Bad u disk virus Worm.Pabug.ck (OSO.exe) Analysis and killing _ virus killing

Source: Internet
Author: User
Virus Name: Worm.Pabug.ck

Size: 38,132 bytes
md5:2391109c40ccb0f982b86af86cfbc900
Adding Shell way: FSG2.0
Written Language: Delphi
How to spread: through mobile media or Web page malicious script propagation

Through the virtual machine operation, and after the Shell OD analysis, its behavior is as follows:

File creation:
%systemroot%\system32\gfosdg.exe
%systemroot%\system32\gfosdg.dll
%systemroot%\system32\severe.exe
%systemroot%\system32\drivers\mpnxyl.exe
%systemroot%\system32\drivers\conime.exe
%systemroot%\system32\hx1.bat
%systemroot%\system32\noruns.reg
X:\OSO.exe
X:\autorun.inf
X refers to a non-system drive letter
The%systemroot% is an environment variable, and the default path is the C:\WINDOWS folder for the Windows XP system installed on C disk, which is analyzed with this assumption.

To create a process:
%systemroot%\system32\gfosdg.exe
%systemroot%\system32\severe.exe
%systemroot%\system32\drivers\conime.exe

Use net stop command to end a possible anti-virus software service

Call Sc.exe,
config [corresponding service] start=disabled
Disable these services

The services that are closed and disabled include:
Srservice
SharedAccess (This is the system with its own firewall--I note)
Kvwsc
Kvsrvxp
Kavsvc
Rsravmon
Rsccenter

Among them, in the end of the process of rising services, because rising will pop-up prompts, the virus has been treated accordingly:
Use the Findwindowa function to capture a window titled "Rising Hint"
Use the Findwindowexa function to find the "Yes (&y)" button
Use the SendMessageA function to send information to the system, which is equivalent to pressing this button


Disables or ends the following processes, including but not limited to:
PFW.exe
Kav.exe
KVOL.exe
KVFW.exe
Adam.exe
Qqav.exe
Qqkav.exe
TBMon.exe
Kav32.exe
Kvwsc.exe
CCAPP.exe
EGHOST.exe
KRegEx.exe
Kavsvc.exe
VPTray.exe
RAVMON.exe
KavPFW.exe
SHSTAT.exe
RavTask.exe
Trojdie.kxp
Iparmor.exe
MAILMON.exe
MCAGENT.exe
KAVPLUS.exe
RavMonD.exe
Rtvscan.exe
Nvsvc32.exe
KVMonXP.exe
Kvsrvxp.exe
CCenter.exe
KpopMon.exe
RfwMain.exe
KWATCHUI.exe
MCVSESCN.exe
MSKAGENT.exe
Kvolself.exe
Kvcenter.kxp
Kavstart.exe
RAVTIMER.exe
RRfwMain.exe
FireTray.exe
UpdaterUI.exe
Kvsrvxp_1.exe
RavService.exe

Create the Noruns.reg and import the registry, and then delete the file. Import Content:
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDriveTypeAutoRun" =dword:b5
Changing the autorun of the drive (not implemented in my virtual machine)

Modify the registry to create a startup item (later items visible in the Sreng log):
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
<mpnxyl><C:\WINDOWS\system32\gfosdg.exe> [n/A]
<gfosdg><C:\WINDOWS\system32\severe.exe> [n/A]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
<shell><explorer.exe c:\windows\system32\drivers\conime.exe> [n/A]

In order to prevent rising registry monitoring tips, so the dancers to apply:
Use the Findwindowa function to capture the window titled "Rising Registry Monitor Prompt"
Using Mouse_event to control the mouse automatically select Allow modification.

Access to the registry
[Hkey_local_machine\software\microsoft\windows\currentversion\explorer\advanced\folder\hidden\showall]
CheckedValue Key
Destroys the ability to display hidden files (this is not implemented in my virtual machine, may be blocked by tiny or SSM by default)


However, after doing so much work to remove the anti-virus software, the author seems to feel not insured, he finally resorted to the "killer":
In the registry
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options]
To create a subkey with the name of a security software program

Subkeys are created in child keys
"Debugger" = "C:\\windows\\system32\\drivers\\mpnxyl.exe"
Allows these programs to run when they are double-clicked and run virus files Mpnxyl.exe
Shaped like:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe]
"Debugger" = "C:\\windows\\system32\\drivers\\mpnxyl.exe"

