首页
论坛
课程
招聘
IDA静态分析REvil家族勒索病毒
2021-5-14 21:05 6554

IDA静态分析REvil家族勒索病毒

2021-5-14 21:05
6554

本文献给所有像我一样刚从事安全行业的萌新,希望能对您有一定帮助。同时感谢所有在我迷茫时伸出援手的大佬们。

病毒家族简介

REvil又称Sodinokibi,是一种以私有软件即服务(RaaS)体系运营牟利的黑客组织。他们通过招募会员为其分发勒索软件攻击,当受害者支付赎金后该组织会将赎金与会员进行分成,因此很难定位其组织真实所在地。

样本基本信息

md5:FBF8E910F9480D64E8FF6ECF4B10EF4B

sha1:E6B32975ACB2CC5230DD4F6CE6F243293FD984FA

sha256:CEC23C13C52A39C8715EE2ED7878F8AA9452E609DF1D469EF7F0DEC55736645B

VT:https://www.virustotal.com/gui/file/cec23c13c52a39c8715ee2ed7878f8aa9452e609df1d469ef7f0dec55736645b/detection

VT沙箱以将其标识为Sodinokibi。

获取病毒静态信息

查看节区信息,可以看到存在一个自定义节.11hix,且各个节区熵值都较高证明程序存在大量加密数据。

查看导入dll,识别出导入了kernel32.dll和user32.dll两个模块。证明样本对程序的导入表做了处理。

查看识别出的API,没有什么重要内容,恶意行为被隐藏起来。需要病毒样本动态运行进行解密修复IAT。

查看字符串资源,大部分为未识别的字符串,进一步验证了数据被加密处理的猜想。

IDA静态加载分析

第一次静态加载时应该尽量勾选右下角选项,这样IDA会额外加载资源数据动态导入的DLL数据以及默认不加载的静态节数据,以便我们透彻分析样本。

加载完成后,我们可以看到入口点OEP只有两个函数调用

点击进入第一个函数调用,并没有发现有趣的内容,继续点击跟进第一个函数查看内容。

进入函数后发现了有趣的内容,病毒样本貌似在填充一个由ESI寄存器控制的数组。首先传入数组的4字节数据给sub_406817函数,然后将运算结果(eax)的值重新回填给数组,一共循环了160次,计算了640个字节。这与我们熟知的动态解析IAT方法很相似,加上我们之前分析病毒抹去了IAT可以合理猜测该处在做回填IAT表的操作。

使用F5插件查看如下

点击查看该数组内容,发现是.data节的一个全局数组。根据之前的分析运算一共占用640字节。每4字节为一个hash值(经过hash处理的数据通常会将4字节全部占满,所以合理猜测为hash数据)

设置4字节的hash数组,数组元素为160,每个元素占用4字节。

处理后的数据如下

最后我们还需验证下我们的猜想。程序调用动态导入函数的时候,汇编会以间接调用的方式呈现出来,如下形式。我们只需要在后续找到该形式的函数调用,且数据在该数组内即可验证成功。

call	dword ptr:[xxxx]

继续向下查找,可以看到“call 数组基址+数组偏移”的形式的函数调用(数组最大偏移为0x280),该调用在重复调用同一个函数。验证了该静态数组为hash处理过的IAT表。

同时也可以确定第一个函数整体逻辑在修复IAT表,修改变量名。

分析动态加载API的方法

进入mv_dy_get_api函数查看代码内容,可以看到IDA为我们解析的函数原型如下,虽然数长度相同但是看着很别扭(IDA最强大的就是注释功能,不要小看每条注释。小的注释积累起来可以引发质变)

按Y快捷键修改函数原型如下

继续向下查看代码,将输入的hash进行异或运算得到转换后的hash,又将转换后的hash值高11位提取赋值给临时变量v2。可以看到

继续阅读代码,看到疑似switch/case的判断比较高11位数据。根据不同数据进行执行不同流程中的函数地址赋值,然后跳转到LABEL_29。根据病毒动态加载的经验,第一件事一般是动态获取目标模块的基地址,然后根据基地址解析对应导出函数的位置。所以我们合理假设该switch/case语句是在做获取dll基址的操作。而转换后的高11位hash值代表不同的hash值。

整理后如下

继续向下阅读代码,看到调用了赋值的函数指针pfn_ld_dll,符合获取指定dll的基址的猜想,将临时变量改名为imagebase可以看到v18变量在获取导出符号的地址偏移。

0x3c偏移为_IMAGE_DOS_HEADER的e_lfanew字段,通过该字段值获取imagebase到_IMAGE_NT_HEADERS的偏移。

pe_nt_header_address == imagebase + e_lfanew == imagebase + (DWORD*)(imagebase + 0x3c) //imagebase + 0x3c == e_lfanew

可以看到_IMAGE_NT_HEADERS一共占用0x18个字节,也就是说0x78中有0x18字节偏移是为了跳过_IMAGE_NT_HEADERS占用的空间,为了获取_IMAGE_OPTIONAL_HEADER结构体偏移0x60 == 0x78 - 0x18的字段值。

查看_IMAGE_OPTIONAL_HEADER结构体。偏移0x60处字段正好为数据目录表的首地址,而数据目录表第0项正好记录着导出符号表的偏移和大小。

查看数据目录表表项结构体如下

可以推出该语句为获取VirtualAddress偏移值

查看导出表结构体

整理出以下内容

按下shift+F1快捷键,切换到本地类型窗口。按快捷键ins,插入一个结构体。

双击导入该结构体

将变量va_offset转换成结构体指针

导入结构体指针类型。

整理得到如下结果。

查看后续代码,因为之前的注释修改,我们可以很清晰的看到函数逻辑。

进入calc_fn_name_hash函数可以看到是对导出函数字符串进行逐字节hash运算。

PE解析API地址整体逻辑如下

接下来继续向上回溯分析加载dll的方法。点开加载dll的函数,可以发现绝大多数函数模板类似,都传入了一个固定hash值进行函数递归。获取api后将v2变量作为参数传递给该动态获取的API并调用执行。根据函数形式结合之前的分析,合理推测0xCB0F8A29为LoadLibraryA函数的hash值。而v2是要加载的dll名称。

继续回溯,发现除了上述模板的调用方式,还有直接传入了静态hash给一个函数,这种方式值得我们额外关注。

继续跟进来到以下函数中,看到有循环猜测正在做某种运算。看到循环中有个判断条件在与一个常数做差,转换成16进制为0x41,正好对应Ascii码表中的‘A’字符。因此可以猜测在比较字符串大小。

我们首先修改v5为chr,接下来就会发现非常神奇的事,找寻其他跟chr关联的变量修改名称让整个逻辑结构一下变得清晰。

继续向上查阅代码可以看到函数sub_404B12,跟进函数内部可以看到熟悉的fs:30h。通过fs寄存器获取PEB

获取PEB基址偏移0xC处的字段值,即LDR地址。

再通过LDR偏移0x14获取InMemoryOrderModuleList地址值。

判断内存模块加载顺序链表是否为空。

InMemoryOrderModuleList是一个双向链表指针,它链接的是LDR_DATA_TABLE_ENTRY结构体中的InMemoryOrderModuleList链表节点。

获取dll的名称(F5插件在此处解析错误,所以使用汇编查看)

如果匹配hash值则返回模块基址

list_entry+0x10为DllBase模块基址

总体逻辑如下

RC4算法解析

算法识别

接下来继续分析其他模块加载函数中对字符串的解密函数。首先可以看到解密函数传入了5个参数,第一个参数为一个静态全局数据,第2、3、4个参数全部是确定的常量值。

传入的静态数据

将静态数据处理成数组

进入解密函数查看内容,发现第二个函数将传入的参数重新组合传入。类似计算偏移值。

继续跟入函数,将返回变量名修改为解密可以确定最后一个参数为解密后的字符串数据。

继续跟入第一个函数,可以看到两个明显循环次数256。

汇编形式表现如下。(如果逆向时突然出现两次循环且每次循环次数都为256,后续存在异或操作基本可以猜测为rc4解密算法,这种特性为rc4算法特征)

接下来我们需要进入后续函数寻找异或算法,可以发现字节异或算法。基本可以确定为rc4算法。

算法逆向分析

首先根据Wiki百科获取rc4算法的伪代码,rc4算法分为初始阶段和加密阶段。初始化阶段首先会创建一个256字节从0递增不重复的数组。第二次循环会循环会根据密钥数组、长度、第一次构建的s盒(用来随机交换加密的数组,这里用S标识)来重新打乱S盒中,用于随机加密数据。由此可以看出,初始化阶段需要一个s盒,一个密钥以及密钥长度作为基本元素。

 //cr4初始化伪代码
for i from 0 to 255
     S[i] := i
 endfor
 j := 0
 for( i=0 ; i<256 ; i++)
     j := (j + S[i] + key[i mod keylength]) % 256	//根据密钥数组和密钥长度生成一个随机索引
     swap values of S[i] and S[j]	//将正常顺序的值与随机索引的值交换
 endfor

回到IDA可以清晰看到一个长度为256字节的数组,且无论初始化和加密阶段都使用了该数组。确定该数组为S盒。

由于初始化阶段还需要密钥盒密钥长度,我们先将参数按顺序重命名。

进入初始化函数,可以看到与我们的伪代码逻辑一致,参数传入顺序正确。

对算法进行调整如下

接下来我们查看加密数据部分的伪代码。下面i,j是两个指针。每收到一个字节,就进行while循环。通过一定的算法((a),(b))定位S盒中的一个元素,并与输入字节异或,得到k。循环中还改变了S盒((c))。从该伪代码中需要获取的参数有:打乱顺序的S盒、要加密/解密的数据、数据长度,最后返回的数据是加密/解密后的数组字符串。

 i := 0
 j := 0
 while GeneratingOutput:
     i := (i + 1) mod 256   //a
     j := (j + S[i]) mod 256 //b
     swap values of S[i] and S[j]  //c
     k := inputByte ^ S[(S[i] + S[j]) % 256]
     output K
 endwhile

与初始化部分类似,首先按照分析和假设修改变量。可以看到整体加密算法逻辑变得清晰

跟进加密函数,根据伪代码调整函数变量内容。

利用交叉引用继续向上回溯来到一下函数中,可以看到调用解密函数的父函数初始的时候就传入了:密钥长度、加密数据长度、加密的数据。而第一个参数密钥是利用基址加偏移的方式计算的,第三个在第一个参数基础上还增加了密钥长度的偏移。但是我们不确定哪个参数是密钥基址哪个是密钥偏移。

继续向上回溯,来到了整体调用的地方,可以看到第一个参数为静态未知数据(第一个参数是固定的),而第二个参数正好类似一个偏移差值。

查看第一个静态数组

调整为数组类型

返回继续调整变量可以看到清晰的函数调用逻辑:

