查看: 296358|回复: 2987

[转载]对某恶意软件的分析案例

[复制链接]
  • TA的每日心情
    擦汗
    2019-10-17 06:41
  • 签到天数: 182 天

    [LV.7]常住居民III

    发表于 2016-4-17 15:48:14 | 显示全部楼层 |阅读模式
    对某恶意软件的分析案例(转载自EvilZone)
    我看了,文章写的非常好,是一个doc捆绑的经典案例
    Analyzing Malware By Example: Part 1

    In this tutorial you will learn how to perform basic static analysis on a malicious sample. Please make sure to prepare a safe analysis environment on your machine before you start.

    I strongly encourage you actually do the things that are explained here on your analysis environment. Merely reading the tutorial is not enough.

    Our Sample:

    Download the zip file with sample here: sample.zip

    The password is "infected".

    File Type Analysis

    You have sample now that you want to analyse, but you don't know what kind of file it is. The file type or the format it is made of is the most important thing to start with. Once you know the file format you are able to decide which tools are suitable for analysis.

    If you are only used to a Windows environment, you may be skeptic about the usefulness of file type analysis. Afterall the file extension of a file will show in most cases the correct type, e.g., .exe for executable programs, .doc for Microsoft Word files etc.
    But it is not that easy. · The file extension can be spoofed· With the right command you can execute any file regardless of the file extension.· Temporary files often have the file extension .tmp regardless of their file type.· Therefore, malware often has the wrong file extension.· Depending were you get the samples, they will likely not have any file extension. Samples shared by researches often just have the hash as their filename.· You should be able to detect the type of embedded files.So how do you get to know the file type of a sample?
    File types are determined by file signatures, which are usually at the very beginning of the file. A signature is a specific sequence of bytes that was defined by the file format specification so the correct file type can be verified by applications that parse these files.
    A large list of file type signatures is at http://www.garykessler.net/library/file_sigs.html

    Most malware analysts know the file type signature or other typical strings of most common file types by rote, because they see them every day. So they often just open the file in a hex editor and can tell what is inside.

    However, if you don't know how certain files typically look like, you might also run a file type parser or scanner. Linux has in inbuilt file type parser, which is:Codefile <sample>
    On both Linux and Windows you can use TdID, which has over 6000 file type definitions. Download TdID now and try it with our sample.

    Tip for command prompt usage on Windows: Navigate to the trid_w32 folder, hold Shift, then rightclick on the folder and click open command window here (see also link).
    A command prompt will open in the folder where you had the focus on. Type
    trid.exe, then drag the sample into the command prompt and press Enter.

    (Note: I take as a given that you can navigate your command prompt if you use Linux.)

    If you get a message that says "No definitions available!" you need to download a the newest definition database from here (scroll down to the Download section and choose TrIDDefs.TRD package). Unpack the ZIP file and put the triddefs.trd into the same folder as trid.exe. Apply trid.exe on our sample and you should get an output like this:CodeTrID/32 - File Identifier v2.20 - (C) 2003-15 By M.Pontello
    Definitions found:  6108
    Analyzing...

    Collecting data from file: 048714ed23c86a32f085cc0a4759875219bdcb0eb61dabb2ba03de09311a1827
    45.7% (.DOC) Microsoft Word document (32000/1/3)
    42.8% (.XLS) Microsoft Excel sheet (30000/1/2)
    11.4% (.) Generic OLE2 / Multistream Compound File (8000/1)
    That means our sample is most likely a Word or Excel document.
    If you used the Linux file command on the sample, you will get an even more detailed output, because it is able to parse a lot of file types.

    Now that we have an idea, let's use a hex editor. It can be any of your choice.
    Scroll a bit through the file and see if you recognise any strings.
    At some point you might see this:
    图片1.png

    This tells you that our sample is a Microsoft Word document.

    Another possibily of research: Check if the file is listed on Virustotal. For that you may get the file hash. Linux has again an inbuilt command called sha256sum to calculate a hash value. For Windows you may use a program like HashCheck.

    Virustotal does not only list detections, it also shows lots of additional information about the file, depending on the filetype.
    You can of course upload the file, but often there are reasons not to do so. The file might contain private information that shouldn't be available on the web. You must be aware that every file you upload on Virustotal is available for everyone who pays for file access.

    Looking at the Code

    Our sample is a Microsoft Office document, most likely a Word document. There are great tools out there to analyse these documents.

    Download OfficeMalScanner and extract the ZIP file and execute the OfficeMalScanner.exe via command line. You will see usage information.Code+------------------------------------------+
    |           OfficeMalScanner v0.61         |
    |  Frank Boldewin / www.reconstructer.org  |
    +------------------------------------------+

    Usage:
    ------
    OfficeMalScanner <PPT, DOC or XLS file> <scan | info> <brute> <debug>

    Options:
      scan    - scan for several shellcode heuristics and encrypted PE-Files
      info    - dumps OLE structures, offsets+length and saves found VB-Macro code
      inflate - decompresses Ms Office 2007 documents, e.g. docx, into a temp dir
    Switches: (only enabled if option "scan" was selected)
      brute - enables the "brute force mode" to find encrypted stuff
      debug - prints out disassembly resp hexoutput if a heuristic was found

    Examples:
      OfficeMalScanner evil.ppt scan brute debug
      OfficeMalScanner evil.ppt scan
      OfficeMalScanner evil.ppt info

    Malicious index rating:
      Executables: 20
      Code       : 10
      STRINGS    :  2
      OLE        :  1

