 1
HKEY_LOCAL_MACHINE\Software\Policies\
Microsoft\Windows\Backup\
Client
DisableBackupLauncher = 1
HKEY_LOCAL_MACHINE\Software\Policies\
Microsoft\Windows\Backup\
Client
DisableSystemBackupUI = 1
HKEY_LOCAL_MACHINE\Software\Policies\
Microsoft\Windows\Backup\
Client
DisableBackupUI = 1
它将系统的桌面壁纸设置為(wèi)下列图像:
进程终止
它终止在受感染的系统上运行的下列服務(wù):
- wrapper
- DefWatch
- ccEvtMgr
- ccSetMgr
- SavRoam
- Sqlservr
- sqlagent
- sqladhlp
- Culserver
- RTVscan
- sqlbrowser
- SQLADHLP
- QBIDPService
- Intuit.QuickBooks.FCS
- QBCFMonitorService
- msmdsrv
- tomcat6
- zhudongfangyu
- vmware-usbarbitator64
- vmware-converter
- dbsrv12
- dbeng8
- MSSQL$MICROSOFT##WID
- MSSQL$VEEAMSQL2012
- SQLAgent$VEEAMSQL2012
- SQLBrowser
- SQLWriter
- FishbowlMySQL
- MSSQL$MICROSOFT##WID
- MySQL57
- MSSQL$KAV_CS_ADMIN_KIT
- MSSQLServerADHelper100
- SQLAgent$KAV_CS_ADMIN_KIT
- msftesql-Exchange
- MSSQL$MICROSOFT##SSEE
- MSSQL$SBSMONITORING
它终止在受感染的系统内存中(zhōng)运行的下列进程:
- wxserver
- wxserverview
- sqlmangr
- ragui
- supervise
- culture
- defwatch
- winword
- qbw32
- qbdbmgr
- qbupdate
- axlbridge
- httpd
- fdlauncher
- msdtsrvr
- java
- 360se
- 360doctor
- wdswfsafe
- fdhost
- gdscan
- zhudongfangyu
- qbdbmgrn
- mysqld
- autodeskdesktopapp
- acwebbrowser
- creative cloud
- adobe desktop service
- coresync
- adobe cef
- helper
- node
- adobeipcbroker
- sync-taskbar
- sync-worker
- inputpersonalization
- adobecollabsync
- brctrlcntr
- brccuxsys
- simplyconnectionmanager
- simply.systemtrayicon
- fbguard
- fbserver
- onenotem
- wsa_service
- koaly-exp-engine-service
- teamviewer_service
- teamviewer
- tv_w32
- tv_x64
- titanv
- ssms
- notepad
- rdrcef
- sam
- oracle
- ocssd
- dbsnmp
- synctime
- agntsvc
- isqlplussvc
- xfssvccon
- mydesktopservice
- ocautoupds
- encsvc
- tbirdconfig
- mydesktopqos
- ocomm
- dbeng50
- sqbcoreservice
- exce
- infopath
- msaccess
- mspub
- onenote
- outlook
- powerpnt
- steam
- thebat
- thunderbird
- visio
- wordpad
- bedbh
- vxmon
- benetns
- bengien
- pvlsvr
- beserver
- raw_agent_svc
- vsnapvss
- cagservice
- dellsystemdetect
- enterpriseclient
- processhacker
- procexp64
- procexp
- glasswire
- gwctlsrv
- wireshark
- dumpcap
- j0gnjko1
- autoruns
- autoruns64a
- autorunsc
- autorunsc64a
- sysmon
- sysmon64
- procexp64a
- procmon
- procmon64
- procmon64a
- adexplorer
- adexplorer64
- adexplorer64a
- tcpview
- tcpview64
- tcpview64a
- avz
- tdsskiller
- raccineelevatedcfg
- raccinesettings
- raccine_x86
- raccine
- sqlservr
- rtvscan
- sqlbrowser
- tomcat6
- qbidpservice
- notepad++
- systemexplorer
- systemexplorerservice
- systemexplorerservice64
- totalcmd
- totalcmd64
- veeamdeploymentsvc
- notepad
信息窃取
它收集下列数据:
- Volume Information
其他(tā)详细信息
它添加下列注册表键值:
HKEY_CURRENT_USER\Software\Krypt
HKEY_CLASSES_ROOT\.h0rus13
HKEY_CLASSES_ROOT\.h0rus13\DefaultIcon
HKEY_CURRET_USER\.h0rus13
HKEY_CURRET_USER\.h0rus13\DefaultIcon
该程序执行以下操作(zuò):
- It encrypts local, removable, and network drives.
