|

Volatility ile Windows, Mac ve Linux üzerinde Zararlı Yazılım Analizi



alicangonullu tarafından 2022-08-05 15:29:27 tarihinde yazıldı. Tahmini okunma süresi 26 dakika, 8 saniye. 394 kere görüntülendi.




Disclaimer


The information provided in this blog post is intended for educational and informational purposes only. It is not intended to encourage or promote any illegal or unethical activities, including hacking, cyberattacks, or any form of unauthorized access to computer systems, networks, or data.

Yasal Uyarı
Bu blog yazısında sağlanan bilgiler yalnızca eğitim ve bilgilendirme amaçlıdır. Bilgisayar korsanlığı, siber saldırılar veya bilgisayar sistemlerine, ağlara veya verilere herhangi bir şekilde yetkisiz erişim de dahil olmak üzere herhangi bir yasa dışı veya etik olmayan faaliyeti teşvik etme veya reklamlama amacı taşımaz.
Yasal bilgiler için yasal sayfasını inceleyebilirsiniz .

Merhaba arkadaşlar,

Bu yazımda sizlerle beraber Volatility 2.6 ile bellek kaydı üzerinde zararlı yazılım analizi yapacağız. Hepinize şimdiden keyifli okumalar.

Volatility, bir bellek inceleme aracıdır. Aldığınız bellek kayıtlarından bilgisayarınız hakkında pek çok bilgiyi edinebilirsiniz. Biz bu yazımızda hem bilgisayar hakkında bilgi edinip hem de zararlı yazılım bulaşmış bir makinayı araştıracağız. Ben araştırmalarımı Windows üzerinden yapacağım. Siz dilediğiniz sistemi kullanabilirsiniz.

Gerekenler,

Öncelikle Volatility 2.6 ile gelen eklentiler listesi şöyledir

banners.Banners,
configwriter.ConfigWriter,
frameworkinfo.FrameworkInfo,
isfinfo.IsfInfo,
layerwriter.LayerWriter,
linux.bash.Bash,
linux.check_afinfo.Check_afinfo,
linux.check_creds.Check_creds,
linux.check_idt.Check_idt,
linux.check_modules.Check_modules,
linux.check_syscall.Check_syscall,
linux.elfs.Elfs,
linux.keyboard_notifiers.Keyboard_notifiers,
linux.kmsg.Kmsg,
linux.lsmod.Lsmod,
linux.lsof.Lsof,
linux.malfind.Malfind,
linux.mountinfo.MountInfo,
linux.proc.Maps,
linux.psaux.PsAux,
linux.pslist.PsList,
linux.pstree.PsTree,
linux.tty_check.tty_check,
mac.bash.Bash,
mac.check_syscall.Check_syscall,
mac.check_sysctl.Check_sysctl,
mac.check_trap_table.Check_trap_table,
mac.ifconfig.Ifconfig,
mac.kauth_listeners.Kauth_listeners,
mac.kauth_scopes.Kauth_scopes,
mac.kevents.Kevents,
mac.list_files.List_Files,
mac.lsmod.Lsmod,
mac.lsof.Lsof,
mac.malfind.Malfind,
mac.mount.Mount,
mac.netstat.Netstat,
mac.proc_maps.Maps,
mac.psaux.Psaux,
mac.pslist.PsList,
mac.pstree.PsTree,
mac.socket_filters.Socket_filters,
mac.timers.Timers,
mac.trustedbsd.Trustedbsd,
mac.vfsevents.VFSevents,
timeliner.Timeliner,
windows.bigpools.BigPools,
windows.cachedump.Cachedump,
windows.callbacks.Callbacks,
windows.cmdline.CmdLine,
windows.crashinfo.Crashinfo,
windows.devicetree.DeviceTree,
windows.dlllist.DllList,
windows.driverirp.DriverIrp,
windows.driverscan.DriverScan,
windows.dumpfiles.DumpFiles,
windows.envars.Envars,
windows.filescan.FileScan,
windows.getservicesids.GetServiceSIDs,
windows.getsids.GetSIDs,
windows.handles.Handles,
windows.hashdump.Hashdump,
windows.org.Info,
windows.ldrmodules.LdrModules,
windows.lsadump.Lsadump,
windows.malfind.Malfind,
windows.mbrscan.MBRScan,
windows.memmap.Memmap,
windows.mftscan.MFTScan,
windows.modscan.ModScan,
windows.modules.Modules,
windows.mutantscan.MutantScan,
windows.netscan.NetScan,
windows.netstat.NetStat,
windows.poolscanner.PoolScanner,
windows.privileges.Privs,
windows.pslist.PsList,
windows.psscan.PsScan,
windows.pstree.PsTree,
windows.registry.certificates.Certificates,
windows.registry.hivelist.HiveList,
windows.registry.hivescan.HiveScan,
windows.registry.printkey.PrintKey,
windows.registry.userassist.UserAssist,
windows.sessions.Sessions,
windows.skeleton_key_check.Skeleton_Key_Check,
windows.ssdt.SSDT,
windows.statistics.Statistics,
windows.strings.Strings,
windows.svcscan.SvcScan,
windows.symlinkscan.SymlinkScan,
windows.vadinfo.VadInfo,
windows.vadyarascan.VadYaraScan,
windows.verinfo.VerInfo,
windows.virtmap.VirtMap,
yarascan.YaraScan

