转自:http://avfbbs.80port.net/?u=7
一个传奇木马"龙"(病毒图标文字)的"神话" - Trojan-PSW.Win32.Lmir.aji
病毒运行后生成文件:
&Windows%\finder.com
&Windows%\CSRSS.exe
&Windows%\MSWINSCK.OCX
%Windows%\explorer1.com
%Windows%\1.com
%Windows%\ExERoute.exe
&Windows%\Debug\DebugProgram.exe
%system32%\rundll32.com
%system32%\finder.com
%system32%\command.pif
%system32%\MSCONFIG.COM
%system32%\dxdiag.com
%system32%2\regedit.com
%SystemRoot%\Program Files\Internet Explorer\iexplore.com
%SystemRoot%\Program Files\Common Files\iexplore.pif
C:\Documents and Settings\用户名\「开始」菜单\程序\计算机安全中心.LNK
C:\Documents and Settings\用户名\「开始」菜单\程序\安全测试.LNK
C:\Documents and Settings\用户名\「开始」菜单\程序\系统信息管理器.LNK
C:\autorun.inf
文件内容为
"[autorun]
OPEN=C:\WINNT\CSRSS.exe"
打开C盘则会自动运行病毒宿主程序.
并增加注册表键:
HKCU\SOFTWARE\VB and VBA Program Settings
建立病毒标志.
HKCR\winfiles
建立win文件类型并关联到"&Windows%\ExERoute.exe".
修改诸多文件类型关联到病毒文件:
其中:
HKCR\.lnk\ShellNew\\command
HKCR\.bfc\ShellNew\\command
HKCR\cplfile\Shell\cplopen\command\\
HKCR\dunfile\Shell\open\command\\
HKCR\file\Shell\open\command\\
HKCR\htmlfile\Shell\Print\command\\
HKCR\inffile\Shell\Install\command\\
关联到"rundll32.com"
HKCR\InternetShortcut\Shell\open\command\\
HKCR\scrfile\Shell\Install\command\\
HKCR\telnet\Shell\open\command\\
HKCR\InternetShortcut\Shell\open\command\\
HKCR\scrfile\Shell\Install\command\\
关联到"finder.com"
HKCR\scriptletfile\Shell\Generate Typelib\command\\
关联到"%system32%\finder.com"
HKCR\Unknown\Shell\openas\command\\
关联到"%SystemRoot%\system32\finder.com"
HKCR\dunfile\Shell\open\command\\
关联到"%SystemRoot%\system32\rundll32.com"
HKLM\SOFTWARE\MICROSOFT\Shared Tools\MSInfo\ToolSets\MSInfo\hdwwiz\\command
关联到"C:\WINNT\system32\command.pif"
HKCR\htmlfile\Shell\open\command\\
关联到"%SystemRoot%\Program Files\Internet Explorer\iexplore.com"
HKCU\SOFTWARE\MICROSOFT\Internet Explorer\Main\\Check_Associations
"No"
禁用IE默认关联检查.
HKCR\Applications\iexplore.exe\Shell\open\command\\
HKCR\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell\OpenHomePage\command\\
HKCR\ftp\Shell\open\command\\
关联到"%SystemRoot%\Program Files\Internet Explorer\iexplore.com"
HKCR\htmlfile\Shell\opennew\command\\
HKCR\http\Shell\open\command\\
关联到"%SystemRoot%\Program Files\common~1\iexplore.pif
HKCR\Drive\Shell\find\command\\
关联到%SystemRoot%\explorer1.com
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\Winlogon\\Shell
修改为"Explorer.exe 1".
HKLM\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\RUN\\Torjan Program
"%Windows%\CSRSS.exe"
建立病毒自启动项.
HKCR\.exe\\
修改(默认)为winfile,这样每次启动exe文件则会自动指向病毒自建文件类型win并关联到病毒文件"&Windows%\ExERoute.exe".
关于病毒的清除,由于病毒修改了多处注册表,并建立诸多病毒文件,请耐心.
1,首先结束病毒进程(由于病毒关联了exe文件,运行exe文件会激活病毒,需要用第三方进程管理软件并改名运行来结束病毒进程,如Process Explorer,将其主文件*.exe改名为*.com运行)
结束进程:
&Windows%\CSRSS.exe
%Windows%\ExERoute.exe
2,用Regfix.exe改名为Regfix.com后运行并修复exe关联.