1、传入固定的加密数据首地址+密钥偏移获取密钥地址

2、密钥偏移+密钥长度获取解密数据的地址

修复IAT

在分析完了病毒构建导入表和字符串加密的手法后,我们便可以开始解析IDB数据。核心手法与脱壳类似,就是对IDA未解析的IAT数组进行修复。

动态修复IAT

所谓动态修复IAT类似动态脱壳,原理是利用病毒自身携带的解密程序,在病毒自动修复完成后中断。将内存状态保存到IDB中进行解析IAT。首先我们要在IDA中设置断点,让IDA调试器运行起来断住。

可以看到iat表已经全部修复为函数地址。

按O快捷键进行符号解析。

使用脱壳插件进行动态修复IAT表

修复IAT后的效果如下。

IDAPython脚本修复IAT

IDAPython修复脚本是通过对算法的逆向,利用ida提供的python接口编写脚本,从静态数据中解密出我们想要的内容。以下是我编写的IDAPython脚本,为了方便没有做优化有亿点卡。(最好重新加载程序到IDA,并勾选Load Resouce选项)

程序中利用了pefile.py模块,如果当前python环境变量中没有该模块可以通过pip安装。IDAPython调试方法可以参考我的文章https://bbs.pediy.com/thread-267362.htm

pip install pefile

IDAPython脚本

import  os
import  idc
import  idaapi
import  idautils
import  ida_bytes
import  ida_name
import  pefile
#import  wingdbstub

#wingdbstub.Ensure()

#save iat hash
mv_ida_hash=[]
path_list=[]

class DecryptorError(Exception):
    pass

#system32 dir
sys_dir = r"c:\windows\system32"

#set path list
def set_path_list():
    path_list.append(get_match_dll(0x122A354C))
    path_list.append(get_match_dll(0x47BC1D98))

base_address = 0x0040FF40
#get mv iat hash
def get_mv_iat():
    tmp = get_bytes(base_address,640)
    for i in list(range(0,160)):
        mv_ida_hash.append(int.from_bytes(tmp[i*4:(i+1)*4],"little"))

#transfrom mv iat hash
def trans_iat_hash(en_trans):
    return (en_trans ^ ((en_trans ^ 0x7A6C) << 16) ^ 0x132E) & 0xffffffff

#get dll hash
def get_dll_hash(trans_hash):
    return  trans_hash >> 21


#calc api name hash
def calc_func_name_hash(func_name):
    api_hash = 0x2B
    for chr in func_name:
        api_hash = ord(chr) + 0x10F * api_hash
    return  api_hash & 0x1FFFFF

#get api hash
def get_api_hash(trans_hash):
    return  trans_hash & 0x1FFFFF

#get match dll
def get_match_dll(input_hash):
    #calc target hash
    tar_hash = (input_hash ^ 0xDA54A235) & 0xffffffff
    for filename in os.listdir(sys_dir):
        filename.lower()
        path= sys_dir+"\\"+filename
        if  os.path.isfile(path):
            if  '.dll'  in  filename:
                #print(filename[0])
                calc_data = 0x2B
                for chr in filename:
                    calc_data = (ord(chr) + 0x10F * calc_data) & 0xffffffff
                if calc_data == tar_hash:   
                    return path   
                   
                
#match api
def get_match_api(input_hash):
    trans_iat_hash(input_hash)

#set cmt in disassembly GUI
def set_hexrays_comment(address,text):
    cfunc = idaapi.decompile(address)
    tl = idaapi.treeloc_t()# init treeloc object
    tl.ea = address
    tl.itp = idaapi.ITP_SEMI
    cfunc.set_user_cmt(tl,text)
    cfunc.save_user_cmts()

#set cmt
def set_comment(address, text):
    ida_bytes.set_cmt(address, text, 0)
    set_hexrays_comment(address, text)

#rc4 encrypt
def rc4decrypt(key,data):
    x = 0
    box =list(range(256))
    for i in list(range(256)):
        x = (x + box[i] + key[i % len(key)]) % 256
        box[i],box[x] = box[x],box[i]
    x = 0
    y = 0
    out = []
    for char in data:
        x = (x + 1) % 256
        y = (y + box[x]) % 256
        box[x],box[y] = box[y],box[x]
        out.append(chr(char ^ box[(box[x] + box[y]) % 256]))
    return ''.join(out)

#get reg value
def get_reg_value(ptr_addr, reg_name):
    #set count
    e_count = 0
    while e_count < 500:
        e_count += 1
        ptr_addr = idc.prev_head(ptr_addr)
        if idc.print_insn_mnem(ptr_addr) == 'mov':
            if idc.get_operand_type(ptr_addr,0) == idaapi.o_reg:
                tmp_reg_name = idaapi.get_reg_name(idc.get_operand_value(ptr_addr,0),4)
                if tmp_reg_name.lower() == reg_name.lower():
                    if idc.get_operand_type(ptr_addr,1) == idaapi.o_imm:
                        return idc.get_operand_value(ptr_addr,1)
        elif idc.print_insn_mnem(ptr_addr) == 'pop':
            #match the following pattern
            #push 3
            #pop edi
            if  idc.get_operand_type(ptr_addr,0) == idaapi.o_reg:
                tmp_reg_name =  idaapi.get_reg_name(idc.get_operand_value(ptr_addr,0),4)
                if  tmp_reg_name.lower() == reg_name.lower():
                    tmp_addr = idc.prev_head(ptr_addr)
                    if  idc.print_insn_mnem(tmp_addr) == 'push':
                        if  idc.get_operand_type(tmp_addr,0) == idaapi.o_imm:
                            reg_value = idc.get_operand_value(tmp_addr,0)
                            return  reg_value
        elif idc.print_insn_mnem(ptr_addr) == 'ret':
            raise DecryptorError()
    raise DecryptorError()

#get args
def get_stack_args(fn_addr,count):
    #save stack args
    args = []
    args_count = 0
    tmp_ptr = fn_addr
    #loop get args
    while args_count < count:
        #get first args
        tmp_ptr = idc.prev_head(tmp_ptr)
        #judge 'push' instruction
        if idc.print_insn_mnem(tmp_ptr) == 'push':
            #The new idapython had been mov 'i_imm' into idaapi mod.Please carefore your idapython config
            if  idc.get_operand_type(tmp_ptr,0) == idaapi.o_imm:
                #if push mem save the addr
                args.append(idc.get_operand_value(tmp_ptr,0))
                args_count += 1
            elif idc.get_operand_type(tmp_ptr,0) == idaapi.o_reg:
                #get reg name
                reg_name = idaapi.get_reg_name(idc.get_operand_value(tmp_ptr,0),4)
                #research pre instruction which chg the reg
                reg_value = get_reg_value(tmp_ptr,reg_name)
                args.append(reg_value)
                args_count += 1
            else:
                #can't get reg value
                raise DecryptorError()
    #ret get values
    return  tuple(args)

#decrypt string
def decrypt_str(func_addr):
    try:
        str_tbl_start, key_offset, key_len, str_len = get_stack_args(func_addr,4)
    except:
        print("Can't get args")
        return
    key_data = idc.get_bytes(str_tbl_start + key_offset, key_len)
    encrypt_data = idc.get_bytes(str_tbl_start + key_offset + key_len, str_len)
    decrypt_str = rc4decrypt(key_data, encrypt_data)
    #replace data
    out_str = decrypt_str.replace('\x00','')
    #set cmt
    #print(out_str)
    if  ".dll" in out_str:
        path_list.append(sys_dir + "\\" + out_str)
    set_comment(func_addr,out_str)
    #print(idc.get_cmt(func_addr,0))



def get_api_symbols(enc_hash):
    path = ""
    trans_hash = trans_iat_hash(enc_hash)
    func_hash = get_api_hash(trans_hash)
    for path in path_list:
        #get api by hash
        pe = pefile.PE(path)
        #get api symbols
        try:
            for exp in pe.DIRECTORY_ENTRY_EXPORT.symbols:
                api_hash = calc_func_name_hash(exp.name.decode('utf-8'))
                if  func_hash == api_hash:
                    print("Find symbols:" + " " + exp.name.decode('utf-8'))
                    return exp.name.decode('utf-8')
        except:
            print("Finished")


#get xref list
def get_xref_list(fn_addr):
    return [addr.frm for addr in idautils.XrefsTo(fn_addr)]

#decrpyt all str
def decrypt_all_str(fn_addr):
    for ptr in get_xref_list(fn_addr):
        decrypt_str(ptr)


#build iat
def build_iat():
    count = 0 
    for encry_hash in mv_ida_hash:
        api_symbols = get_api_symbols(encry_hash)
        if api_symbols == "":
            continue
        print(ida_name.set_name(base_address + count, api_symbols))
        count += 4

#main
set_path_list()
get_mv_iat()
#get_import_table()
decrypt_all_str(0x004056E3)
#loop build iat
build_iat()

除了解析API外,该脚本解密完成后会将解密字符串以注释形式添加到rc4解密函数后,方便我们静态查看病毒后续行为。

IDAPython脚本编写注意事项

因为python的发展,IDAPython也逐渐从python2.x过度到python3.x。IDA作者也在博客中表示过度到新的IDA7.2版本以上的python默认使用3.x并不在支持IDAPython2.x的部分接口。我们在编写脚本的过程中很可能因为使用了老版本的接口导致无法实现我们的功能。

编写时可参考IDAPython官方手册:https://www.hex-rays.com/products/ida/support/idapython_docs/

利用浏览器的搜索功能搜索想要的功能API(不知道有哪些接口就靠猜,比如我想要一个修改函数名的接口我尝试了很多简单词组组合最后找到了idc.set_name),如果某一模块中搜索不到,点击手册左上角的所有模块再次搜索。

还要善用IDAPython API过度表:https://www.hex-rays.com/products/ida/support/ida74_idapython_no_bc695_porting_guide.shtml