NOT : BAZEN VMEM DOSYASINI RAW FORMATINA ÇEVİRMENİZ GEREKEBİLİR ŞU KOMUTU KULLANABİLİRSİNİZ

volatility -f stuxnet.vmem -O stuxnet.raw --profile=WinXPSP3x86 raw2dmp

Profiller

Profiles
--------
VistaSP0x64           - A Profile for Windows Vista SP0 x64
VistaSP0x86           - A Profile for Windows Vista SP0 x86
VistaSP1x64           - A Profile for Windows Vista SP1 x64
VistaSP1x86           - A Profile for Windows Vista SP1 x86
VistaSP2x64           - A Profile for Windows Vista SP2 x64
VistaSP2x86           - A Profile for Windows Vista SP2 x86
Win10x64              - A Profile for Windows 10 x64
Win10x64_10586        - A Profile for Windows 10 x64 (10.0.10586.306 / 2016-04-23)
Win10x64_14393        - A Profile for Windows 10 x64 (10.0.14393.0 / 2016-07-16)
Win10x86              - A Profile for Windows 10 x86
Win10x86_10586        - A Profile for Windows 10 x86 (10.0.10586.420 / 2016-05-28)
Win10x86_14393        - A Profile for Windows 10 x86 (10.0.14393.0 / 2016-07-16)
Win2003SP0x86         - A Profile for Windows 2003 SP0 x86
Win2003SP1x64         - A Profile for Windows 2003 SP1 x64
Win2003SP1x86         - A Profile for Windows 2003 SP1 x86
Win2003SP2x64         - A Profile for Windows 2003 SP2 x64
Win2003SP2x86         - A Profile for Windows 2003 SP2 x86
Win2008R2SP0x64       - A Profile for Windows 2008 R2 SP0 x64
Win2008R2SP1x64       - A Profile for Windows 2008 R2 SP1 x64
Win2008R2SP1x64_23418 - A Profile for Windows 2008 R2 SP1 x64 (6.1.7601.23418 / 2016-04-09)
Win2008SP1x64         - A Profile for Windows 2008 SP1 x64
Win2008SP1x86         - A Profile for Windows 2008 SP1 x86
Win2008SP2x64         - A Profile for Windows 2008 SP2 x64
Win2008SP2x86         - A Profile for Windows 2008 SP2 x86
Win2012R2x64          - A Profile for Windows Server 2012 R2 x64
Win2012R2x64_18340    - A Profile for Windows Server 2012 R2 x64 (6.3.9600.18340 / 2016-05-13)
Win2012x64            - A Profile for Windows Server 2012 x64
Win2016x64_14393      - A Profile for Windows Server 2016 x64 (10.0.14393.0 / 2016-07-16)
Win7SP0x64            - A Profile for Windows 7 SP0 x64
Win7SP0x86            - A Profile for Windows 7 SP0 x86
Win7SP1x64            - A Profile for Windows 7 SP1 x64
Win7SP1x64_23418      - A Profile for Windows 7 SP1 x64 (6.1.7601.23418 / 2016-04-09)
Win7SP1x86            - A Profile for Windows 7 SP1 x86
Win7SP1x86_23418      - A Profile for Windows 7 SP1 x86 (6.1.7601.23418 / 2016-04-09)
Win81U1x64            - A Profile for Windows 8.1 Update 1 x64
Win81U1x86            - A Profile for Windows 8.1 Update 1 x86
Win8SP0x64            - A Profile for Windows 8 x64
Win8SP0x86            - A Profile for Windows 8 x86
Win8SP1x64            - A Profile for Windows 8.1 x64
Win8SP1x64_18340      - A Profile for Windows 8.1 x64 (6.3.9600.18340 / 2016-05-13)
Win8SP1x86            - A Profile for Windows 8.1 x86
WinXPSP1x64           - A Profile for Windows XP SP1 x64
WinXPSP2x64           - A Profile for Windows XP SP2 x64
WinXPSP2x86           - A Profile for Windows XP SP2 x86
WinXPSP3x86           - A Profile for Windows XP SP3 x86

