今天才发现前天手工清除的"代理木马下载器"病毒不干净。它总是复活,甚至在我重装了N次系统以后,被改成www.4419.com的IE首页还在向我自豪地笑。最后终于发现。病毒原来隐藏在D盘的QQ里。今天花了一个晚上时间研究了一下它做些什么。下面是研究资料和我认为比较彻底的清除方法。
一、监视病毒网页、文件目录和注册表获得的信息
使用工具: filemonNT by Mark Russinovich and Bryce Cogswell http://www.sysinternals.com
Regmon by Mark Russinovich and Bryce Cogswell http://www.sysinternals.com
regshot 1.7 by TiANWEi http://regshot.yeah.net/
监视网页http//www.4199.com获得的信息:
创建文件
C:\WINDOWS\system32\rsrc.dll
用IE打开3570端口。
运行并监视硬盘上可疑文件Timeplantform.exe获得的一些信息:
生成c:\windows\system32\drives\modol.sys
生成c:\windows\system32\ravdm.dll
生成 c:\windows\system32\rsrc.dll
修改 C:\WINDOWS\system32\drivers\etc\hosts ,将localhost解析为125. 91.1 . 20
添加注册表启动项,
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run]
"9"="C:\\WINDOWS\\system32\\Ravdm.exe"
"KernelCheck"="C:\\WINDOWS\\system32\\winasse.exe"
借鉴其它电脑出现的类似问题,还可能伴随以下情况:
生成 c:\windows\vbarun.dll
生成 C:\WINDOWS\DNSAPI.dll
生成 C:\WINDOWS\hnetcfg.dll
生成 C:\WINDOWS\rasadhlp.dll
生成 c:\windows\system32\user.dll //弹出http://www.4199.com 的元凶e
生成 c:\windows\system32\ravdm.exe
生成 C:\WINDOWS\system32\rundll32.com
生成 c:\windows\system32\realplayer.exe //弹出http://www.7939.com 的元凶
分区根目录下有autorun.inf
生成以下注册表项
" 000 " = " user.dll "
" 001 " = " rsrc.dll "
[HKEY_USERS\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 500 \Software\Microsoft\Search Assistant\ACMru\ 5603 ]
" 000 " = " user.dll "
" 001 " = " rsrc.dll "
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
" run " = " rundll32 rsrc.dll s "
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KASDisabled]
" rundll " = " rundll32 user.dll s "
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager]
" PendingFileRenameOperations " = hex( 7 ):5c, 00 ,3f, 00 ,3f, 00 ,5c, 00 , 43 , 00 ,3a, 00 ,5c, 00 ,\
57 , 00 , 49 , 00 ,4e, 00 , 44 , 00 ,4f, 00 , 57 , 00 , 53 , 00 ,5c, 00 , 73 , 00 , 79 , 00 , 73 , 00 , 74 , 00 , 65 ,\
00 ,6d, 00 , 33 , 00 , 32 , 00 ,5c, 00 , 64 , 00 , 72 , 00 , 69 , 00 , 76 , 00 , 65 , 00 , 72 , 00 , 73 , 00 ,5c, 00 ,\
6d, 00 ,6f, 00 , 64 , 00 ,6f, 00 ,6c, 00 ,2e, 00 , 73 , 00 , 79 , 00 , 73 , 00 , 00 , 00 , 00 , 00 , 00 , 00
// 注:hex(7)的值是字符串\??\C:\WINDOWS\system32\drivers\modol.sys 的十六进制表示。
windows NT\currentversion\windwos:load
(msconfig显示这里也产生了可疑的东东,我不知道是什么。)
二、清除方法。需要清除的有:病毒文件和注册表相关信息
这个病毒有不同的版本,下面所列的文件中,有的可能你的电脑上没有。
注意:有的文件隐藏得很深,比如"realplayer.exe",即使在“文件夹选项”中选择“显示所有的文件和文件夹”,你也找不到它。查看是不是有这个文件的办法是在命令提示符下使用命令"attrib realplayer.exe"。
需清除的文件列表:
del C:\WINDOWS\DNSAPI.dll
del C:\WINDOWS\hnetcfg.dll
del C:\WINDOWS\rasadhlp.dll
del C:\WINDOWS\vbarun.dll
del c:\windows\winlogon.exe
del C:\WINDOWS\system32\realplayer.exe
del C:\WINDOWS\system32\Ravdm.exe
del C:\WINDOWS\system32\rsrc.dll
del C:\WINDOWS\system32\rundll32.com
del C:\WINDOWS\system32\winasse.exe
del C:\WINDOWS\system32\user.dll
del c:\windows\system32\drives\modol.sys
将 hosts 文件(路径: C:\WINDOWS\system32\drivers\etc\)中不认识的东东都删掉。或干脆把这个文件删掉。
删除d:\ e:\…等盘符根目录下的autorun.inf
完全删除QQ的安装目录。
然后把下面的文本保存成.reg文件,双击导入注册表。方括号内的减号表示删除整个注册表项。键名右边的减号表示删除此键。注意文件末的回车不能省略。
如果你能看懂注册表,最好亲自把下面所列的项检查一下,把可疑的删掉。记住,修改这前先备份注册表!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run]
" 9 " =-
" KernelCheck " =-
[-HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru\5602]
[-HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru\5603]
[-HKEY_USERS\S-1-5-21-2000478354-1715567821-1417001333-500\Software\Microsoft\Search Assistant\ACMru\5602]
[-HKEY_USERS\S-1-5-21-2000478354-1715567821-1417001333-500\Software\Microsoft\Search Assistant\ACMru\5603]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
" run " =-
" rundll " =-
" realplayer " =-
[ - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KASDisabled]
" rundll " =-
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager]
" PendingFileRenameOperations " =-
附:系统监视相关记录
下面是使用regshot 对运行timeplatform.exe前后的注册表进行对比的结果
日期时间: 2006 / 10 / 3 18 : 57 : 26 , 2006 / 10 / 3 18 : 59 : 01
计算机名:CRACK , CRACK
使用者名: 624 , 624
