分析者: Francesca Villasanta   

 :

Ransom:Win32/Nokonoko.PB!MTB (MICROSOFT); Win32:Nokoyawa-A [Trj] (AVAST)

 平台:

Windows

 总体风险等级:
 潜在破坏:
 潜在分布:
 感染次数:
 信息暴露:

  • 恶意软件类型:
    Ransomware

  • 有破坏性?:
    没有

  • 加密?:
    没有

  • In the Wild:
    是的

  概要

感染途徑: ???????, ?????????

它以文件的形式出现在系统中,可能是其他恶意软件投放的,或者是用户在访问恶意网站时无意中下载的。

  技术详细信息

文件大小: 25,088 bytes
报告日期: EXE
内存驻留: 是的
初始樣本接收日期: 2023年4月12日
Payload: ????/???, ???????
N

???????

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

??

???????:

  • if --safe-mode commandline parameter is used:
    • "%System%\bcdedit.exe" /set {default} safeboot network
    • "%System%\shutdown.exe" -r

(??: %System% ? Windows ? system ???,???? C:\Windows\System (Windows 98 ? ME)?C:\WINNT\System32 (Windows NT ? 2000) ? C:\WINDOWS\system32 (Windows 2000(32-bit)?XP?Server 2003(32-bit)?Vista?7?8?8.1?2008(64-bit),2012(64bit) ? 10(64-bit))?)

?????

???????????,???????,??????????????:

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Control\SafeBoot\Network\
nokonoko ? if --safe-mode commandline parameter is used.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\nokonoko ? if --safe-mode commandline parameter is used.

??????

?????????:

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Control\SafeBoot\Network\
nokonoko ? if --safe-mode commandline parameter is used.
(Default) = Service

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Control ? if --safe-mode commandline parameter is used.
ServicesPipeTimeout = 86400000

??????

?????????:

  • It encrypts files found in the following drives:
    • Fixed Drives
    • Removable Drives
    • Remote (Network) Drives
  • The following can be changed in the runtime configuration:
    • Directories to avoid
    • File extensions to avoid
    • Ransom note content
    • Ransom note filename
    • Appended extension of encrypted files
    The following can be enabled/disabled in the runtime configuration:
    • Encryption of network shares
    • Delete shadow copies
    • Loading of hidden drives
  • It shows the following message box when the --config argument is improperly encoded:
  • It adds the following service if --safe-mode commandline parameter is used:
      Service Name: nokonoko
      Display Name: shmokoshmoko
      Path to exectuable: {Malware File Path}\{Malware File Name}.exe --config {Base64 encoded config}
      Start Type: Auto start

  解决方案

最小扫描引擎: 9.800
First VSAPI Pattern File: 18.380.02
VSAPI 第一样式发布日期: 2023年4月13日
VSAPI OPR样式版本: 18.381.00
VSAPI OPR样式发布日期: 2023年4月14日

Step 2

??Windows ME?XP??,????,????????????,??????????

Step 3

注意:在此恶意软件/间谍软件/灰色软件执行期间,并非所有文件、文件夹和注册表键值和项都会安装到您的计算机上。这可能是由于不完整的安装或其他操作系统条件所致。如果您没有找到相同的文件/文件夹/注册表信息,请继续进行下一步操作。

Step 4

????????

[ 更多 ]

Step 5

??????????

[ 更多 ]

????:????Windows???????????????????????????????????????????,????Microsoft??,????????????

  • In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\nokonoko
    • (Default) = Service
  • In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control
    • ServicesPipeTimeout = 86400000

Step 6

????????

[ 更多 ]

????:????Windows???????????????????????????????????????????,????Microsoft??,????????????

  • In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\nokonoko
  • In HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nokonoko

Step 7

?????????

[ 更多 ]
?????????????????"????"?????????????????,??????????????????
  • {Encrypted Directory}\NOKONOKO-readme.txt
DATA_GENERIC_FILENAME_1
  • ??????????,??
  • ???????????
  • ????,?????,????SHIFT+DELETE???????
  • ?????????2?4?:
      • {Encrypted Directory}\NOKONOKO-readme.txt
  • Step 8

    ????????,?????????????,??Ransom.Win32.NOKO.THDABBC?? ????????????????????????,????????????????????????????????????????

    Step 9

    从备份中恢复加密文件。