Tüm bunları indirdikten sonra öncelikle CMD ile stuxnet ve volatility'nin bulunduğu dizine gidiyoruz ve şu komutla belleğimizden bilgiler topluyoruz

volatility -f stuxnet.vmem imageinfo

Loglarımızın içeriği şu şekilde olacaktır

          Suggested Profile(s) : WinXPSP2x86, WinXPSP3x86 (Instantiated with WinXPSP2x86)
                     AS Layer1 : IA32PagedMemoryPae (Kernel AS)
                     AS Layer2 : FileAddressSpace (C:\Users\Ali Can Gönüllü\Desktop\malware_scanner\ramimage\stuxnet.vmem)
                      PAE type : PAE
                           DTB : 0x319000L
                          KDBG : 0x80545ae0L
          Number of Processors : 1
     Image Type (Service Pack) : 3
                KPCR for CPU 0 : 0xffdff000L
             KUSER_SHARED_DATA : 0xffdf0000L
           Image date and time : 2011-06-03 04:31:36 UTC+0000
     Image local date and time : 2011-06-03 00:31:36 -0400

Buradan makinamız hakkında detaylı bilgiler ediniyoruz. Anlaşıldığı kadarıyla makinamız 2010 yılında Windows XP SP2-SP3 32-bit bir sistemle çalışmakta. Bu bilgiler bizim için önemli çünkü makinamızın tüm kaba bilgilerini içeriyor.

Şimdi ise bu bellek kaydının alındığı anda çalışan programların listesini edinmek istiyorum. Bunun için şu komutu kullanıyoruz :