使用方法仍然是浏览器搜索匹配不同版本的接口

病毒行为分析

动态修复IAT

可以看到完整的修复IAT后的逻辑,首先动态获取API后再加载ole32模块获取创建COM组件所需接口。

创建全局互斥体变量

退回到函数主逻辑,可以看到病毒首先修复了IAT表保证程序正常运行

设置错误模式获取错误信息并创建名为Global\01EB1FCA-9835-27F4-DB93-6F722EB23FB4的全局互斥体保证进程唯一性。

如果返回系统错误码显示已存在互斥体则返回标志1。

使用M快捷键找到宏定义对常量进行替换

替换后的样式如下

再次来到主函数,可以看到病毒有两个逻辑函数,暂且分别命名为mv_logic_x。

提权运行

来到主逻辑1中可以看到以下几个解析的函数与字符串信息。

获取当前进程版本号

进入第一个未解析函数,用于F5插件解析错误通过汇编查看内容。可以看到该函数获取PEB地址后分别读取了偏移0xA4和0xA8处地址的低一个字节数据。

在PEB中,0xA4和0xA8分别是当前操作系统的主版本号和次版本号

调整如下,可以看出该函数用于获取当前系统版本号。

返回逻辑可以看出病毒在Vista版本以上的操作系统上运行时会执行

判断用户权限

进入sub_404842函数可以看到该函数主要获取当前进程令牌信息。

返回的令牌类型是一个enum类型

根据微软描述一共可以返回如下三个类型。

所以以下代码为判断是否有管理员权限,如果没有则执行以下提权代码。

在判断当前用户进程处于受限权限用户组下时,病毒打开令牌获取用户SID和属性的组合值,总逻辑如下。

首先通过GetTokenInformation函数获取_SID_AND_ATTRIBUTES结构体。该结构体包含了Sid和Sid的属性。

可以看到微软官方形容SID代表一个用户组,而SID的属性用来表示当前用户组启动、禁用以及强制托管的权限属性。SID同时也标志如何使用这些属性。

病毒接下来获取SID中的偏移值,获取SID中Subauthority的第一个四字节值判断权限。

首先我们来观察下SID结构体,该结构体前8字节是用于记录SID的一些信息,后20字节分为5部分,每部分占用4字节表示域账户或组使用的唯一ID也称为SIDs。SIDs中前4个四字节元素用来表示域ID(我理解为网络域名之类的)。最后一个字节表示RID,也就是表示用户组或用户。

根据Identifier Authority字段与后续的域ID组合可以代表出不同的含义。微软将特定的组合称为"Well-know SIDs"。以下是对该类型的介绍

返回函数调用位置使用IDA插件查看内容。可以看到他在比较SIDs的第一个4字节内容。

我们通过计算器换算成10进制,并查询"Well-know SIDs"表,发现为高强制级别的含义,所以我们了解了该if判断仍然是在判断权限。我们可以看到该类型在Vista和Win server 2008中添加,这也印证了病毒为什么要判断系统版本。

获取病毒路径字符串

接下来病毒会通过动态申请堆内存用于存储当前病毒路径字符串。

堆申请函数浅析

以下为病毒申请堆函数的简单分析

循环提权

可以看到sub_404DC9函数将某个值赋给了变量v4,这里我们可以不用着急分析该函数,因为v4与后续的函数调用有直接关系,可以考虑先分析明显行为反向猜测推导内容。继续向下分析可以看到病毒调用了ShellExecuteExW,并且将v7作为了一个参数。

MSDN官方定义结构体为SHELLEXECUTEINFOW

将v7变量类型修改为SHELLEXECUTEINFOW,可以看到病毒实际上在通过ShellExecuteExW循环调用runas命令提权当前进程。

获取参数函数分析

整理得到函数获取参数字符串逻辑如下。

提权函数整体逻辑

分析完成前述所有代码后整理提权函数逻辑如下:首先通过令牌分别进行系统信息、令牌首先信息以及令牌权级三个方面进行判断,如果进程处于高度受限的环境下则通过ShellExecuteExW调用runas进程循环提升当前进程权限,否则就陷入提权界面循环中。(如果受害者因为厌烦而点击提权确认则病毒开始加密逻辑)

runas简介

Runas是一个命令行工具,它会帮助进程提升为管理员权限运行。

加密逻辑

接下来我们进入加密逻辑进行静态分析

线程执行状态设置

进入加密逻辑函数首先看到病毒进程设置了线程状态为ES_CONTINUOUS + ES_SYSTEM_REQUIRED

第一个属性代表设置一个状态值,该值在当前病毒逻辑函数中一直有效,直到下一次调用SetThreadExecutionState(ES_CONTINUOUS )函数时该值会被清除。第二个属性通过设置系统计时器强制系统处于工作状态。

模拟用户登录

接下来病毒会调用函数,使病毒进程模拟管理员账户登录执行病毒逻辑。

获取explorer进程ID

首先进入第一个未解析的函数,进入函数可以看到函数内部又一次调用了一个函数,参数为1个常量,要获取的目标进程字符串名和一个函数指针。

继续跟进,病毒创建了一个进程快照通过循环对当前内存中进程信息块进行遍历,并将获取到的环境进程块作为参函数和进程名一起传入函数指针,调用函数指针指向的地址。

再看函数指针指向的函数地址,它将传入的进程字符串名和目标进程字符串进行比较,如果与目标进程字符串命相等则获取进程信息块的进程ID,并将它传入字符串指针向后偏移4字节的地址存储,所以我们可以判断出函数传入的参数实际上为病毒作者设计的一个结构体,拥有目标进程字符串指针和进程ID两个元素。

定义结构体

修改后参数如下

获取的进程权限

使用Vistual Studio查看宏对应的值计算出0xF01FF代表所有令牌权限

进入该函数我们可以看到以下逻辑:病毒首先获取当前进程句柄,根据当前进程的"Well-know SIDs"值判断是否具有系统的完整权限。如果具有完整权限则尝试获取explorer进程的所有权限令牌利用令牌模拟管理员账户登录。

勒索配置文件解析

配置文件分析

进入下一个函数,病毒首先解密出配置文件到内存中。

我们可以进入配置文件内查看解密方式,由于前面分析注释的功效这里代码逻辑很清晰。病毒首先通过hash判断配置文件完整性,然后调用rc4解密算法对加密配置文件进行解密。

我们查看病毒为加密配置文件生成的hash算法,内容如下,他只是用于校验我们静态分析的时候了解即可不需要对该算法详细解析。

接下来我们查看传入rc4算法中的常量数据,解密密钥为'98C5SGrGnn11u9qBcQs31J2rxeq9d4oA'。被加密的配置文件大小为0x7AD7,可以精准的通过IDA导出功能导出数据。

配置文件解密

在知晓密钥、密钥长度、加密数据、加密数据长度和加密算法后我们可以用IDA对数据进行导出。(该功能在新版本IDA7.5被强化)选中要导出的数据类型(这里是自定义的字节数组类型,因为长度已知)选择Edit->Export data

