使用Process Explorer工具,监视进程执行状况,查看是否有程序调用了异常的dll库之类的。html
使用systracer工具分析某个程序执行先后,计算机注册表、文件、端口的一些变化状况。算法
date /t >> c:\netstatlog.txt time /t >> c:\netstatlog.txt netstat -bn >> c:\netstatlog.txt
schtasks /create /TN netstat /sc MINUTE /MO 2 /TR "c:\netstatlog.bat"
建立一个每隔两分钟记录计算机联网状况的任务netstat
任务计划项目,点击“操做”页签,“编辑”|修改“程序或脚本”为C:\netstatlog.bat
netstatlog.txt
文件……netstat
任务计划项目,在“常规”页签中勾选“使用最高权限运行”根据张竞予同窗的博客,制做了相关表格和饼状图。因为使用的是虚拟机进行实践,因此联网的应用程序种类较少。
chrome
Sysmon20155303.xml
,内容以下:<Sysmon schemaversion="3.10"> <!-- Capture all hashes --> <HashAlgorithms>*</HashAlgorithms> <EventFiltering> <!-- Log all drivers except if the signature --> <!-- contains Microsoft or Windows --> <DriverLoad onmatch="exclude"> <Signature condition="contains">microsoft</Signature> <Signature condition="contains">windows</Signature> </DriverLoad> <NetworkConnect onmatch="exclude"> <Image condition="end with">chrome.exe</Image> <Image condition="end with">iexplorer.exe</Image> <SourcePort condition="is">137</SourcePort> </NetworkConnect> <CreateRemoteThread onmatch="include"> <TargetImage condition="end with">explorer.exe</TargetImage> <TargetImage condition="end with">svchost.exe</TargetImage> <TargetImage condition="end with">winlogon.exe</TargetImage> <SourceImage condition="end with">powershell.exe</SourceImage> </CreateRemoteThread> </EventFiltering> </Sysmon>
Sysmon.exe -i C:\Sysmon20155330.xml
安装SysmonSysmon.exe -c C:\Sysmon20155330.xml
更改配置文件,监听443和80端口,无异常发生。<Sysmon schemaversion="3.10"> <!-- Capture all hashes --> <HashAlgorithms>*</HashAlgorithms> <EventFiltering> <!-- Log all drivers except if the signature --> <!-- contains Microsoft or Windows --> <DriverLoad onmatch="exclude"> <Signature condition="contains">microsoft</Signature> <Signature condition="contains">windows</Signature> </DriverLoad> <NetworkConnect onmatch="exclude"> <Image condition="end with">SogouExplorer.exe</Image> </NetworkConnect> <NetworkConnect onmatch="include"> <DestinationPort condition="is">80</DestinationPort> <DestinationPort condition="is">443</DestinationPort> </NetworkConnect> <CreateRemoteThread onmatch="include"> <TargetImage condition="end with">explorer.exe</TargetImage> <TargetImage condition="end with">svchost.exe</TargetImage> <TargetImage condition="end with">winlogon.exe</TargetImage> <SourceImage condition="end with">powershell.exe</SourceImage> </CreateRemoteThread> </EventFiltering> </Sysmon>
算法库支持状况
shell
如下为软件记录状况(部分)。
windows
后门软件运行状况记录:
网络
加壳后:
工具
经过此次的学习和实践,主要对恶意代码的分析方式有了必定的了解。恶意代码分析主要分为静态分析和动态分析两种方式。经过和上一次的实践相结合,对恶意代码的隐蔽性有了更加深入的了解。学习