These items are clearly visible in the Autoruns log, as well as the procedures that are "ravaged" by this technique:
+ 360Safe.exe C:\windows\system32\drivers\mpnxyl.exe
+ Adam.exe C:\windows\system32\drivers\mpnxyl.exe
+ avp.com C:\windows\system32\drivers\mpnxyl.exe
+ Avp.exe C:\windows\system32\drivers\mpnxyl.exe
+ IceSword.exe C:\windows\system32\drivers\mpnxyl.exe
+ Iparmo.exe C:\windows\system32\drivers\mpnxyl.exe
+ Kabaload.exe C:\windows\system32\drivers\mpnxyl.exe
+ KRegEx.exe C:\windows\system32\drivers\mpnxyl.exe
+ KvDetect.exe C:\windows\system32\drivers\mpnxyl.exe
+ Kvmonxp.kxp C:\windows\system32\drivers\mpnxyl.exe
+ Kvxp.kxp C:\windows\system32\drivers\mpnxyl.exe
+ MagicSet.exe C:\windows\system32\drivers\mpnxyl.exe
+ Mmsk.exe C:\windows\system32\drivers\mpnxyl.exe
+ msconfig.com C:\windows\system32\drivers\mpnxyl.exe
+ Msconfig.exe C:\windows\system32\drivers\mpnxyl.exe
+ PFW.exe C:\windows\system32\drivers\mpnxyl.exe
+ PFWLiveUpdate.exe C:\windows\system32\drivers\mpnxyl.exe
+ QQDoctor.exe C:\windows\system32\drivers\mpnxyl.exe
+ Ras.exe C:\windows\system32\drivers\mpnxyl.exe
+ Rav.exe C:\windows\system32\drivers\mpnxyl.exe
+ RavMon.exe C:\windows\system32\drivers\mpnxyl.exe
+ regedit.com C:\windows\system32\drivers\mpnxyl.exe
+ Regedit.exe C:\windows\system32\drivers\mpnxyl.exe
+ Runiep.exe C:\windows\system32\drivers\mpnxyl.exe
+ SREng.EXE C:\windows\system32\drivers\mpnxyl.exe
+ Trojdie.kxp C:\windows\system32\drivers\mpnxyl.exe
+ WoptiClean.exe C:\windows\system32\drivers\mpnxyl.exe

Delete the card helper's DLL file Kakatool.dll (did so, the results of the virtual machine run and the contents of the program code are matched)

In order to block the "back" of the poisoned people, another despicable method was adopted.
To modify the Hosts file, shielding antivirus software manufacturer's website, the card community "fortunate" to become one of the masked members:
This is the result that later uses Sreng to see, in the program code also has the corresponding content:

127.0.0.1 mmsk.cn
127.0.0.1 ikaka.com
127.0.0.1 safe.qq.com
127.0.0.1 360safe.com
127.0.0.1 www.mmsk.cn
127.0.0.1 www.ikaka.com
127.0.0.1 tool.ikaka.com
127.0.0.1 www.360safe.com
127.0.0.1 zs.kingsoft.com
127.0.0.1 forum.ikaka.com
127.0.0.1 up.rising.com.cn
127.0.0.1 scan.kingsoft.com
127.0.0.1 kvup.jiangmin.com
127.0.0.1 reg.rising.com.cn
127.0.0.1 update.rising.com.cn
127.0.0.1 update7.jiangmin.com
127.0.0.1 download.rising.com.cn
127.0.0.1 dnl-us1.kaspersky-labs.com
127.0.0.1 dnl-us2.kaspersky-labs.com
127.0.0.1 dnl-us3.kaspersky-labs.com
127.0.0.1 dnl-us4.kaspersky-labs.com
127.0.0.1 dnl-us5.kaspersky-labs.com
127.0.0.1 dnl-us6.kaspersky-labs.com
127.0.0.1 dnl-us7.kaspersky-labs.com
127.0.0.1 dnl-us8.kaspersky-labs.com
127.0.0.1 dnl-us9.kaspersky-labs.com
127.0.0.1 dnl-us10.kaspersky-labs.com
127.0.0.1 dnl-eu1.kaspersky-labs.com
127.0.0.1 dnl-eu2.kaspersky-labs.com
127.0.0.1 dnl-eu3.kaspersky-labs.com
127.0.0.1 dnl-eu4.kaspersky-labs.com
127.0.0.1 dnl-eu5.kaspersky-labs.com
127.0.0.1 dnl-eu6.kaspersky-labs.com
127.0.0.1 dnl-eu7.kaspersky-labs.com
127.0.0.1 dnl-eu8.kaspersky-labs.com
127.0.0.1 dnl-eu9.kaspersky-labs.com
127.0.0.1 dnl-eu10.kaspersky-labs.com

Other than that:

Hx1.bat content:
@echo off
Set Date=2004-1-22
Ping * * * localhost > nul
Date%date%
Del%0

Change the date? But it didn't happen in the virtual machine.

Content of Autorun.inf:
[AutoRun]
Open=oso.exe
Shellexecute=oso.exe
Shell\auto\command=oso.exe

If you want to judge from the right menu, unfortunately, the right button menu can not see the exception, whether you double-click or right button, the same will activate the virus!

Tiny also records that the virus shuts down the System Restore service and then opens it. This may result in loss of the restore point.