根据喜欢的形式导出,我这里选择二进制形式导出就不做二次解密了,选择直接用"网络厨师"(cyberchef)进行解密

将导出二进制数据上传网络厨师后输入密钥解密出配置文件

但是目前我们看到的内容都是连在一行,没有自动换行阅读起来十分难看。我们使用网络厨师进行符号替换来修改显示形式,如下所示。

配置文件内容

可以明显的看出这种配置文件的定义是网络脚本语言JSON语法

{	
	"pk":"eYcrYel20DnrtDgbF+CMLcyGSeW+Skw8zYCRL91/fWo=",
	"pid":"$2a$10$im/.HUJruXn5zDUN5iaUJ.wzfvGY6tVJHuIxHOzhQ5nbuKGAkAlLy",
	"sub":"3152",
	"dbg":false,
	"et":1,
	"wipe":false,
	"wht":{	
	"fld":["msocache",
	"intel",
	"$recycle.bin",
	"google",
	"perflogs",
	"system volume information",
	"windows",
	"mozilla",
	"appdata",
	"tor browser",
	"$windows.~ws",
	"application data",
	"$windows.~bt",
	"boot",
	"windows.old"],
	"fls":["bootsect.bak",
	"autorun.inf",
	"iconcache.db",
	"thumbs.db",
	"ntuser.ini",
	"boot.ini",
	"bootfont.bin",
	"ntuser.dat",
	"ntuser.dat.log",
	"ntldr",
	"desktop.ini"],
	"ext":["com",
	"ani",
	"scr",
	"drv",
	"hta",
	"rom",
	"bin",
	"msc",
	"ps1",
	"diagpkg",
	"shs",
	"adv",
	"msu",
	"cpl",
	"prf",
	"bat",
	"idx",
	"mpa",
	"cmd",
	"msi",
	"mod",
	"ocx",
	"icns",
	"ics",
	"spl",
	"386",
	"lock",
	"sys",
	"rtp",
	"wpx",
	"diagcab",
	"theme",
	"deskthemepack",
	"msp",
	"cab",
	"ldf",
	"nomedia",
	"icl",
	"lnk",
	"cur",
	"dll",
	"nls",
	"themepack",
	"msstyles",
	"hlp",
	"key",
	"ico",
	"exe",
	"diagcfg"]},
	"wfld":["backup"],
	"prc":[],
	"dmn":"boulderwelt-muenchen-west.de;outcomeisincome.com;zewatchers.com;kafu.ch;bauertree.com;lenreactiv-shop.ru;vannesteconstruct.be;tux-espacios.com;gporf.fr;heurigen-bauer.at;aakritpatel.com;michaelsmeriglioracing.com;braffinjurylawfirm.com;tstaffing.nl;musictreehouse.net;campusoutreach.org;klusbeter.nl;sahalstore.com;journeybacktolife.com;ostheimer.at;sobreholanda.com;troegs.com;i-trust.dk;spargel-kochen.de;merzi.info;aunexis.ch;autofolierung-lu.de;alsace-first.com;classycurtainsltd.co.uk;moveonnews.com;nvwoodwerks.com;blgr.be;basisschooldezonnewijzer.nl;unim.su;cerebralforce.net;sanaia.com;geekwork.pl;faizanullah.com;bargningharnosand.se;id-et-d.fr;simpliza.com;airconditioning-waalwijk.nl;verifort-capital.de;triactis.com;kalkulator-oszczednosci.pl;architecturalfiberglass.org;streamerzradio1.site;tophumanservicescourses.com;seproc.hn;bunburyfreightservices.com.au;vickiegrayimages.com;smartypractice.com;ouryoungminds.wordpress.com;em-gmbh.ch;memaag.com;run4study.com;rafaut.com;naturavetal.hr;tonelektro.nl;no-plans.com;ki-lowroermond.nl;ncs-graphic-studio.com;edgewoodestates.org;sipstroysochi.ru;pickanose.com;julis-lsa.de;vibehouse.rw;travelffeine.com;durganews.com;pasivect.co.uk;deepsouthclothingcompany.com;boompinoy.com;layrshift.eu;richard-felix.co.uk;croftprecision.co.uk;connectedace.com;wien-mitte.co.at;fitnessbazaar.com;elpa.se;adultgamezone.com;greenfieldoptimaldentalcare.com;erstatningsadvokaterne.dk;mmgdouai.fr;abl1.net;slupetzky.at;antenanavi.com;xn--fnsterputssollentuna-39b.se;milanonotai.it;clos-galant.com;edrcreditservices.nl;ceres.org.au;mousepad-direkt.de;diversiapsicologia.es;lmtprovisions.com;waermetauscher-berechnen.de;anteniti.com;celularity.com;mir-na-iznanku.com;skiltogprint.no;bayoga.co.uk;nativeformulas.com;mirkoreisser.de;roadwarrior.app;serce.info.pl;expandet.dk;punchbaby.com;shiftinspiration.com;tomaso.gr;truenyc.co;ra-staudte.de;berlin-bamboo-bikes.org;spinheal.ru;dareckleyministries.com;panelsandwichmadrid.es;buroludo.nl;hhcourier.com;binder-buerotechnik.at;jusibe.com;verytycs.com;vetapharma.fr;evologic-technologies.com;puertamatic.es;controldekk.com;longislandelderlaw.com;shiresresidential.com;bestbet.com;maryloutaylor.com;lusak.at;reddysbakery.com;cursosgratuitosnainternet.com;atozdistribution.co.uk;piajeppesen.dk;cityorchardhtx.com;devlaur.com;parking.netgateway.eu;ftlc.es;pcprofessor.com;asiluxury.com;transliminaltribe.wordpress.com;nandistribution.nl;hvccfloorcare.com;stingraybeach.com;dlc.berlin;camsadviser.com;torgbodenbollnas.se;parebrise-tla.fr;extensionmaison.info;almosthomedogrescue.dog;team-montage.dk;35-40konkatsu.net;cortec-neuro.com;scenepublique.net;artige.com;summitmarketingstrategies.com;purposeadvisorsolutions.com;mooreslawngarden.com;boisehosting.net;seminoc.com;fibrofolliculoma.info;schmalhorst.de;gasolspecialisten.se;mapawood.com;darnallwellbeing.org.uk;the-domain-trader.com;rocketccw.com;quemargrasa.net;makeflowers.ru;whittier5k.com;comparatif-lave-linge.fr;woodleyacademy.org;pierrehale.com;grupocarvalhoerodrigues.com.br;rimborsobancario.net;slimidealherbal.com;allfortheloveofyou.com;webmaster-peloton.com;rumahminangberdaya.com;xn--logopdie-leverkusen-kwb.de;mrtour.site;logopaedie-blomberg.de;csgospeltips.se;insp.bi;new.devon.gov.uk;educar.org;shadebarandgrillorlando.com;art2gointerieurprojecten.nl;iwelt.de;baustb.de;dpo-as-a-service.com;botanicinnovations.com;falcou.fr;worldhealthbasicinfo.com;pferdebiester.de;ccpbroadband.com;physiofischer.de;groupe-frayssinet.fr;jameskibbie.com;lachofikschiet.nl;broseller.com;you-bysia.com.au;corona-handles.com;solhaug.tk;mirjamholleman.nl;sevenadvertising.com;praxis-management-plus.de;lecantou-coworking.com;sanyue119.com;amylendscrestview.com;cafemattmeera.com;dontpassthepepper.com;crowcanyon.com;denovofoodsgroup.com;hotelsolbh.com.br;d2marketing.co.uk;cyntox.com;bouquet-de-roses.com;kadesignandbuild.co.uk;grelot-home.com;filmstreamingvfcomplet.be;eraorastudio.com;chandlerpd.com;icpcnj.org;faroairporttransfers.net;devstyle.org;manutouchmassage.com;bradynursery.com;commonground-stories.com;alysonhoward.com;radaradvies.nl;vloeren-nu.nl;crosspointefellowship.church;kao.at;macabaneaupaysflechois.com;iyahayki.nl;profectis.de;ai-spt.jp;wacochamber.com;xltyu.com;spectrmash.ru;d1franchise.com;selfoutlet.com;synlab.lt;ditog.fr;herbstfeststaefa.ch;ahouseforlease.com;liikelataamo.fi;limassoldriving.com;rostoncastings.co.uk;creamery201.com;dubscollective.com;zzyjtsgls.com;theduke.de;intecwi.com;wraithco.com;jenniferandersonwriter.com;suncrestcabinets.ca;abogados-en-alicante.es;plantag.de;ora-it.de;catholicmusicfest.com;bockamp.com;andersongilmour.co.uk;iviaggisonciliegie.it;hatech.io;kenhnoithatgo.com;launchhubl.com;dinslips.se;plotlinecreative.com;kidbucketlist.com.au;noesis.tech;cursoporcelanatoliquido.online;videomarketing.pro;abogadoengijon.es;oncarrot.com;wasmachtmeinfonds.at;ilive.lt;desert-trails.com;noskierrenteria.com;lightair.com;bigbaguettes.eu;lukeshepley.wordpress.com;hairstylesnow.site;quizzingbee.com;madinblack.com;ymca-cw.org.uk;burkert-ideenreich.de;baptisttabernacle.com;oemands.dk;vietlawconsultancy.com;embracinghiscall.com;hypozentrum.com;backstreetpub.com;brevitempore.net;coffreo.biz;saxtec.com;c2e-poitiers.com;bodyfulls.com;saka.gr;datacenters-in-europe.com;norovirus-ratgeber.de;schmalhorst.de;architekturbuero-wagner.net;nhadatcanho247.com;toreria.es;polychromelabs.com;liveottelut.com;sabel-bf.com;blood-sports.net;allentownpapershow.com;facettenreich27.de;vyhino-zhulebino-24.ru;vitalyscenter.es;roygolden.com;thedresserie.com;psa-sec.de;kostenlose-webcams.com;pier40forall.org;stopilhan.com;mardenherefordshire-pc.gov.uk;12starhd.online;employeesurveys.com;pmcimpact.com;solinegraphic.com;dsl-ip.de;forestlakeuca.org.au;corelifenutrition.com;candyhouseusa.com;jadwalbolanet.info;greenpark.ch;upplandsspar.se;charlottepoudroux-photographie.fr;mrxermon.de;tennisclubetten.nl;jsfg.com;ilcdover.com;mdk-mediadesign.de;stacyloeb.com;partnertaxi.sk;huehnerauge-entfernen.de;lbcframingelectrical.com;haar-spange.com;rota-installations.co.uk;pointos.com;ligiercenter-sachsen.de;resortmtn.com;philippedebroca.com;behavioralmedicinespecialists.com;drugdevice.org;heliomotion.com;parkstreetauto.net;leda-ukraine.com.ua;artallnightdc.com;ilso.net;deprobatehelp.com;brandl-blumen.de;analiticapublica.es;stormwall.se;ungsvenskarna.se;kingfamily.construction;wmiadmin.com;seitzdruck.com;autodemontagenijmegen.nl;kaminscy.com;baronloan.org;walkingdeadnj.com;tinkoff-mobayl.ru;fatfreezingmachines.com;micahkoleoso.de;vesinhnha.com.vn;smale-opticiens.nl;thomasvicino.com;prochain-voyage.net;darrenkeslerministries.com;bodyforwife.com;maureenbreezedancetheater.org;bogdanpeptine.ro;bookspeopleplaces.com;dr-seleznev.com;cuppacap.com;helenekowalsky.com;familypark40.com;ventti.com.ar;klimt2012.info;pocket-opera.de;campus2day.de;smejump.co.th;id-vet.com;caribdoctor.org;rollingrockcolumbia.com;urclan.net;mooglee.com;villa-marrakesch.de;qualitaetstag.de;zieglerbrothers.de;raschlosser.de;vdberg-autoimport.nl;onlybacklink.com;smalltownideamill.wordpress.com;glennroberts.co.nz;admos-gleitlager.de;nurturingwisdom.com;blossombeyond50.com;penco.ie;luckypatcher-apkz.com;themadbotter.com;4net.guru;edv-live.de;funjose.org.gt;daniel-akermann-architektur-und-planung.ch;innote.fi;miraclediet.fun;urist-bogatyr.ru;kath-kirche-gera.de;live-con-arte.de;romeguidedvisit.com;juneauopioidworkgroup.org;smart-light.co.uk;apolomarcas.com;global-kids.info;songunceliptv.com;calxplus.eu;portoesdofarrobo.com;nakupunafoundation.org;cleliaekiko.online;div-vertriebsforschung.de;eadsmurraypugh.com;malychanieruchomoscipremium.com;fotoideaymedia.es;tips.technology;rksbusiness.com;ziegler-praezisionsteile.de;humanityplus.org;alvinschwartz.wordpress.com;phantastyk.com;farhaani.com;promesapuertorico.com;onlyresultsmarketing.com;noixdecocom.fr;sweering.fr;yassir.pro;bingonearme.org;castillobalduz.es;sauschneider.info;lionware.de;kedak.de;mylovelybluesky.com;operaslovakia.sk;corola.es;bloggyboulga.net;xn--rumung-bua.online;ledmes.ru;renergysolution.com;rieed.de;werkkring.nl;theletter.company;effortlesspromo.com;faronics.com;mediaacademy-iraq.org;xn--singlebrsen-vergleich-nec.com;freie-baugutachterpraxis.de;aprepol.com;wolf-glas-und-kunst.de;interactcenter.org;financescorecard.com;wellplast.se;associacioesportivapolitg.cat;abitur-undwieweiter.de;aurum-juweliere.de;comarenterprises.com;danholzmann.com;kampotpepper.gives;spylista.com;dramagickcom.wordpress.com;cactusthebrand.com;ecoledansemulhouse.fr;stupbratt.no;carlosja.com;bigler-hrconsulting.ch;licor43.de;petnest.ir;augenta.com;newyou.at;kosterra.com;fayrecreations.com;pogypneu.sk;stallbyggen.se;restaurantesszimmer.de;hkr-reise.de;mylolis.com;helikoptervluchtnewyork.nl;huissier-creteil.com;carriagehousesalonvt.com;c-a.co.in;webhostingsrbija.rs;globedivers.wordpress.com;newstap.com.ng;easytrans.com.au;socialonemedia.com;importardechina.info;microcirc.net;strategicstatements.com;systemate.dk;aminaboutique247.com;makeitcount.at;victoriousfestival.co.uk;DupontSellsHomes.com;spsshomeworkhelp.com;centromarysalud.com;galserwis.pl;xlarge.at;pcp-nc.com;hiddencitysecrets.com.au;theshungiteexperience.com.au;koko-nora.dk;fundaciongregal.org;bbsmobler.se;retroearthstudio.com;zenderthelender.com;gadgetedges.com;sinal.org;danielblum.info;geisterradler.de;satyayoga.de;takeflat.com;hokagestore.com;space.ua;spd-ehningen.de;tarotdeseidel.com;idemblogs.com;marcuswhitten.site;thomas-hospital.de;bricotienda.com;trystana.com;deko4you.at;birnam-wood.com;despedidascostablanca.es;dr-pipi.de;bimnapratica.com;softsproductkey.com;berliner-versicherungsvergleich.de;sairaku.net;zflas.com;1team.es;itelagen.com;talentwunder.com;naswrrg.org;mastertechengineering.com;mdacares.com;judithjansen.com;verbisonline.com;norpol-yachting.com;fairfriends18.de;loprus.pl;caribbeansunpoker.com;trapiantofue.it;agence-chocolat-noir.com;ralister.co.uk;odiclinic.org;extraordinaryoutdoors.com;shhealthlaw.com;vermoote.de;body-armour.online;psnacademy.in;corendonhotels.com;waynela.com;waveneyrivercentre.co.uk;kissit.ca;4youbeautysalon.com;frontierweldingllc.com;poultrypartners.nl;haremnick.com;bordercollie-nim.nl;bptdmaluku.com;destinationclients.fr;rosavalamedahr.com;danskretursystem.dk;carolinepenn.com;autodujos.lt;morawe-krueger.de;igrealestate.com;lynsayshepherd.co.uk;peterstrobos