volatility -f stuxnet.vmem psinfo

Bu kaydın çıktısı ise şöyle oluyor

Offset(V)  Name                    PID   PPID   Thds     Hnds   Sess  Wow64 Start                          Exit                          
---------- -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ ------------------------------
0x823c8830 System                    4      0     59      403 ------      0                                                              
0x820df020 smss.exe                376      4      3       19 ------      0 2010-10-29 17:08:53 UTC+0000                                 
0x821a2da0 csrss.exe               600    376     11      395      0      0 2010-10-29 17:08:54 UTC+0000                                 
0x81da5650 winlogon.exe            624    376     19      570      0      0 2010-10-29 17:08:54 UTC+0000                                 
0x82073020 services.exe            668    624     21      431      0      0 2010-10-29 17:08:54 UTC+0000                                 
0x81e70020 lsass.exe               680    624     19      342      0      0 2010-10-29 17:08:54 UTC+0000                                 
0x823315d8 vmacthlp.exe            844    668      1       25      0      0 2010-10-29 17:08:55 UTC+0000                                 
0x81db8da0 svchost.exe             856    668     17      193      0      0 2010-10-29 17:08:55 UTC+0000                                 
0x81e61da0 svchost.exe             940    668     13      312      0      0 2010-10-29 17:08:55 UTC+0000                                 
0x822843e8 svchost.exe            1032    668     61     1169      0      0 2010-10-29 17:08:55 UTC+0000                                 
0x81e18b28 svchost.exe            1080    668      5       80      0      0 2010-10-29 17:08:55 UTC+0000                                 
0x81ff7020 svchost.exe            1200    668     14      197      0      0 2010-10-29 17:08:55 UTC+0000                                 
0x81fee8b0 spoolsv.exe            1412    668     10      118      0      0 2010-10-29 17:08:56 UTC+0000                                 
0x81e0eda0 jqs.exe                1580    668      5      148      0      0 2010-10-29 17:09:05 UTC+0000                                 
0x81fe52d0 vmtoolsd.exe           1664    668      5      284      0      0 2010-10-29 17:09:05 UTC+0000                                 
0x821a0568 VMUpgradeHelper        1816    668      3       96      0      0 2010-10-29 17:09:08 UTC+0000                                 
0x8205ada0 alg.exe                 188    668      6      107      0      0 2010-10-29 17:09:09 UTC+0000                                 
0x820ec7e8 explorer.exe           1196   1728     16      582      0      0 2010-10-29 17:11:49 UTC+0000                                 
0x820ecc10 wscntfy.exe            2040   1032      1       28      0      0 2010-10-29 17:11:49 UTC+0000                                 
0x81e86978 TSVNCache.exe           324   1196      7       54      0      0 2010-10-29 17:11:49 UTC+0000                                 
0x81fc5da0 VMwareTray.exe         1912   1196      1       50      0      0 2010-10-29 17:11:50 UTC+0000                                 
0x81e6b660 VMwareUser.exe         1356   1196      9      251      0      0 2010-10-29 17:11:50 UTC+0000                                 
0x8210d478 jusched.exe            1712   1196      1       26      0      0 2010-10-29 17:11:50 UTC+0000                                 
0x82279998 imapi.exe               756    668      4      116      0      0 2010-10-29 17:11:54 UTC+0000                                 
0x822b9a10 wuauclt.exe             976   1032      3      133      0      0 2010-10-29 17:12:03 UTC+0000                                 
0x81c543a0 Procmon.exe             660   1196     13      189      0      0 2011-06-03 04:25:56 UTC+0000                                 
0x81fa5390 wmiprvse.exe           1872    856      5      134      0      0 2011-06-03 04:25:58 UTC+0000                                 
0x81c498c8 lsass.exe               868    668      2       23      0      0 2011-06-03 04:26:55 UTC+0000                                 
0x81c47c00 lsass.exe              1928    668      4       65      0      0 2011-06-03 04:26:55 UTC+0000                                 
0x81c0cda0 cmd.exe                 968   1664      0 --------      0      0 2011-06-03 04:31:35 UTC+0000   2011-06-03 04:31:36 UTC+0000  
0x81f14938 ipconfig.exe            304    968      0 --------      0      0 2011-06-03 04:31:35 UTC+0000   2011-06-03 04:31:36 UTC+0000  

Buradan da anladığımız üzere svchost.exe ve winlogon.exe ile beraber lsass.exe çalışmakta. Bu şüphe uyandırıcı çünkü lsass.exe Yerel Güvenlik Yetkili Alt Sistem Servisi anlamına gelmektedir ve bu servis CPU'yu neredeyse %100 kullanıyor. Ayrıca Windows XP sistemlerde en çok virüs bulaşan yollardan biridir. Ancak svchost.exe de şüphe uyandırıcı bir şekilde çok fazla kaynak kullanıyor.

Ancak bu tek başına bir virüs olduğu anlamına gelmez. Daha detaylı bir araştırma yapmamız lazım. Bunun için cmdscan, connscan, yarascan, svcscan ve mutantscan komutlarını kullanmak istiyorum. Öncelikle cmdscan ile başlamak istiyorum.

volatility -f stuxnet.vmem cmdscan

Çıktısı yok yani cmd üzerinden bir komut çalıştırılmamış.