So far this very bad virus analysis of the behavior of the ending, the following description of the removal method (above the content to see Dizzy members, directly see the removal method can)


The elimination method boils down to a sentence: "Survive in The gap"
IceSword.exe, SREng.exe are banned, but only by renaming the file, you can still run
Autoruns.exe is not in the forbidden ranks.
The other proscribed procedures, the lifting of a step-by-step ban

Specific process:

To end a process:
%systemroot%\system32\gfosdg.exe
%systemroot%\system32\severe.exe
%systemroot%\system32\drivers\conime.exe
The virus was not found to disable Task Manager. You can also use other tools such as PROCEXP, etc.

Use Autoruns to delete the following items (recommended with Autoruns, one is not banned, the second is at a glance, note that the first choice options-hide Microsoft Entries):
+ 360Safe.exe C:\windows\system32\drivers\mpnxyl.exe
+ Adam.exe C:\windows\system32\drivers\mpnxyl.exe
+ avp.com C:\windows\system32\drivers\mpnxyl.exe
+ Avp.exe C:\windows\system32\drivers\mpnxyl.exe
+ IceSword.exe C:\windows\system32\drivers\mpnxyl.exe
+ Iparmo.exe C:\windows\system32\drivers\mpnxyl.exe
+ Kabaload.exe C:\windows\system32\drivers\mpnxyl.exe
+ KRegEx.exe C:\windows\system32\drivers\mpnxyl.exe
+ KvDetect.exe C:\windows\system32\drivers\mpnxyl.exe
+ Kvmonxp.kxp C:\windows\system32\drivers\mpnxyl.exe
+ Kvxp.kxp C:\windows\system32\drivers\mpnxyl.exe
+ MagicSet.exe C:\windows\system32\drivers\mpnxyl.exe
+ Mmsk.exe C:\windows\system32\drivers\mpnxyl.exe
+ msconfig.com C:\windows\system32\drivers\mpnxyl.exe
+ Msconfig.exe C:\windows\system32\drivers\mpnxyl.exe
+ PFW.exe C:\windows\system32\drivers\mpnxyl.exe
+ PFWLiveUpdate.exe C:\windows\system32\drivers\mpnxyl.exe
+ QQDoctor.exe C:\windows\system32\drivers\mpnxyl.exe
+ Ras.exe C:\windows\system32\drivers\mpnxyl.exe
+ Rav.exe C:\windows\system32\drivers\mpnxyl.exe
+ RavMon.exe C:\windows\system32\drivers\mpnxyl.exe
+ regedit.com C:\windows\system32\drivers\mpnxyl.exe
+ Regedit.exe C:\windows\system32\drivers\mpnxyl.exe
+ Runiep.exe C:\windows\system32\drivers\mpnxyl.exe
+ SREng.EXE C:\windows\system32\drivers\mpnxyl.exe
+ Trojdie.kxp C:\windows\system32\drivers\mpnxyl.exe
+ WoptiClean.exe C:\windows\system32\drivers\mpnxyl.exe

This includes some programs, including IceSword, Sreng, Registry Editor, and System Configuration Utility, that are no longer prohibited

To delete or modify a startup item:
Take Sreng as an example
Delete in Startup Project-registry:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
<mpnxyl><C:\WINDOWS\system32\gfosdg.exe> [n/A]
<gfosdg><C:\WINDOWS\system32\severe.exe> [n/A]

Double-click the following items to delete the contents of the Explorer.exe after the value
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
<shell><explorer.exe c:\windows\system32\drivers\conime.exe> [n/A]

To delete a file:
Because non-system disks can be dangerous even if the right button is opened, other methods should be used to recommend using IceSword or WinRAR.
Delete:
%systemroot%\system32\gfosdg.exe
%systemroot%\system32\gfosdg.dll
%systemroot%\system32\severe.exe
%systemroot%\system32\drivers\mpnxyl.exe
%systemroot%\system32\drivers\conime.exe
%systemroot%\system32\hx1.bat
%systemroot%\system32\noruns.reg
X:\OSO.exe
X:\autorun.inf

System repair and Cleanup:

Expand in Registry
[Hkey_local_machine\software\microsoft\windows\currentversion\explorer\advanced\folder\hidden\showall]
It is recommended to delete the original CheckedValue key and create a new normal key value:
"CheckedValue" =dword:00000001

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
NoDriveTypeAutoRun the value of the key, whether to change, what to change, depending on the needs of each person, the general default is 91 (16)
The meaning of this key, please search online information, no longer repeat

Cleaning of Hosts files
You can open%systemroot%\system32\drivers\etc\hosts with Notepad to clear what's been added to the virus.
You can also use Sreng to reset in the midpoint of system repair-Hosts file, and then click Save

Finally fixes the service to be destroyed the anti-virus software.

Summary:
From the sample to the method of completion, lasted a full five hours. The reason why this is so detailed is that the virus is quite typical, especially the way it copes with security software. The right key menu does not change, it is also more "hidden" and to remove the trouble of a feature. To deal with this virus, but also in the "enemy" on the basis of flexible use of methods and tools.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.