    ----------------------------------------------------------------------------
        I strongly suggest you to scan malicious files in a safe environment
    like VMWARE, as this tool is written in C and might have exploitable bugs!
    ----------------------------------------------------------------------------
    Apply the scan mode with the following command:CodeOfficeMalScanner.exe <samplename> scan
    It will verify that this is a Word document:Code
  • Ms Office OLE2 Compound Format document detected
  • Format type Winword
    And it will tell you that it found no malicious traces, but this is an automated analysis. Always check the file yourself. Run the info mode to extract any Macro code from the file.CodeOfficeMalScanner.exe <samplename> info
    The program tells you that it found VB-Macro Code in the file and where the Macro code is saved to. Navigate to that location.
    I strongly recommend that you use Notepad++ to open the extracted VB code. In the Menue choose Language --> V --> VB to get proper syntax highlighting.

    You will see a lot of code that does not look useful. Adding clutter is a common way of obfuscation.
    Press Ctrl + F to open the search window and search for the string "environ". A description of the function is here: https://msdn.microsoft.com/en-us/library/office/gg264486.aspxQuoteReturns the String associated with an operating system environment variable.
    A lot of malware authors use this function to determine the location of the Temp folder.
    Other typical functions you might search for in unknown Macro scripts are:CodeShell
    StrReverse
    Chr
    Put
    Write
    .exe
    Open
    ResponseBody
    Binary
    These will lead you to the relevant code parts if you have a lot of clutter in the code.

    In this part of the code you can see some interesting hex strings. To get the meaning of these hex strings open a terminal and the python interpreter (or use another language you are more comfortable with).Codeunknown = "568756E2E69626F237A6F2D6F636E24756E6F686361666F2F2A307474786"
    We save one of the strings in a variable.
    The VBA macro reverses the string, so we do the same:Codereversed = unknown[::-1]
    The last step is to transform this hex representation into a readable string.Codereversed.decode("hex")
    The result will show you a download path for an executable. Warning: Even if it is tempting, you must not visit a website found in malicious files! But you may do some additional research with whois.

    The other strings can be obtained the same way:Code"05D45445"[::-1].decode("hex")
    You will get the following stringsCodehxxp://fachonet.com/js/bin.exe
    \\YEWZMJFAHIB.exe
    TEMP
    Search for some of the other keywords that I told you and explore the code. You will find the code that writes the file to disk and the part that runs it.

    Obviously this document downloads a file from hxxp :// fachonet . com/js / bin . exe, saves it as YEWZMJFAHIB.exe into the TEMP directory and runs it. This kind of malware is called macro downloader.

    That was the first malware analysis tutorial. Macro malware seemed dead for while, but a new wave of it popped up. Office malware samples are usually droppers or downloaders that are spread via email. That makes them the initial carriers of infections.

  • 回复

    使用道具 举报

  • TA的每日心情
    奋斗
    2021-12-20 19:06
  • 签到天数: 554 天

    [LV.9]以坛为家II

    发表于 2016-4-17 18:53:24 | 显示全部楼层
    还请翻译下
    回复 支持 反对

    使用道具 举报

  • TA的每日心情
    开心
    2022-10-21 10:32
  • 签到天数: 11 天

    [LV.3]偶尔看看II

    发表于 2016-4-17 21:21:29 | 显示全部楼层
    回复 支持 反对

    使用道具 举报

  • TA的每日心情

    2024-4-10 00:14
  • 签到天数: 913 天

    [LV.10]以坛为家III

    发表于 2016-4-17 23:36:22 | 显示全部楼层
    英语没及过格
    回复 支持 反对

    使用道具 举报

    该用户从未签到

    发表于 2016-4-18 01:06:22 | 显示全部楼层
    回复 支持 反对

    使用道具 举报

    该用户从未签到

    发表于 2016-4-18 05:52:39 | 显示全部楼层
    回复 支持 反对

    使用道具 举报

    该用户从未签到

    发表于 2016-4-18 06:22:20 | 显示全部楼层
    回复 支持 反对

    使用道具 举报

  • TA的每日心情
    郁闷
    2016-4-13 21:38
  • 签到天数: 1 天

    [LV.1]初来乍到

    发表于 2016-4-18 11:50:44 | 显示全部楼层
    谢谢楼主的分享
    回复 支持 反对

    使用道具 举报

    该用户从未签到

    发表于 2016-4-18 11:57:37 | 显示全部楼层
    支持中国红客联盟(ihonker.org)
    回复 支持 反对

    使用道具 举报

  • TA的每日心情
    无聊
    2017-9-11 15:40
  • 签到天数: 425 天

    [LV.9]以坛为家II

    发表于 2016-4-18 14:00:15 | 显示全部楼层
    诺,转你妹的,还故意不翻译装逼,不过还好我看得懂
    回复 支持 反对

    使用道具 举报

    您需要登录后才可以回帖 登录 | 注册

    本版积分规则

    指导单位

    江苏省公安厅

    江苏省通信管理局

    浙江省台州刑侦支队

    DEFCON GROUP 86025

    旗下站点

    邮箱系统

    应急响应中心

    红盟安全

    联系我们

    官方QQ群:112851260

    官方邮箱:security#ihonker.org(#改成@)

    官方核心成员

    Archiver|手机版|小黑屋| ( 苏ICP备2021031567号 )

    GMT+8, 2024-4-26 22:02 , Processed in 0.049548 second(s), 12 queries , Gzip On, MemCache On.

    Powered by ihonker.com

    Copyright © 2015-现在.

  • 返回顶部