Virus Trojan scan: Behavior Analysis of pandatv burning

Source: Internet
Author: User

Virus Trojan scan: Behavior Analysis of pandatv burning
I. Preface

To analyze the behavior of the pandatv virus, we use Process Monitor v3.10.

Behavior Analysis Aims To write virus killing programs. Of course, due to various restrictions in the real environment, we may not be able to discover all the behaviors of viruses, which I will explain in this article.

 

Monitoring and Analysis on the process tree of panda.exe

Here, I copy the virus and Process Monitor v3.10 to the previously configured Virtual Machine and back up them. Then, enable Process monitor, Add "panda.exe" to the filter's "Process Name" in the condition, and run the virus. First, you can view the Process tree:

Figure 1 process tree

In the progress tree, we can find out spoclsv.exe ". Another step was to launch cmd.exe twice ". The first command to run is cmd.exe/c net share C $/del/yclock. The idea is to delete the network share of the c drive in the command line. After the command is completed, close cmd.exe. Because my system only has one drive C, I believe this virus will shut down the network sharing of All the disks in the system. The second running command is cmd.exe/c net share admin $/del/y. The sharing of the system root directory is canceled here. Then we can summarize the two virus behaviors:

Virus Behavior 1: The virus creates a process named “spoclsv.exe. The path of the Process file is "C: \ WINDOWS \ system32 \ drivers \ spoclsv.exe ".

Virus behavior 2: Use the net share command in command line mode to cancel sharing in the system.

 

Monitoring and Analysis on the registration registry of "panda.exe"

For registry monitoring, we found that there is only one thing to note:

 

 

Figure 2 "panda.exe" writes data to the Registry

Registry has no substantial impact.

 

Siro Monitoring and Analysis of the "panda.exe" File

For file monitoring, there is only one note:

Figure 3 create a file

When "C: \ WINDOWS \ system32 \ drivers" is implemented, the next task is to monitor the process.

 

Monitoring and analysis of the “spoclsv.exe Registry on November 5

Here, the process named “spoclsv.exe is added to the filter for analysis. In general, viruses produce many operations. Therefore, for the convenience of discussion, I will only list several operations for display each time, and other operations will be excluded from the filter. First, you can view the "RegDeleteValue" Operation:

Figure 4 monitor the "RegDeleteValue" Operation in the Registry

It can be seen that the virus program has deleted the self-boot items of almost all security tools at that time, including:

 

Virus Action 3: delete the startup Item of the security software in the registry.

 

Then, only "RegCreateKey" and "RegSetValue" are retained for analysis:

Figure 5 create a self-starting item

It can be seen that the virus program creates a self-startup Item for itself, so that each time the computer starts to execute itself, there are:

Virus behavior 4: Create "svcshare" in the Registry "HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Run" for "C: \ WINDOWS \ system32 \ drivers \ spoclsv.exe "virus program.

Next we will see:

Figure 6 hide a file

You can set the location of the Registry to hide files. After setting, even if you select "show all files and folders" in "Folder Options", the hidden files cannot be displayed:

Virus behavior 5: Modify the registry so that hidden files cannot be displayed through common settings. The location is: HKLM \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SHOWALL. The virus sets the CheckedValue to 0.

Now, the Registry is basically analyzed.

 

Monitoring and analysis of the “spoclsv.exe file in cat6

File Monitoring mainly depends on whether the virus copies itself to another directory, or what files have been created and deleted. The monitoring is as follows:

 

 

Figure 7 Monitoring File Operations

As shown in the figure, the virus file creates spoclsv.exe.exe in "C: \ WINDOWS \ system32 \ drivers.pdf", and creates “setup.exe and "autorun. inf, and create "Desktop _. ini file. Since the SHOWALL items in the Registry are set after these files are created, the hidden files cannot be displayed. Therefore, we have reason to believe that the attributes of these files are "hidden, so there are:

Virus behavior 6: add your own beibeibeito the root directory and name it as paisetup.exe. At the same time, create "autorun. inf" for virus startup. The attributes of these two files are "hidden ".

Virus behavior 7: Create a hidden file named "Desktop _. ini" in some directories.

 

7. Monitoring and Analysis on the “spoclsv.exe Network

Currently, only network monitoring is performed to check whether the virus is connected to the Internet:

Figure 8 Monitoring Network Operations

From the monitoring results, we can see that the virus will send and receive information to "124.16.31.148", and constantly try to connect to "10.0.2.X", that is, other computers in the LAN, so there are:

Virus behavior 8: send packets to other machines in the LAN.

 

VIII. Summary

So far, we have summarized the eight-point behavior of the virus. During the analysis, I basically mentioned it in a word, mainly because the virus is relatively simple, it is also invisible to the Process Monitor. However, please note that the above eight points do not represent all the behaviors of viruses, because more detailed conclusions can be obtained through reverse analysis. Through the above analysis results, we can write the exclusive killing tool, which will be detailed in the next article.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.