.com;lillegrandpalais.com;bowengroup.com.au;centuryrs.com;blogdecachorros.com;qlog.de;fensterbau-ziegler.de;lapmangfpt.info.vn;sloverse.com;amerikansktgodis.se;advokathuset.dk;assurancesalextrespaille.fr;sachnendoc.com;stampagrafica.es;abogadosaccidentetraficosevilla.es;stoeferlehalle.de;uimaan.fi;live-your-life.jp;syndikat-asphaltfieber.de;asteriag.com;joseconstela.com;wurmpower.at;personalenhancementcenter.com;teresianmedia.org;nestor-swiss.ch;servicegsm.net;ino-professional.ru;otsu-bon.com;hebkft.hu;gastsicht.de;2ekeus.nl;revezlimage.com;gemeentehetkompas.nl;the-virtualizer.com;liliesandbeauties.org;first-2-aid-u.com;tuuliautio.fi;foryourhealth.live;marketingsulweb.com;chavesdoareeiro.com;entopic.com;gonzalezfornes.es;samnewbyjax.com;schoellhammer.com;ateliergamila.com;conasmanagement.de;drnice.de;hardinggroup.com;artotelamsterdam.com;iwr.nl;sportiomsportfondsen.nl;kevinjodea.com;femxarxa.cat;krlosdavid.com;web.ion.ag;webcodingstudio.com;eco-southafrica.com;edelman.jp;pelorus.group;beyondmarcomdotcom.wordpress.com;sagadc.com;pawsuppetlovers.com;consultaractadenacimiento.com;mrsfieldskc.com;pubweb.carnet.hr;lichencafe.com;praxis-foerderdiagnostik.de;iyengaryogacharlotte.com;sarbatkhalsafoundation.org;hoteledenpadova.it;imadarchid.com;slashdb.com;iphoneszervizbudapest.hu;nicoleaeschbachorg.wordpress.com;n1-headache.com;solerluethi-allart.ch;caffeinternet.it;chaotrang.com;americafirstcommittee.org;rhinosfootballacademy.com;tanzprojekt.com;labobit.it;dutchcoder.nl;henricekupper.com;alhashem.net;visiativ-industry.fr;iqbalscientific.com;happyeasterimages.org;associationanalytics.com;sofavietxinh.com;ctrler.cn;colorofhorses.com;veybachcenter.de;myhostcloud.com;gaiam.nl;sw1m.ru;modamilyon.com;stefanpasch.me;flexicloud.hk;blumenhof-wegleitner.at;fax-payday-loans.com;advizewealth.com;bristolaeroclub.co.uk;123vrachi.ru;real-estate-experts.com;cnoia.org;mountsoul.de;girlillamarketing.com;sojamindbody.com;simoneblum.de;antiaginghealthbenefits.com;winrace.no;myhealth.net.au;forskolorna.org;8449nohate.org;brigitte-erler.com;baylegacy.com;sandd.nl;lapinvihreat.fi;seevilla-dr-sturm.at;leoben.at;lebellevue.fr;triggi.de;cwsitservices.co.uk;jobmap.at;woodworkersolution.com;senson.fi;ohidesign.com;atmos-show.com;ivfminiua.com;dekkinngay.com;handi-jack-llc.com;chatizel-paysage.fr;argenblogs.com.ar;sotsioloogia.ee;withahmed.com;midmohandyman.com;boosthybrid.com.au;ulyssemarketing.com;kaotikkustomz.com;presseclub-magdeburg.de;igfap.com;aarvorg.com;linnankellari.fi;houseofplus.com;hexcreatives.co;bxdf.info;healthyyworkout.com;love30-chanko.com;better.town;offroadbeasts.com;xn--thucmctc-13a1357egba.com;autopfand24.de;bierensgebakkramen.nl;zervicethai.co.th;gopackapp.com;polzine.net;pay4essays.net;harveybp.com;arteservicefabbro.com;hihaho.com;hugoversichert.de;xoabigail.com;notsilentmd.org;patrickfoundation.net;crediacces.com;finde-deine-marke.de;refluxreducer.com;jiloc.com;oldschoolfun.net;exenberger.at;thefixhut.com;homesdollar.com;bundabergeyeclinic.com.au;pt-arnold.de;baumkuchenexpo.jp;pomodori-pizzeria.de;tigsltd.com;modelmaking.nl;gasbarre.com;siluet-decor.ru;psc.de;waywithwords.net;cranleighscoutgroup.org;irishmachineryauctions.com;abuelos.com;neuschelectrical.co.za;minipara.com;shonacox.com;chefdays.de;polymedia.dk;zimmerei-fl.de;lascuola.nl;degroenetunnel.com;manijaipur.com;promalaga.es;stemenstilte.nl;allamatberedare.se;anthonystreetrimming.com;smhydro.com.pl;aodaichandung.com;platformier.com;katiekerr.co.uk;fotoscondron.com;acomprarseguidores.com;mirjamholleman.nl;pixelarttees.com;nmiec.com;seagatesthreecharters.com;fannmedias.com;huesges-gruppe.de;deltacleta.cat;people-biz.com;mindpackstudios.com;podsosnami.ru;ussmontanacommittee.us;urmasiimariiuniri.ro;theclubms.com;kmbshipping.co.uk;coastalbridgeadvisors.com;igorbarbosa.com;kuntokeskusrok.fi;parks-nuernberg.de;plv.media;dezatec.es;foretprivee.ca;asgestion.com;delchacay.com.ar;argos.wityu.fund;deschl.net;dutchbrewingcoffee.com;vorotauu.ru;ruralarcoiris.com;smogathon.com;thewellnessmimi.com;commercialboatbuilding.com;fransespiegels.nl;bsaship.com;thailandholic.com;kojima-shihou.com;monark.com;johnsonfamilyfarmblog.wordpress.com;calabasasdigest.com;sportsmassoren.com;mikeramirezcpa.com;qualitus.com;alfa-stroy72.com;lubetkinmediacompanies.com;filmvideoweb.com;readberserk.com;pv-design.de;agence-referencement-naturel-geneve.net;fitnessingbyjessica.com;xtptrack.com;lloydconstruction.com;biortaggivaldelsa.com;montrium.com;testzandbakmetmening.online;justinvieira.com;gamesboard.info;dw-css.de;micro-automation.de;coding-machine.com;bildungsunderlebnis.haus;naturalrapids.com;skanah.com;tetinfo.in;completeweddingkansas.com;eaglemeetstiger.de;zonamovie21.net;tanzschule-kieber.de;remcakram.com;pmc-services.de;body-guards.it;hotelzentral.at;delawarecorporatelaw.com;tomoiyuma.com;nataschawessels.com;myzk.site;hellohope.com;humancondition.com;austinlchurch.com;mediaplayertest.net;mezhdu-delom.ru;ecpmedia.vn;theadventureedge.com;joyeriaorindia.com;blewback.com;accountancywijchen.nl;gratispresent.se;kisplanning.com.au;ihr-news.jp;nancy-informatique.fr;bouncingbonanza.com;todocaracoles.com;drfoyle.com;testcoreprohealthuk.com;katketytaanet.fi;levihotelspa.fi;bouldercafe-wuppertal.de;cirugiauretra.es;besttechie.com;rehabilitationcentersinhouston.net;lescomtesdemean.be;aco-media.nl;creative-waves.co.uk;babcockchurch.org;stemplusacademy.com;dirittosanitario.biz;celeclub.org;bridgeloanslenders.com;dublikator.com;bhwlawfirm.com;answerstest.ru;coursio.com;teczowadolina.bytom.pl;navyfederalautooverseas.com;bafuncs.org;oneplusresource.org;finediningweek.pl;maasreusel.nl;uranus.nl;projetlyonturin.fr;kikedeoliveira.com;compliancesolutionsstrategies.com;balticdermatology.lt;marietteaernoudts.nl;luxurytv.jp;pasvenska.se;miriamgrimm.de;milsing.hr;nosuchthingasgovernment.com;boldcitydowntown.com;crowd-patch.co.uk;cimanchesterescorts.co.uk;insigniapmg.com;notmissingout.com;vox-surveys.com;101gowrie.com;pridoxmaterieel.nl;officehymy.com;craftleathermnl.com;simplyblessedbykeepingitreal.com;heidelbergartstudio.gallery;atalent.fi;nijaplay.com;ikads.org;beautychance.se;tinyagency.com;kamienny-dywan24.pl;quickyfunds.com;goodgirlrecovery.com;evangelische-pfarrgemeinde-tuniberg.de;gmto.fr;chrissieperry.com;1kbk.com.ua;twohourswithlena.wordpress.com;westdeptfordbuyrite.com;jakekozmor.com;centrospgolega.com;osterberg.fi;brawnmediany.com;elimchan.com;freie-gewerkschaften.de;adoptioperheet.fi;jbbjw.com;devok.info;southeasternacademyofprosthodontics.org;mercantedifiori.com;groupe-cets.com;insidegarage.pl;jvanvlietdichter.nl;smithmediastrategies.com;lange.host;garage-lecompte-rouen.fr;manifestinglab.com;ogdenvision.com;schlafsack-test.net;buymedical.biz;tongdaifpthaiphong.net;digivod.de;theapifactory.com;aselbermachen.com;bastutunnan.se;latribuessentielle.com;htchorst.nl;imaginado.de;ravensnesthomegoods.com;zweerscreatives.nl;epwritescom.wordpress.com;fitovitaforum.com;supportsumba.nl;lykkeliv.net;pivoineetc.fr;naturstein-hotte.de;lefumetdesdombes.com;mbxvii.com;fizzl.ru;nachhilfe-unterricht.com;highimpactoutdoors.net;leeuwardenstudentcity.nl;ivivo.es;markelbroch.com;galleryartfair.com;nacktfalter.de;x-ray.ca;karacaoglu.nl;spacecitysisters.org;coding-marking.com;saarland-thermen-resort.com;bigasgrup.com;oslomf.no;mymoneyforex.com;alten-mebel63.ru;hannah-fink.de;aglend.com.au;xn--fn-kka.no;mediaclan.info;starsarecircular.org;kamahouse.net;tsklogistik.eu;jeanlouissibomana.com;sterlingessay.com;paymybill.guru;antonmack.de;littlebird.salon;havecamerawilltravel2017.wordpress.com;nuzech.com;aniblinova.wordpress.com;euro-trend.pl;kindersitze-vergleich.de;latestmodsapks.com;securityfmm.com;ampisolabergeggi.it;steampluscarpetandfloors.com;friendsandbrgrs.com;marchand-sloboda.com;otto-bollmann.de;perbudget.com;christ-michael.net;wsoil.com.sg;transportesycementoshidalgo.es;hrabritelefon.hr;mbfagency.com;wychowanieprzedszkolne.pl;shsthepapercut.com;tampaallen.com;deoudedorpskernnoordwijk.nl;hmsdanmark.dk;courteney-cox.net;sla-paris.com;daklesa.de;thenewrejuveme.com;directwindowco.com;upmrkt.co;echtveilig.nl;biapi-coaching.fr;jerling.de;symphonyenvironmental.com;whyinterestingly.ru;collaborativeclassroom.org;makeurvoiceheard.com;mank.de;socstrp.org;all-turtles.com;homng.net;koken-voor-baby.nl;gantungankunciakrilikbandung.com;cuspdental.com;simpkinsedwards.co.uk;321play.com.hk;smessier.com;lorenacarnero.com;smokeysstoves.com;tulsawaterheaterinstallation.com;vanswigchemdesign.com;schoolofpassivewealth.com;tradiematepro.com.au;dr-tremel-rednitzhembach.de;danubecloud.com;dubnew.com;imperfectstore.com;xn--vrftet-pua.biz;pinkexcel.com;muamuadolls.com;planchaavapor.net;vibethink.net;jorgobe.at;citymax-cr.com;jyzdesign.com;paulisdogshop.de;sporthamper.com;conexa4papers.trade;vitavia.lt;oneheartwarriors.at;365questions.org;vihannesporssi.fi;porno-gringo.com;apprendrelaudit.com;mariposapropaneaz.com;kojinsaisei.info;cheminpsy.fr;myteamgenius.com;simulatebrain.com;bee4win.com;surespark.org.uk;gw2guilds.org;yourobgyn.net;rerekatu.com;kirkepartner.dk;ncuccr.org;schraven.de;esope-formation.fr;herbayupro.com;charlesreger.com;mooshine.com;craigmccabe.fun;siliconbeach-realestate.com;figura.team;work2live.de;olejack.ru;oceanastudios.com;milestoneshows.com;eglectonk.online;stoeberstuuv.de;anybookreader.de;milltimber.aberdeen.sch.uk;jasonbaileystudio.com;ceid.info.tr;nsec.se;tastewilliamsburg.com;instatron.net;schutting-info.nl;cite4me.org;carrybrands.nl;executiveairllc.com;ontrailsandboulevards.com;jobcenterkenya.com;lapinlviasennus.fi;ausbeverage.com.au;mepavex.nl;bargningavesta.se;hushavefritid.dk;nokesvilledentistry.com;slwgs.org;knowledgemuseumbd.com;strandcampingdoonbeg.com;narcert.com;digi-talents.com;ladelirante.fr;turkcaparbariatrics.com;izzi360.com;toponlinecasinosuk.co.uk;ncid.bc.ca;proudground.org;ftf.or.at;trackyourconstruction.com;paradicepacks.com;marathonerpaolo.com;slimani.net;rozemondcoaching.nl;homecomingstudio.com;krcove-zily.eu;mountaintoptinyhomes.com;thedad.com;hairnetty.wordpress.com;mytechnoway.com;stoneys.ch;copystar.co.uk;trulynolen.co.uk;maratonaclubedeportugal.com;abogadosadomicilio.es;tandartspraktijkhartjegroningen.nl;kaliber.co.jp;greenko.pl;parkcf.nl;ianaswanson.com;higadograsoweb.com;highlinesouthasc.com;dushka.ua;tandartspraktijkheesch.nl;thaysa.com;rebeccarisher.com;maxadams.london;beaconhealthsystem.org;international-sound-awards.com;yousay.site;christinarebuffetcourses.com;dnepr-beskid.com.ua;wari.com.pe;blog.solutionsarchitect.guru;mrsplans.net;denifl-consulting.at;plastidip.com.ar;geoffreymeuli.com;walter-lemm.de;teknoz.net;y-archive.com;jacquin-maquettes.com;ecopro-kanto.com;tecnojobsnet.com;tanciu.com;zimmerei-deboer.de;actecfoundation.org;fiscalsort.com;tenacitytenfold.com;irinaverwer.com;jandaonline.com;appsformacpc.com;gymnasedumanagement.com;modestmanagement.com;i-arslan.de;balticdentists.com;rushhourappliances.com;lucidinvestbank.com;maineemploymentlawyerblog.com;precisionbevel.com;sexandfessenjoon.wordpress.com;yamalevents.com;firstpaymentservices.com;opatrovanie-ako.sk;thee.network;zso-mannheim.de;enovos.de;jolly-events.com;evergreen-fishing.com;vancouver-print.ca;harpershologram.wordpress.com;allure-cosmetics.at;kariokids.com;drinkseed.com;unetica.fr;kunze-immobilien.de;blacksirius.de;craigvalentineacademy.com;leather-factory.co.jp;www1.proresult.no;sportverein-tambach.de;levdittliv.se;hashkasolutindo.com;ausair.com.au;meusharklinithome.wordpress.com",
	"net":true,
	"svc":["vss",
	"veeam",
	"sophos",
	"svc$",
	"backup",
	"memtas",
	"sql",
	"mepocs"],
	"nbody":"- - - = = =   W e l c o m e .   A g a i n .   = = = - - -  
  