增加键: 2
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
增加值: 3
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\ 9 : 43 3A 5C 57 49 4E 44 4F 57 53 5C 73 79 73 74 65 6D 33 32 5C 52 61 76 64 6D 2E 65 78 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKU\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 1003 \Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\ * \d: " D:\1499\before run tpf.hiv "
HKU\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 1003 \Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\hiv\c: " D:\1499\before run tpf.hiv "
修改值: 5
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Prefetcher\TracesProcessed: 0x00000019
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Prefetcher\TracesProcessed: 0x0000001D
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Prefetcher\TracesSuccessful: 0x00000013
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Prefetcher\TracesSuccessful: 0x00000016
HKU\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 1003 \Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\ * \MRUList: " cba "
HKU\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 1003 \Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\ * \MRUList: " dcba "
HKU\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 1003 \Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\hiv\MRUList: " ba "
HKU\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 1003 \Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\hiv\MRUList: " cba "
HKU\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 1003 \Software\Microsoft\Windows NT\CurrentVersion\Windows\load: ""
HKU\S - 1 - 5 - 21 - 2000478354 - 1715567821 - 1417001333 - 1003 \Software\Microsoft\Windows NT\CurrentVersion\Windows\load: ""
文件增加: 2
C:\WINDOWS\system32\drivers\modol.sys
C:\WINDOWS\system32\Ravdm.exe
文件修改: 2
C:\WINDOWS\system32\config\software.LOG
C:\WINDOWS\system32\config\system.LOG
总计: 14
下面是使用filemon获得的文件读写记录











下面是运行QQ安装目录下已被替换为病毒文件的timeplatform.exe时的文件读写监控。有删节,保留了文件读取失败的内容。可以看出病毒文件在找哪些文件。
2 3 : 12 : 30 QQ.exe: 400 OPEN D:\Program Files\tencent\QQ2006\TIMPlatform.exe.Manifest NOT FOUND Options: Open Access: All
3 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN C:\WINDOWS\Prefetch\TIMPLATFORM.EXE - 0DEDB957.pf NOT FOUND Options: Open Access: All
13 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN D:\autorun.inf NOT FOUND Options: Open Access: All
14 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN D:\autorun.inf NOT FOUND Options: Open Access: All
15 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN C:\WINDOWS\Winlogon.exe NOT FOUND Options: Open Access: All
16 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN C:\WINDOWS\Winlogon.exe NOT FOUND Options: Open Access: All
17 3 : 12 : 30 TIMPlatform.exe: 2044 CREATE C:\WINDOWS\system32\Drivers\modol.sys SHARING VIOLATION Options: OverwriteIf Access: All
25 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN C:\WINDOWS\AppPatch\sysmain.sdb SUCCESS Options: Open Access: All
26 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN C:\WINDOWS\AppPatch\systest.sdb NOT FOUND Options: Open Access: All
27 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN D:\Program Files\tencent\QQ2006\ SUCCESS Options: Open Directory Access: All
34 3 : 12 : 30 TIMPlatform.exe: 2044 OPEN D:\Program Files\tencent\QQ2006\TIMPlatfrom.exe.Manifest NOT FOUND Options: Open Access: All
35 3 : 12 : 30 svchost.exe: 888 OPEN C:\WINDOWS\Prefetch\TIMPLATFORM.EXE - 0DEDB957.pf NOT FOUND Options: Open Access: All
36 3 : 12 : 30 svchost.exe: 720 OPEN D:\Program Files\tencent\QQ2006\TIMPlatform.exe SUCCESS Options: Open Sequential Access: All
37 3 : 12 : 30 svchost.exe: 720 OPEN D:\Program Files\tencent\QQ2006\TIMPlatform.exe SUCCESS Options: Open Access: All
38 3 : 12 : 30 svchost.exe: 720 DELETE D:\Program Files\tencent\QQ2006\TIMPlatform.exe CANNOT DELETE