Ardından connscan ile bağlantı kurduğu IP adreslerini inceliyoruz.

volatility -f stuxnet.vmem connscan

Çıktımız şu şekilde oluyor

Offset(P)  Local Address             Remote Address            Pid
---------- ------------------------- ------------------------- ---

Burada herhangi bir IP adresiyle bir veri transferi göremiyoruz. Kısaca virüsümüz online olarak bağlantılı değil diyebiliriz.

svcscan ile de arkada çalışan servislere bakıyoruz.

volatility -f stuxnet.vmem svcscan

Çıktımız şu şekilde oluyor

Karakter sınırından dolayı silindi
Tam loglar : https://alicangonullu.com/goruntu/440

Buradan sonra artık mutant scan komutuyla sistemi kontrol etmek istiyorum. Şu komutla kontrol edebilirsiniz

volatility -f stuxnet.vmem mutantscan

Çıktımız şöyle olacaktır

Offset(P)              #Ptr     #Hnd Signal Thread           CID Name
------------------ -------- -------- ------ ---------- --------- ----
0x0000000001de06e0        1        1      1 0x00000000           
0x0000000001de76c0        1        1      1 0x00000000           
0x0000000001df95a0        1        1      1 0x00000000           
0x0000000001e0fc38        1        1      1 0x00000000           
0x0000000001e3ef10        1        1      1 0x00000000           
0x0000000001e3f9e0        1        1      1 0x00000000           
0x0000000001e43388        1        1      1 0x00000000           
0x0000000001e4dbe0        2        1      1 0x00000000           _!SHMSFTHISTORY!_
0x0000000001e62ef0        1        1      1 0x00000000           
0x0000000001e685d8        1        1      1 0x00000000           
0x0000000001e6cdb8        1        1      1 0x00000000           
0x0000000001e6fe60        1        1      1 0x00000000           
0x0000000001e8ab88        3        2      1 0x00000000           c:!documents and settings!administrator!cookies!
0x0000000001e8d608        3        2      1 0x00000000           c:!documents and settings!administrator!local settings!history!history.ie5!
0x0000000001e8d788        1        1      1 0x00000000           
0x0000000001e9a030        2        1      1 0x00000000           PerfOS_Perf_Library_Lock_PID_62c
0x0000000001e9a178        1        1      1 0x00000000           
0x0000000001e9a540        2        1      1 0x00000000           WmiApRpl_Perf_Library_Lock_PID_62c
0x0000000001e9a6a8        2        1      1 0x00000000           Windows Workflow Foundation 4.0.0.0_Perf_Library_Lock_PID_62c
0x0000000001e9a6f8        2        1      1 0x00000000           TermService_Perf_Library_Lock_PID_62c
0x0000000001e9a860        2        1      1 0x00000000           Tcpip_Perf_Library_Lock_PID_62c
0x0000000001e9a9c8        2        1      1 0x00000000           TapiSrv_Perf_Library_Lock_PID_62c
0x0000000001e9ab30        2        1      1 0x00000000           Spooler_Perf_Library_Lock_PID_62c
0x0000000001e9ab80        2        1      1 0x00000000           SMSvcHost 4.0.0.0_Perf_Library_Lock_PID_62c
0x0000000001e9abd0        2        1      1 0x00000000           ServiceModelService 4.0.0.0_Perf_Library_Lock_PID_62c
0x0000000001e9ac20        2        1      1 0x00000000           ServiceModelOperation 4.0.0.0_Perf_Library_Lock_PID_62c
0x0000000001e9ac70        2        1      1 0x00000000           ServiceModelEndpoint 4.0.0.0_Perf_Library_Lock_PID_62c
0x0000000001e9acc0        2        1      1 0x00000000           RSVP_Perf_Library_Lock_PID_62c
0x0000000001e9ad10        2        1      1 0x00000000           RemoteAccess_Perf_Library_Lock_PID_62c
0x0000000001e9ad60        2        1      1 0x00000000           PSched_Perf_Library_Lock_PID_62c
0x0000000001e9aec8        2        1      1 0x00000000           PerfProc_Perf_Library_Lock_PID_62c
0x0000000001e9c088        3        2      1 0x00000000           WindowsUpdateTracingMutex
0x0000000001e9c740        1        1      1 0x00000000           
0x0000000001eb8f40        4        3      1 0x00000000           _!MSFTHISTORY!_
0x0000000001f9eda0        1        1      1 0x00000000           
0x0000000001fa1cf8        1        1      1 0x00000000           
0x0000000001fa3a38        1        1      1 0x00000000           
