-
如果你要看某樣本分析報告:直接在any run里去搜索hash好了!!!
然后就可以看沙箱的詳細報告。
我們再看下,jossandbox也是非常好用啊。

在result界面搜hash即可。

回到any run。
比如,我分析wannacry后,看att&ck攻擊圖:
比如我想看,持久化里面的部分,點擊scheduled task:

然后,可以看到,wbengine.exe調用了一個com api實現了定時任務,然后到進程頁面看看:

的確就是他干的!看下more info:

看進程圖里這個進程是如何啟動的:

前面SER表示,是以服務的方式啟動的。。。

然后下面這個圖是說調用了com api,加入計划任務?沒看太懂。。。計划任務不是有執行周期啥的嘛,這個沒有。。。?

我們在看看text report也是非常友好的:

比如,行為分析部分就很詳細:
Behavior activities
下面是可疑的行為 最右邊是其他info輔助消息 這些都是確定惡意的 Application was injected by another process(是說進程注入) - svchost.exe (PID: 548)
- svchost.exe (PID: 924)
- SearchIndexer.exe (PID: 2796)
- svchost.exe (PID: 3884)
- wmiprvse.exe (PID: 3700)
- SearchIndexer.exe (PID: 2796)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- taskdl.exe (PID: 2468)
- taskdl.exe (PID: 3884)
- @WanaDecryptor@.exe (PID: 2964)
- @WanaDecryptor@.exe (PID: 2468)
- taskhsvc.exe (PID: 1548)
- taskdl.exe (PID: 4092)
- @WanaDecryptor@.exe (PID: 612)
- @WanaDecryptor@.exe (PID: 2508)
- taskdl.exe (PID: 1388)
- taskdl.exe (PID: 3188)
- @WanaDecryptor@.exe (PID: 648)
- taskdl.exe (PID: 3036)
- @WanaDecryptor@.exe (PID: 2524)
- @WanaDecryptor@.exe (PID: 2072)
- taskdl.exe (PID: 1200)
- @WanaDecryptor@.exe (PID: 2316)
- taskdl.exe (PID: 3452)
- SearchProtocolHost.exe (PID: 120)
- taskhsvc.exe (PID: 1548)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- cmd.exe (PID: 4064)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- cmd.exe (PID: 2968)
- cmd.exe (PID: 2968)
- wbadmin.exe (PID: 1688)
- wbengine.exe (PID: 1524)
- reg.exe (PID: 2820)
Checks supported languages - WinRAR.exe (PID: 872)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- cmd.exe (PID: 1292)
- taskdl.exe (PID: 2468)
- cscript.exe (PID: 2204)
- taskdl.exe (PID: 3884)
- @WanaDecryptor@.exe (PID: 2964)
- @WanaDecryptor@.exe (PID: 2468)
- cmd.exe (PID: 4064)
- taskhsvc.exe (PID: 1548)
- cmd.exe (PID: 2968)
- wmiprvse.exe (PID: 3700)
- WMIC.exe (PID: 3396)
- taskdl.exe (PID: 4092)
- @WanaDecryptor@.exe (PID: 612)
- cmd.exe (PID: 3696)
- taskdl.exe (PID: 1200)
- taskdl.exe (PID: 3036)
- @WanaDecryptor@.exe (PID: 2508)
- taskdl.exe (PID: 3188)
- @WanaDecryptor@.exe (PID: 2316)
- @WanaDecryptor@.exe (PID: 648)
- taskdl.exe (PID: 1388)
- @WanaDecryptor@.exe (PID: 2524)
- @WanaDecryptor@.exe (PID: 2072)
- taskdl.exe (PID: 3452)
- WinRAR.exe (PID: 872)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- cscript.exe (PID: 2204)
- @WanaDecryptor@.exe (PID: 2468)
- taskhsvc.exe (PID: 1548)
- WMIC.exe (PID: 3396)
- wmiprvse.exe (PID: 3700)
- SearchIndexer.exe (PID: 2796)
- WinRAR.exe (PID: 872)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- @WanaDecryptor@.exe (PID: 2964)
- SearchIndexer.exe (PID: 2796)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- @WanaDecryptor@.exe (PID: 2964)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- @WanaDecryptor@.exe (PID: 2468)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- taskhsvc.exe (PID: 1548)
- cmd.exe (PID: 1292)
- @WanaDecryptor@.exe (PID: 2964)
- vssvc.exe (PID: 3932)
- wbengine.exe (PID: 1524)
- vds.exe (PID: 2324)
- wbadmin.exe (PID: 1688)
- vdsldr.exe (PID: 2792)
- cmd.exe (PID: 3696)
Reads the computer name - SearchProtocolHost.exe (PID: 120)
- icacls.exe (PID: 3684)
- vssadmin.exe (PID: 3936)
- vssvc.exe (PID: 3932)
- svchost.exe (PID: 3884)
- wbadmin.exe (PID: 1688)
- vds.exe (PID: 2324)
- wbengine.exe (PID: 1524)
- vdsldr.exe (PID: 2792)
- SearchProtocolHost.exe (PID: 120)
- attrib.exe (PID: 3536)
- icacls.exe (PID: 3684)
- vssvc.exe (PID: 3932)
- svchost.exe (PID: 3884)
- vssadmin.exe (PID: 3936)
- bcdedit.exe (PID: 3044)
- bcdedit.exe (PID: 672)
- wbadmin.exe (PID: 1688)
- wbengine.exe (PID: 1524)
- vds.exe (PID: 2324)
- vdsldr.exe (PID: 2792)
- reg.exe (PID: 2820)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- Proforma Invoice and Bank swift-REG.PI-0086547654.exe (PID: 2680)
- taskhsvc.exe (PID: 1548)
- cscript.exe (PID: 2204)
還可以看到注冊表修改事件:
2820 reg.exe write HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run yyibsxxiapw107 "C:\Users\admin\Desktop\tasksche.exe"特么在開機啟動啊。。。當然作為勒索還有大量的刪除文件動作:
當然,做網絡流量分析的話,還可以看看網絡流量相關請求:

總之,這玩意對我們檢測來說真的是太好用了!!!
[翻譯]我如何使用app.any.run https://bbs.pediy.com/thread-254296.htm2019-9-5 15:52