 [ + ]   W h a t s   H a p p e n ?   [ + ]  
  
 Y o u r   f i l e s   a r e   e n c r y p t e d ,   a n d   c u r r e n t l y   u n a v a i l a b l e .   Y o u   c a n   c h e c k   i t :   a l l   f i l e s   o n   y o u r   c o m p u t e r   h a s   e x t e n s i o n   { E X T } .  
 B y   t h e   w a y ,   e v e r y t h i n g   i s   p o s s i b l e   t o   r e c o v e r   ( r e s t o r e ) ,   b u t   y o u   n e e d   t o   f o l l o w   o u r   i n s t r u c t i o n s .   O t h e r w i s e ,   y o u   c a n t   r e t u r n   y o u r   d a t a   ( N E V E R ) .  
  
 [ + ]   W h a t   g u a r a n t e e s ?   [ + ]  
  
 I t s   j u s t   a   b u s i n e s s .   W e   a b s o l u t e l y   d o   n o t   c a r e   a b o u t   y o u   a n d   y o u r   d e a l s ,   e x c e p t   g e t t i n g   b e n e f i t s .   I f   w e   d o   n o t   d o   o u r   w o r k   a n d   l i a b i l i t i e s   -   n o b o d y   w i l l   n o t   c o o p e r a t e   w i t h   u s .   I t s   n o t   i n   o u r   i n t e r e s t s .  
 T o   c h e c k   t h e   a b i l i t y   o f   r e t u r n i n g   f i l e s ,   Y o u   s h o u l d   g o   t o   o u r   w e b s i t e .   T h e r e   y o u   c a n   d e c r y p t   o n e   f i l e   f o r   f r e e .   T h a t   i s   o u r   g u a r a n t e e .  
 I f   y o u   w i l l   n o t   c o o p e r a t e   w i t h   o u r   s e r v i c e   -   f o r   u s ,   i t s   d o e s   n o t   m a t t e r .   B u t   y o u   w i l l   l o s e   y o u r   t i m e   a n d   d a t a ,   c a u s e   j u s t   w e   h a v e   t h e   p r i v a t e   k e y .   I n   p r a c t i s e   -   t i m e   i s   m u c h   m o r e   v a l u a b l e   t h a n   m o n e y .  
  
 I   s u g g e s t   y o u   r e a d   a b o u t   u s   o n   t h e   I n t e r n e t ,   w e   a r e   k n o w n   a s   " S o d i n o k i b i   R a n s o m w a r e " .   F o r   e x a m p l e ,   t h i s   a r t i c l e :  
 h t t p s : / / w w w . c o v e w a r e . c o m / b l o g / 2 0 1 9 / 7 / 1 5 / r a n s o m w a r e - a m o u n t s - r i s e - 3 x - i n - q 2 - a s - r y u k - a m p - s o d i n o k i b i - s p r e a d  
 P a y   a t t e n t i o n   t o   t h a t :  
 " H o w   M u c h   D a t a   I s   D e c r y p t e d   w i t h   a   R a n s o m w a r e   D e c r y p t o r ?  
  
 I n   Q 2   2 0 1 9 ,   v i c t i m s   w h o   p a i d   f o r   a   d e c r y p t o r   r e c o v e r e d   9 2 %   o f   t h e i r   e n c r y p t e d   d a t a .   T h i s   s t a t i s t i c   v a r i e d   d r a m a t i c a l l y   d e p e n d i n g   o n   t h e   r a n s o m w a r e   t y p e .    
 F o r   e x a m p l e ,   R y u k   r a n s o m w a r e   h a s   a   r e l a t i v e l y   l o w   d a t a   r e c o v e r y   r a t e ,   a t   ~   8 7 % ,   w h i l e   S o d i n o k i b i   w a s   c l o s e   t o   1 0 0 % .   "  
  
 N o w   y o u   h a v e   a   g u a r a n t e e   t h a t   y o u r   f i l e s   w i l l   b e   r e t u r n e d   1 0 0   % .  
  