0x0000000001fa52b8        1        1      1 0x00000000           
0x0000000001fab2e0        1        1      1 0x00000000           
0x0000000001facde8        1        1      1 0x00000000           
0x0000000001face58        1        1      1 0x00000000           
0x0000000001fae158        1        1      1 0x00000000           
0x0000000001fb23c8       10        9      1 0x00000000           ShimCacheMutex
0x0000000001fb8298        2        1      1 0x00000000           .NET Data Provider for Oracle_Perf_Library_Lock_PID_680
0x0000000001fbbfe0        2        1      1 0x00000000           ContentFilter_Perf_Library_Lock_PID_680
0x0000000001fbc3b0        1        1      1 0x00000000           
0x0000000001fbc5f8        1        1      1 0x00000000           
0x0000000001fbc840        1        1      1 0x00000000           
0x0000000001fbd8a8        1        1      1 0x00000000           
0x0000000001fbdea8        3        2      1 0x00000000           TpVcW32ListMutex
0x0000000001fbfae0        1        1      1 0x00000000           
0x0000000001fc1988        2        1      1 0x00000000           c:!documents and settings!localservice!local settings!history!history.ie5!
0x0000000001fc1ea8        1        1      1 0x00000000           
0x0000000001fc50b8        2        1      1 0x00000000           userenv: user policy mutex
0x0000000001fc60f8        1        1      1 0x00000000           
0x0000000001fc6b48        1        1      1 0x00000000           
0x0000000001fc7758        1        1      1 0x00000000           
0x0000000001fd4d98        4        3      1 0x00000000           RasPbFile
0x0000000001fd6ce0        2        1      1 0x00000000           SingleSesMutex
0x0000000001fdb258        1        1      1 0x00000000           
0x0000000001fe50f8        1        1      1 0x00000000           
0x0000000001fe61b0        2        1      1 0x00000000           PerfNet_Perf_Library_Lock_PID_62c
0x0000000001fe6318        2        1      1 0x00000000           PerfDisk_Perf_Library_Lock_PID_62c
0x0000000001fe6480        2        1      1 0x00000000           MSDTC Bridge 4.0.0.0_Perf_Library_Lock_PID_62c
0x0000000001fe64d0        2        1      1 0x00000000           MSDTC_Perf_Library_Lock_PID_62c
0x0000000001fe6638        2        1      1 0x00000000           ISAPISearch_Perf_Library_Lock_PID_62c
0x0000000001fe6688        2        1      1 0x00000000           ContentIndex_Perf_Library_Lock_PID_62c
0x0000000001fe66d8        2        1      1 0x00000000           ContentFilter_Perf_Library_Lock_PID_62c
0x0000000001fe6728        2        1      1 0x00000000           aspnet_state_Perf_Library_Lock_PID_62c
0x0000000001fe6778        2        1      1 0x00000000           ASP.NET_4.0.30319_Perf_Library_Lock_PID_62c
0x0000000001fe67c8        2        1      1 0x00000000           ASP.NET_2.0.50727_Perf_Library_Lock_PID_62c
0x0000000001fe6c68        2        1      1 0x00000000           ASP.NET_Perf_Library_Lock_PID_62c
0x0000000001fe6dd0        2        1      1 0x00000000           .NETFramework_Perf_Library_Lock_PID_62c
0x0000000001fe6e20        2        1      1 0x00000000           .NET Memory Cache 4.0_Perf_Library_Lock_PID_62c
0x0000000001fe6e70        2        1      1 0x00000000           .NET Data Provider for SqlServer_Perf_Library_Lock_PID_62c
0x0000000001fe6ec0        2        1      1 0x00000000           .NET Data Provider for Oracle_Perf_Library_Lock_PID_62c
0x0000000001fe6f10        2        1      1 0x00000000           .NET CLR Networking 4.0.0.0_Perf_Library_Lock_PID_62c
0x0000000001fe6f60        2        1      1 0x00000000           .NET CLR Networking_Perf_Library_Lock_PID_62c
0x0000000001fe6fb0        2        1      1 0x00000000           .NET CLR Data_Perf_Library_Lock_PID_62c
0x00000000020081a0        1        1      1 0x00000000           
0x0000000002009c10        1        1      1 0x00000000           
0x0000000002019390        3        2      1 0x00000000           ZonesCounterMutex
0x000000000205c2d0        1        1      1 0x00000000           
0x000000000205e170        2        1      1 0x00000000           746bbf3569adEncrypt