3,还原被病毒修改的注册表内容:
打开注册表编辑器,需要修改以下内容:
HKCR\.lnk\ShellNew\\command
HKCR\.bfc\ShellNew\\command
HKCR\cplfile\Shell\cplopen\command\\
HKCR\dunfile\Shell\open\command\\
HKCR\file\Shell\open\command\\
HKCR\htmlfile\Shell\Print\command\\
HKCR\inffile\Shell\Install\command\\
HKCR\InternetShortcut\Shell\open\command\\
HKCR\scrfile\Shell\Install\command\\
HKCR\telnet\Shell\open\command\\
HKCR\InternetShortcut\Shell\open\command\\
HKCR\scrfile\Shell\Install\command\\
HKCR\scriptletfile\Shell\Generate Typelib\command\\
HKCR\Unknown\Shell\openas\command\\
HKCR\dunfile\Shell\open\command\\
HKLM\SOFTWARE\MICROSOFT\Shared Tools\MSInfo\ToolSets\MSInfo\hdwwiz\\command
将以上注册表键值下的"rundll32.com","finder.com","command.pif"改为"rundll32.exe"
HKCR\htmlfile\Shell\open\command\\
HKCR\Applications\iexplore.exe\Shell\open\command\\
HKCR\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell\OpenHomePage\command\\
HKCR\ftp\Shell\open\command\\
将以上键值下的"iexplore.com"改为"iexplore.exe"
HKCR\htmlfile\Shell\opennew\command\\
HKCR\http\Shell\open\command\\
将以上键值下内容修改为"%SystemRoot%\Program Files\Internet Explorer\iexplore.exe"
HKCR\Drive\Shell\find\command\\
将以上键值下的"explorer1.com"改为"iexplore.exe"
HKCR\.exe\\
将以上键值下的"(默认)"修改为"exefile"
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\Winlogon\\Shell
将以上键值下的"Explorer.exe 1"修改为"Explorer.exe"
HKCU\SOFTWARE\MICROSOFT\Internet Explorer\Main\\Check_Associations
将以上键值下的"No"修改为"Yes"
删除HKCR\winfiles
删除病毒自启动项和病毒信息:
HKLM\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\RUN\\Torjan Program
"%Windows%\CSRSS.exe"
HKCU\SOFTWARE\VB and VBA Program Settings
4,最后删除病毒文件:
&Windows%\finder.com
&Windows%\CSRSS.exe
&Windows%\MSWINSCK.OCX
%Windows%\explorer1.com
%Windows%\1.com
%Windows%\ExERoute.exe
&Windows%\Debug\DebugProgram.exe
%system32%\rundll32.com
%system32%\finder.com
%system32%\command.pif
%system32%\MSCONFIG.COM
%system32%\dxdiag.com
%system32%2\regedit.com
%SystemRoot%\Program Files\Internet Explorer\iexplore.com
%SystemRoot%\Program Files\Common Files\iexplore.pif
C:\Documents and Settings\用户名\「开始」菜单\程序\计算机安全中心.LNK
C:\Documents and Settings\用户名\「开始」菜单\程序\安全测试.LNK
C:\Documents and Settings\用户名\「开始」菜单\程序\系统信息管理器.LNK
C:\autorun.inf
由于这个病毒清除起来如此困难,如果有任何畏难情绪,建议中毒同志直接重新安装系统.(这句话写在最后还是希望大家和病毒作者斗争到底!)
注:这个作者真是煞费苦心,一般同志要想清除这个病毒真得需要些恒心和毅力,怀疑与一些破解外挂程序有关,所以希望大家一定要增强安全意识,不要轻易运行任何未知程序,特别是带有诱惑说明的程序,中毒同志一定要亡羊补牢,格式化硬盘的恶意程序也不是没有出现过 :( ,引以为戒,引以为戒...
补充:
病毒残留的一些注册表垃圾信息:
HKCR\MSWinsock.Winsock\\
(默认)"Microsoft WinSock Control, version 6.0 (SP6)"
HKCR\MSWinsock.Winsock\CLSID\\
"{248DD896-BB45-11CF-9ABC-0080C7E7B78D}"
HKCR\MSWinsock.Winsock\CurVer\\
"MSWinsock.Winsock.1"
HKCR\MSWinsock.Winsock.1\\
"Microsoft WinSock Control, version 6.0 (SP6)"
HKCR\MSWinsock.Winsock.1\CLSID\\
"{248DD896-BB45-11CF-9ABC-0080C7E7B78D}"
HKCR\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InProcServer32\\ThreadingModel
(默认)"%Windows%\MSWINSCK.OCX"
HKCR\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\\
(默认)"MSWinsock.Winsock"
HKCR\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\\
(默认)"MSWinsock.Winsock.1"
HKCR\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Typelib\\
"{248DD890-BB45-11CF-9ABC-0080C7E7B78D}"
HKCR\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\\
"1.0"
HKCR\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\\
"132497"
HKCR\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\\
(默认)"%Windows%\MSWINSCK.OCX, 1"
HKCR\Typelib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\\
(默认)"2"
HKCR\Typelib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\\
(默认)"%Windows%\MSWINSCK.OCX"
HKCR\Typelib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\\
HKCR\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\\
(默认)"IMSWinsockControl"
HKCR\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid\\
(默认)"{00020424-0000-0000-C000-000000000046}"
HKCR\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\\
(默认)"{00020424-0000-0000-C000-000000000046}"
HKCR\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\Typelib\\Version
"1.0"
HKCR\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid\\
(默认)"{00020420-0000-0000-C000-000000000046}"
HKCR\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\\
(默认)"{00020420-0000-0000-C000-000000000046}"
HKCR\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\Typelib\\Version
"1.0"
将以上注册表键值清空.