 [ + ]   H o w   t o   g e t   a c c e s s   o n   w e b s i t e ?   [ + ]  
  
 Y o u   h a v e   t w o   w a y s :  
  
 1 )   [ R e c o m m e n d e d ]   U s i n g   a   T O R   b r o w s e r !  
     a )   D o w n l o a d   a n d   i n s t a l l   T O R   b r o w s e r   f r o m   t h i s   s i t e :   h t t p s : / / t o r p r o j e c t . o r g /  
     b )   O p e n   o u r   w e b s i t e :   h t t p : / / a p l e b z u 4 7 w g a z a p d q k s 6 v r c v 6 z c n j p p k b x b r 6 w k e t f 5 6 n f 6 a q 2 n m y o y d . o n i o n / { U I D }  
  
 2 )   I f   T O R   b l o c k e d   i n   y o u r   c o u n t r y ,   t r y   t o   u s e   V P N !   B u t   y o u   c a n   u s e   o u r   s e c o n d a r y   w e b s i t e .   F o r   t h i s :  
     a )   O p e n   y o u r   a n y   b r o w s e r   ( C h r o m e ,   F i r e f o x ,   O p e r a ,   I E ,   E d g e )  
     b )   O p e n   o u r   s e c o n d a r y   w e b s i t e :   h t t p : / / d e c r y p t o r . c c / { U I D }  
  
 W a r n i n g :   s e c o n d a r y   w e b s i t e   c a n   b e   b l o c k e d ,   t h a t s   w h y   f i r s t   v a r i a n t   m u c h   b e t t e r   a n d   m o r e   a v a i l a b l e .   I f   y o u   h a v e   p r o b l e m   w i t h   c o n n e c t ,   u s e   s t r i c t l y   T O R   v e r s i o n   8 . 5 . 5  
 l i n k   f o r   d o w n l o a d   T O R   v e r s i o n   8 . 5 . 5   h e r e :   h t t p s : / / f i l e h i p p o . c o m / d o w n l o a d _ t o r _ b r o w s e r _ f o r _ w i n d o w s /    
  
 W h e n   y o u   o p e n   o u r   w e b s i t e ,   p u t   t h e   f o l l o w i n g   d a t a   i n   t h e   i n p u t   f o r m :  
 K e y :  
  
 { K E Y }  
  
  
 E x t e n s i o n   n a m e :  
  
 { E X T }  
  
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -  
 p o s t s c r i p t :   I n   c a s e   y o u   w a n t   t o   i n d e p e n d e n t l y   d e c r y p t   y o u r   s e r v e r s ,   w e   w i l l   b e   f o r c e d   t o   p u t   t h e   d a t a b a s e s   o f   y o u r   c o m p a n i e s   i n   t h e   p u b l i c   d o m a i n .   M D F   f i l e s :  
 D B _ U T I L I T Y  
 L e a s e P l u s  
 L P S e c u r i t y  
 L T S h a r e d  
 P a p e r V i s i o n  
  
 ! ! !   D A N G E R   ! ! !  
 D O N T   t r y   t o   c h a n g e   f i l e s   b y   y o u r s e l f ,   D O N T   u s e   a n y   t h i r d   p a r t y   s o f t w a r e   f o r   r e s t o r i n g   y o u r   d a t a   o r   a n t i v i r u s   s o l u t i o n s   -   i t s   m a y   e n t a i l   d a m g e   o f   t h e   p r i v a t e   k e y   a n d ,   a s   r e s u l t ,   T h e   L o s s   a l l   d a t a .  
 ! ! !   ! ! !   ! ! !  
 O N E   M O R E   T I M E :   I t s   i n   y o u r   i n t e r e s t s   t o   g e t   y o u r   f i l e s   b a c k .   F r o m   o u r   s i d e ,   w e   ( t h e   b e s t   s p e c i a l i s t s )   m a k e   e v e r y t h i n g   f o r   r e s t o r i n g ,   b u t   p l e a s e   s h o u l d   n o t   i n t e r f e r e .  
 ! ! !   ! ! !   ! ! !   ",
	"nname":"{	
	EXT}-readme.txt",
	"exp":false,
	"img":"LQAtAC0APQA9AD0AIABTAG8AZABpAG4AbwBrAGkAYgBpACAAUgBhAG4AcwBvAG0AdwBhAHIAZQAgAD0APQA9AC0ALQAtAA0ACgANAAoAQQBsAGwAIABvAGYAIAB5AG8AdQByACAAZgBpAGwAZQBzACAAYQByAGUAIABlAG4AYwByAHkAcAB0AGUAZAAhAA0ACgANAAoARgBpAG4AZAAgAHsARQBYAFQAfQAtAHIAZQBhAGQAbQBlAC4AdAB4AHQAIABhAG4AZAAgAGYAbwBsAGwAbwB3ACAAaQBuAHMAdAB1AGMAdABpAG8AbgBzAAAA",
	"arn":false}

解析配置结构体

继续分析可以发现以下解密字符串,类似于配置信息字段。

继续向下看,发现字符串全部填入了如下的数组中。

继续观察数组内容,可以发现一个规律每填充3个字段,填充的数序类型就会重新循环。拿如下的截图举例。

根据次规律可以设置结构体如下

struct  mv_config_stru
{
  DWORD field_name;
  DWORD unknown;
  DWORD parse_function;
};

由于IDA帮我们解引用出最大索引为44,所以实际4字节元素为45个。再除以3可以得到结构体为15个。定义结构体数组如下。IDA定义结构体数组的方法可以参考我的另一篇文章https://bbs.pediy.com/thread-266419.htm

重新解析后的结构体数组如下。

我们可以发现比较可疑的是unknown字段和对应的函数不相同。而且我们可以看到unknown字段的值类似一个宏,可以通过不同的宏代表不同的结构体数据类型。根据查询资料得知REvil家族使用的配置方式是在恶意程序内部配置一个内嵌的JSON数据解析器,这种内嵌解析器的方式一半来自开源代码,因为病毒作者为了节省开发效率很少会自己开发解析器。使用Google查询开源项目,可以看到C实现的JSON解析器开源项目我们可以通过比较开源项目中的数据定义猜测使用了哪种JSON解析器

从第一个cJSON开源程序代码中可以看到定义如下

/* cJSON Types: */
#define cJSON_Invalid (0)
#define cJSON_False  (1 << 0)	//1
#define cJSON_True   (1 << 1)	//2
#define cJSON_NULL   (1 << 2)	//4
#define cJSON_Number (1 << 3)	//8
#define cJSON_String (1 << 4)	//16
#define cJSON_Array  (1 << 5)	//32
#define cJSON_Object (1 << 6)	//64
#define cJSON_Raw    (1 << 7) /* raw json */	//128

第二个json-parser开源代码中Types如下

typedef enum
{
   json_none,	//0
   json_object,	//1
   json_array,	//2
   json_integer,//3
   json_double,	//4
   json_string,	//5
   json_boolean,//6
   json_null	//7

} json_type;

我们观察type的值都处于0~7的常量范围内,则假设使用的是json-parser的开源项目。将Enum结构体添加进入IDA,让IDA解析出类型后通过后续分析验证是否正确。

跟进函数sub_40ADB3进行分析,通过观察比较后续行为与json-parser的解密一致,所以可以确定使用了该开源的内嵌CJSON解析器执行逻辑。我们可以大致推测后续行为通过内嵌的CJSON解析器将勒索信内容呈现给受害者。源码与反汇编伪代码对比。

支付页面解析

接下来我们仔细观察配置文件,可以看到有一大段不能理解的编码嵌入在配置文件中实际为Base64编码的数据

nbody数据

"- - - = = =   W e l c o m e .   A g a i n .   = = = - - -  
  
 [ + ]   W h a t s   H a p p e n ?   [ + ]  
  
 Y o u r   f i l e s   a r e   e n c r y p t e d ,   a n d   c u r r e n t l y   u n a v a i l a b l e .   Y o u   c a n   c h e c k   i t :   a l l   f i l e s   o n   y o u r   c o m p u t e r   h a s   e x t e n s i o n   { E X T } .  
 B y   t h e   w a y ,   e v e r y t h i n g   i s   p o s s i b l e   t o   r e c o v e r   ( r e s t o r e ) ,   b u t   y o u   n e e d   t o   f o l l o w   o u r   i n s t r u c t i o n s .   O t h e r w i s e ,   y o u   c a n t   r e t u r n   y o u r   d a t a   ( N E V E R ) .  
  
 [ + ]   W h a t   g u a r a n t e e s ?   [ + ]  
  
 I t s   j u s t   a   b u s i n e s s .   W e   a b s o l u t e l y   d o   n o t   c a r e   a b o u t   y o u   a n d   y o u r   d e a l s ,   e x c e p t   g e t t i n g   b e n e f i t s .   I f   w e   d o   n o t   d o   o u r   w o r k   a n d   l i a b i l i t i e s   -   n o b o d y   w i l l   n o t   c o o p e r a t e   w i t h   u s .   I t s   n o t   i n   o u r   i n t e r e s t s .  
 T o   c h e c k   t h e   a b i l i t y   o f   r e t u r n i n g   f i l e s ,   Y o u   s h o u l d   g o   t o   o u r   w e b s i t e .   T h e r e   y o u   c a n   d e c r y p t   o n e   f i l e   f o r   f r e e .   T h a t   i s   o u r   g u a r a n t e e .  
 I f   y o u   w i l l   n o t   c o o p e r a t e   w i t h   o u r   s e r v i c e   -   f o r   u s ,   i t s   d o e s   n o t   m a t t e r .   B u t   y o u   w i l l   l o s e   y o u r   t i m e   a n d   d a t a ,   c a u s e   j u s t   w e   h a v e   t h e   p r i v a t e   k e y .   I n   p r a c t i s e   -   t i m e   i s   m u c h   m o r e   v a l u a b l e   t h a n   m o n e y .  
  
 I   s u g g e s t   y o u   r e a d   a b o u t   u s   o n   t h e   I n t e r n e t ,   w e   a r e   k n o w n   a s   " S o d i n o k i b i   R a n s o m w a r e " .   F o r   e x a m p l e ,   t h i s   a r t i c l e :  
 h t t p s : / / w w w . c o v e w a r e . c o m / b l o g / 2 0 1 9 / 7 / 1 5 / r a n s o m w a r e - a m o u n t s - r i s e - 3 x - i n - q 2 - a s - r y u k - a m p - s o d i n o k i b i - s p r e a d  
 P a y   a t t e n t i o n   t o   t h a t :  
 " H o w   M u c h   D a t a   I s   D e c r y p t e d   w i t h   a   R a n s o m w a r e   D e c r y p t o r ?  
  
 I n   Q 2   2 0 1 9 ,   v i c t i m s   w h o   p a i d   f o r   a   d e c r y p t o r   r e c o v e r e d   9 2 %   o f   t h e i r   e n c r y p t e d   d a t a .   T h i s   s t a t i s t i c   v a r i e d   d r a m a t i c a l l y   d e p e n d i n g   o n   t h e   r a n s o m w a r e   t y p e .    
 F o r   e x a m p l e ,   R y u k   r a n s o m w a r e   h a s   a   r e l a t i v e l y   l o w   d a t a   r e c o v e r y   r a t e ,   a t   ~   8 7 % ,   w h i l e   S o d i n o k i b i   w a s   c l o s e   t o   1 0 0 % .   "  
  
 N o w   y o u   h a v e   a   g u a r a n t e e   t h a t   y o u r   f i l e s   w i l l   b e   r e t u r n e d   1 0 0   % .  
  