- It empties the recycle bin.
- It terminates itself if the keyboard layout of the infected machine is the following:
- Persian/Iran
- It terminates itself if the GUID was found in the system:
- 51A301AD-3CCF-413A-AD80-A507DDCFF34C
- It changes the encrypted file icon to the following image:
解决方案
Step 2
对于Windows ME和XP用(yòng)户,在扫描前,请确认已禁用(yòng)系统还原功能(néng),才可(kě)全面扫描计算机。
Step 3
注意:在此恶意软件/间谍软件/灰色软件执行期间,并非所有(yǒu)文(wén)件、文(wén)件夹和注册表键值和项都会安(ān)装(zhuāng)到您的计算机上。这可(kě)能(néng)是由于不完整的安(ān)装(zhuāng)或其他(tā)操作(zuò)系统条件所致。如果您没有(yǒu)找到相同的文(wén)件/文(wén)件夹/注册表信息,请继续进行下一步操作(zuò)。
Step 4
删除该注册表键值
注意事项:错误编辑Windows注册表会导致不可(kě)挽回的系统故障。只有(yǒu)在您掌握后或在系统管理(lǐ)员的帮助下才能(néng)完成这步。或者,请先阅读Microsoft文(wén)章,然后再修改计算机注册表。
- In HKEY_CURRENT_USER\Software\Krypt
- In HKEY_CLASSES_ROOT\.h0rus13
- In HKEY_CLASSES_ROOT\.h0rus13\DefaultIcon
- In HKEY_CURRET_USER\.h0rus13
- In HKEY_CURRET_USER\.h0rus13\DefaultIcon
Step 5
删除该注册表值
注意事项:错误编辑Windows注册表会导致不可(kě)挽回的系统故障。只有(yǒu)在您掌握后或在系统管理(lǐ)员的帮助下才能(néng)完成这步。或者,请先阅读Microsoft文(wén)章,然后再修改计算机注册表。
- In HKEY_CLASSES_ROOT\.h0rus13\DefaultIcon
- {default} = %ProgramData%\{32 random alphanumeric}.ico
- {default} = %ProgramData%\{32 random alphanumeric}.ico
- In HKEY_CURRENT_USER\Software\Krypt
- public = {hex values}
- public = {hex values}
- In HKEY_CURRENT_USER\Software\Krypt
- full = {hex values}
- full = {hex values}
Step 6
恢复该修改的注册表值
注意事项:错误编辑Windows注册表会导致不可(kě)挽回的系统故障。只有(yǒu)在您掌握后或在系统管理(lǐ)员的帮助下才能(néng)完成这步。或者,请先阅读Microsoft文(wén)章,然后再修改计算机注册表。
RESTOREStep 7
搜索和删除该文(wén)件
- %User Startup%\{32 random alphanumeric}.exe
- %ProgramData%\{32 random alphanumeric}.ico
- %ProgramData%\{32 random alphanumeric}.bmp
- {encrypted directory}\#HowToRecover.txt
- %Desktop%\#HowToRecover.txt
Step 8
使用(yòng)亚信安(ān)全产(chǎn)品扫描计算机,并删除检测到的Ransom.Win64.HORUSKRYPT.THIAGBD文(wén)件 如果检测到的文(wén)件已被亚信安(ān)全产(chǎn)品清除、删除或隔离,则无需采取进一步措施。可(kě)以选择直接删除隔离的文(wén)件。请参阅知识库页(yè)面了解详细信息。
Step 9
从备份中(zhōng)恢复加密文(wén)件。