0x000000000205e6c8        1        1      1 0x00000000           
0x000000000205eae0        2        1      0 0x81fd8020 1032:1948 Instance0:  ESENT Performance Data Schema Version 40
0x00000000020691d8        3        2      1 0x00000000           WininetStartupMutex
0x000000000206c8e8        2        1      1 0x00000000           VMwareGuestCopyPasteMutex
0x000000000206e148        1        1      1 0x00000000           
0x000000000206e280        1        1      1 0x00000000           
0x000000000206fc00        1        1      1 0x00000000           
0x00000000020711e8        1        1      1 0x00000000           
0x000000000207e7f0        2        1      1 0x00000000           c:!documents and settings!localservice!cookies!
0x0000000002082700        1        1      1 0x00000000           
0x0000000002082740        1        1      1 0x00000000           
0x0000000002088120        1        1      1 0x00000000           
0x0000000002089258        1        1      1 0x00000000           
0x000000000208ba80        1        1      1 0x00000000           
0x0000000002094500        1        1      1 0x00000000           
0x0000000002094588        2        1      1 0x00000000           Tcpip_Perf_Library_Lock_PID_680
0x0000000002098a58        1        1      1 0x00000000           
0x000000000209d540        1        1      1 0x00000000           
0x00000000020a03d8        1        1      1 0x00000000           
0x00000000020a0cd0        2        1      1 0x00000000           PerfDisk_Perf_Library_Lock_PID_680
0x00000000020a5c18        2        1      1 0x00000000           aspnet_state_Perf_Library_Lock_PID_680
0x00000000020a6628        1        1      1 0x00000000           
0x00000000020a7128        1        1      1 0x00000000           
0x00000000020a9340        1        1      1 0x00000000           
0x00000000020acdf0        2        1      1 0x00000000           TapiSrv_Perf_Library_Lock_PID_680
0x00000000020ae8d8        1        1      1 0x00000000           
0x00000000020b2e60        1        1      1 0x00000000           
0x00000000020b2ec8        1        1      1 0x00000000           
0x00000000020b35d8        2        1      1 0x00000000           WPA_LICSTORE_MUTEX
0x00000000020b3628        2        1      1 0x00000000           WPA_HWID_MUTEX
0x00000000020b45f8        1        1      1 0x00000000           
0x00000000020bcfe0        1        1      1 0x00000000           
0x00000000020d4200        3        2      1 0x00000000           c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
0x00000000020d9610        1        1      1 0x00000000           
0x00000000020d9d68        1        1      1 0x00000000           
0x00000000020da8d8        1        1      1 0x00000000           
0x00000000020dd738        1        1      1 0x00000000           
0x00000000020dee50        1        1      1 0x00000000           
0x00000000020e0d68        1        1      1 0x00000000           
0x00000000020e3980       14       13      1 0x00000000           SHIMLIB_LOG_MUTEX
0x00000000020e9ca0        2        1      1 0x00000000           {A3BD3259-3E4F-428a-84C8-F0463A9D3EB5}
0x00000000020eba00        1        1      1 0x00000000           
0x00000000020ebac8        1        1      1 0x00000000           
0x00000000020f0560        2        1      1 0x00000000           _SHuassist.mtx
0x00000000020f0960        2        1      1 0x00000000           SMSvcHost 4.0.0.0_Perf_Library_Lock_PID_680
0x00000000020f10e8        1        1      1 0x00000000           
0x00000000020f15a0        1        1      1 0x00000000           
0x00000000020f18f0        1        1      1 0x00000000           
0x00000000020f4020        1        1      1 0x00000000           
0x00000000020f7268        1        1      1 0x00000000           
0x0000000002108bb0        2        1      0 0x81fc0020   668:568 PrefetchFileCacheOwner
0x000000000210c130        1        1      1 0x00000000           
0x0000000002112558        1        1      1 0x00000000           
0x000000000211e810        1        1      1 0x00000000           
0x00000000021277f8        1        1      1 0x00000000           
0x000000000213fab0        1        1      1 0x00000000           