 [ + ]   H o w   t o   g e t   a c c e s s   o n   w e b s i t e ?   [ + ]  
  
 Y o u   h a v e   t w o   w a y s :  
  
 1 )   [ R e c o m m e n d e d ]   U s i n g   a   T O R   b r o w s e r !  
     a )   D o w n l o a d   a n d   i n s t a l l   T O R   b r o w s e r   f r o m   t h i s   s i t e :   h t t p s : / / t o r p r o j e c t . o r g /  
     b )   O p e n   o u r   w e b s i t e :   h t t p : / / a p l e b z u 4 7 w g a z a p d q k s 6 v r c v 6 z c n j p p k b x b r 6 w k e t f 5 6 n f 6 a q 2 n m y o y d . o n i o n / { U I D }  
  
 2 )   I f   T O R   b l o c k e d   i n   y o u r   c o u n t r y ,   t r y   t o   u s e   V P N !   B u t   y o u   c a n   u s e   o u r   s e c o n d a r y   w e b s i t e .   F o r   t h i s :  
     a )   O p e n   y o u r   a n y   b r o w s e r   ( C h r o m e ,   F i r e f o x ,   O p e r a ,   I E ,   E d g e )  
     b )   O p e n   o u r   s e c o n d a r y   w e b s i t e :   h t t p : / / d e c r y p t o r . c c / { U I D }  
  
 W a r n i n g :   s e c o n d a r y   w e b s i t e   c a n   b e   b l o c k e d ,   t h a t s   w h y   f i r s t   v a r i a n t   m u c h   b e t t e r   a n d   m o r e   a v a i l a b l e .   I f   y o u   h a v e   p r o b l e m   w i t h   c o n n e c t ,   u s e   s t r i c t l y   T O R   v e r s i o n   8 . 5 . 5  
 l i n k   f o r   d o w n l o a d   T O R   v e r s i o n   8 . 5 . 5   h e r e :   h t t p s : / / f i l e h i p p o . c o m / d o w n l o a d _ t o r _ b r o w s e r _ f o r _ w i n d o w s /    
  
 W h e n   y o u   o p e n   o u r   w e b s i t e ,   p u t   t h e   f o l l o w i n g   d a t a   i n   t h e   i n p u t   f o r m :  
 K e y :  
  
 { K E Y }  
  
  
 E x t e n s i o n   n a m e :  
  
 { E X T }  
  
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -  
 p o s t s c r i p t :   I n   c a s e   y o u   w a n t   t o   i n d e p e n d e n t l y   d e c r y p t   y o u r   s e r v e r s ,   w e   w i l l   b e   f o r c e d   t o   p u t   t h e   d a t a b a s e s   o f   y o u r   c o m p a n i e s   i n   t h e   p u b l i c   d o m a i n .   M D F   f i l e s :  
 D B _ U T I L I T Y  
 L e a s e P l u s  
 L P S e c u r i t y  
 L T S h a r e d  
 P a p e r V i s i o n  
  
 ! ! !   D A N G E R   ! ! !  
 D O N T   t r y   t o   c h a n g e   f i l e s   b y   y o u r s e l f ,   D O N T   u s e   a n y   t h i r d   p a r t y   s o f t w a r e   f o r   r e s t o r i n g   y o u r   d a t a   o r   a n t i v i r u s   s o l u t i o n s   -   i t s   m a y   e n t a i l   d a m g e   o f   t h e   p r i v a t e   k e y   a n d ,   a s   r e s u l t ,   T h e   L o s s   a l l   d a t a .  
 ! ! !   ! ! !   ! ! !  
 O N E   M O R E   T I M E :   I t s   i n   y o u r   i n t e r e s t s   t o   g e t   y o u r   f i l e s   b a c k .   F r o m   o u r   s i d e ,   w e   ( t h e   b e s t   s p e c i a l i s t s )   m a k e   e v e r y t h i n g   f o r   r e s t o r i n g ,   b u t   p l e a s e   s h o u l d   n o t   i n t e r f e r e .  
 ! ! !   ! ! !   ! ! !   "

img数据

"LQAtAC0APQA9AD0AIABTAG8AZABpAG4AbwBrAGkAYgBpACAAUgBhAG4AcwBvAG0AdwBhAHIAZQAgAD0APQA9AC0ALQAtAA0ACgANAAoAQQBsAGwAIABvAGYAIAB5AG8AdQByACAAZgBpAGwAZQBzACAAYQByAGUAIABlAG4AYwByAHkAcAB0AGUAZAAhAA0ACgANAAoARgBpAG4AZAAgAHsARQBYAFQAfQAtAHIAZQBhAGQAbQBlAC4AdAB4AHQAIABhAG4AZAAgAGYAbwBsAGwAbwB3ACAAaQBuAHMAdAB1AGMAdABpAG8AbgBzAAAA"

使用网络厨师解析可以看到以下内容

勒索信内容如下

勒索信内容

---=== Welcome. Again. ===---

[+] Whats Happen? [+]

Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}.
By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER).

[+] What guarantees? [+]

Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests.
To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee.
If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money.

I suggest you read about us on the Internet, we are known as "Sodinokibi Ransomware". For example, this article:
https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread
Pay attention to that:
"How Much Data Is Decrypted with a Ransomware Decryptor?

In Q2 2019, victims who paid for a decryptor recovered 92% of their encrypted data. This statistic varied dramatically depending on the ransomware type. 
For example, Ryuk ransomware has a relatively low data recovery rate, at ~ 87%, while Sodinokibi was close to 100%. "

Now you have a guarantee that your files will be returned 100 %.

[+] How to get access on website? [+]

You have two ways:

1) [Recommended] Using a TOR browser!
  a) Download and install TOR browser from this site: https://torproject.org/
  b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID}

2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this:
  a) Open your any browser (Chrome, Firefox, Opera, IE, Edge)
  b) Open our secondary website: http://decryptor.cc/{UID}

Warning: secondary website can be blocked, thats why first variant much better and more available. If you have problem with connect, use strictly TOR version 8.5.5
link for download TOR version 8.5.5 here: https://filehippo.com/download_tor_browser_for_windows/ 

When you open our website, put the following data in the input form:
Key:

{KEY}


Extension name:

{EXT}

-----------------------------------------------------------------------------------------
postscript: In case you want to independently decrypt your servers, we will be forced to put the databases of your companies in the public domain. MDF files:
DB_UTILITY
LeasePlus
LPSecurity
LTShared
PaperVision

!!! DANGER !!!
DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data.
!!! !!! !!!
ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere.
!!! !!! !!!

可以看到勒索信中以下内容是通过动态运算获取填充到勒索信内的,所以合理推测后续会有收集系统信息的操作

继续向下跟踪代码,看到病毒首先获取SOFTWARE\GitForWindow子键下3lP键值的数据

如果没有此类键值数据则通过计算生成并设置对应键值(这里暂时没有识别出算法但是不影响继续分析)

接下来病毒收集卷序列号以及CPU信息生成一个hash值

获取并设置新的注册表键值信息PiZuMhL

获取用户名信息

获取domain键值

获取本地系统语言

获取Windows版本信息

通过判断系统位数

将收集到的信息格式化拼接成字符串,这时可以从格式化字符中重新命名全局变量的值。

将拼接后的字符串和一个32字节的字符串数据传入一个函数中,并返回运算过的字符数据。因此我们合理猜测该处为一种加密算法。32字节为密钥数据。

密钥数据

加密算法的分析我们可以放到最后做简单的分析判断,现在主要分析病毒行为。我们可以看到病毒将加密后的数据写入注册表。

判断是否有以下5个命令行参数输入

如果获取所有相关配置则返回一个Flag值作为标志。

获取受害者系统语言,判断是否是加密白名单

获取键盘输入法列表

键盘布局白名单如下

病毒为了防止加密过程中被杀软中断,将系统信息填入注册表子键SOFTWARE\Microsoft\Windows\CurrentVersionun中

当完成加密后删除无效路径

MSDN文档内容如下

接下来病毒创建了一个恶意线程执行不同逻辑

恶意线程主要通过WMI检测异步创建进程

遍历进程服务,杀死srv配置字段中的服务进程

杀死列表中服务进程

创建进程快照遍历进程,并利用函数指针调用传入函数地址

遍历杀死配置文件中proc字段的进程

根据进程ID杀死进程

如果在XP版本以上的系统中运行指向powershell

Base64解密编码如下,删除系统卷影防止系统通过备份恢复加密数据。

Get-WmiObject Win32_Shadowcopy | ForEach-Object {$_.Delete();}

在XP系统执行以下操作删除卷影。

cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures

病毒读取输入命令,执行命令对应操作操作。

根据传入命令加密指定路径文件和加密网络资源,如果没有命令则不执行。

文件加密是通过API暴力遍历所有盘符,满足类型后遍历加密盘符

遍历盘符目录

遍历共享网络盘符加密

我们也可以从配置文件中了解病毒要加密的文件后缀(ext)、一些不能加密的配置目录(fld)和配置文件(fls)

"fld":[
				"msocache",
				"intel",
				"$recycle.bin",
				"google",
				"perflogs",
				"system volume information",
				"windows",
				"mozilla",
				"appdata",
				"tor browser",
				"$windows.~ws",
				"application data",
				"$windows.~bt",
				"boot",
				"windows.old"
			],		
			"fls":[
				"bootsect.bak",
				"autorun.inf",
				"iconcache.db",
				"thumbs.db",
				"ntuser.ini",
				"boot.ini",
				"bootfont.bin",
				"ntuser.dat",
				"ntuser.dat.log",
				"ntldr",
				"desktop.ini"
			],
			"ext":[
				"com",
				"ani",
				"scr","drv","hta","rom","bin","msc","ps1","diagpkg","shs","adv","msu","cpl","prf","bat","idx","mpa","cmd","msi","mod","ocx","icns","ics","spl","386","lock","sys","rtp","wpx","diagcab","theme","deskthemepack","msp","cab","ldf","nomedia","icl","lnk","cur","dll","nls","themepack","msstyles","hlp","key","ico","exe","diagcfg"
				]

加密部分

IOCP简介

病毒作者为了追求加密时的高效快速,利用了I/O完全端口。这种技术可以实现异步多线程,为线程并发提供有效支持。

CreateIoCompletionPort 函数创建一个I/O完成端口对象,它可以与多个文件句柄进行关联。当绑定文件句柄的I/O操作完成后,对应的I/O完成包会以先进先出(FIFO)的方式返回给绑定的I/O完成端口对象。它的强大之处在于可以将多个文件句柄同步到一个单一对象进行I/O处理。一旦创建了文件句柄和I/O完成端口的关联后,状态块便不会更新,直到I/O完成包被完成端口移除。

GetQueuedCompletionStatus 函数用于等待一个线程的请求包按照队列顺序返回到I/O完成端口,而不是直接等待异步