0x0000000002163b78        1        1      1 0x00000000           
0x0000000002164390        1        1      1 0x00000000           
0x00000000021703a8        1        1      1 0x00000000           
0x0000000002176020        1        1      1 0x00000000           
0x0000000002178ea8        2        1      1 0x00000000           Spooler_Perf_Library_Lock_PID_01F
0x000000000217e138        2        1      1 0x00000000           HGFSMUTEX00000000000003e7
0x00000000021869a0        1        1      1 0x00000000           
0x000000000218ba28        1        1      1 0x00000000           
0x000000000218ce08        1        1      1 0x00000000           
0x000000000218ce48        1        1      1 0x00000000           
0x0000000002190490        1        1      1 0x00000000           
0x000000000219cc00        1        1      1 0x00000000           
0x000000000219d2b0        1        1      1 0x00000000           
0x00000000021a2ba8        1        1      1 0x00000000           
0x00000000021bee20        1        1      1 0x00000000           
0x00000000021c3c80        2        1      1 0x00000000           .NET CLR Networking 4.0.0.0_Perf_Library_Lock_PID_680
0x00000000021c3cd8        4        3      1 0x00000000           {5EC171BB-F130-4a19-B782-B6E655E091B2}
0x00000000021c6dd0        1        1      1 0x00000000           
0x00000000021cb830        1        1      1 0x00000000           
0x00000000021cba08        1        1      1 0x00000000           
0x00000000021d2fe0        1        1      1 0x00000000           
0x00000000021d4940        3        2      1 0x00000000           MidiMapper_Configure
0x00000000021e6d70        3        2      1 0x00000000           SRDataStore
0x00000000021e9f70        2        1      1 0x00000000           __PDH_PLA_MUTEX__
0x00000000021f0498        2        1      1 0x00000000           0CADFD67AF62496dB34264F000F5624A
0x00000000021f1638        1        1      1 0x00000000           
0x0000000002258208        2        1      1 0x00000000           WPA_PR_MUTEX
0x0000000002258448        2        1      1 0x00000000           TSVNCacheMutex-0000000000029b4c
0x0000000002258f48        2        1      1 0x00000000           msgina: InteractiveLogonMutex
0x000000000225b990        2        1      1 0x00000000           msgina: InteractiveLogonRequestMutex
0x000000000225c020        1        1      1 0x00000000           
0x000000000225c2b0        1        1      1 0x00000000           
0x000000000225fa90        2        1      1 0x00000000           PnP_Init_Mutex
0x0000000002261408        2        1      1 0x00000000           ServiceModelEndpoint 4.0.0.0_Perf_Library_Lock_PID_680
0x0000000002266ef8        1        1      1 0x00000000           
0x0000000002268890        1        1      1 0x00000000           
0x0000000002269140        1        1      1 0x00000000           
0x0000000002269d68        2        1      1 0x00000000           TermService_Perf_Library_Lock_PID_680
0x000000000226dc38        1        1      1 0x00000000           
0x00000000022769d8        2        1      1 0x00000000           ThinPrint-L
0x0000000002283160        1        1      1 0x00000000           
0x0000000002283ba0        1        1      1 0x00000000           
0x0000000002286a18        3        2      1 0x00000000           ZonesCacheCounterMutex
0x000000000228cb48        3        2      1 0x00000000           HGFSMUTEX0000000000029b4c
0x000000000228e2b0        1        1      1 0x00000000           
0x000000000228ecf0        3        2      1 0x00000000           MidiMapper_modLongMessage_RefCnt
0x000000000228fc00        2        1      1 0x00000000           238FAD3109D3473aB4764B20B3731840
0x000000000228fc50        2        1      1 0x00000000           4FCC0DEFE22C4f138FB9D5AF25FD9398
0x0000000002292ad0        2        1      1 0x00000000           MSDTC Bridge 4.0.0.0_Perf_Library_Lock_PID_680
0x000000000229c138        1        1      1 0x00000000           
0x000000000229ee10        2        1      1 0x00000000           .NET CLR Networking_Perf_Library_Lock_PID_680
0x00000000022a02e0        2        1      1 0x00000000           PerfOS_Perf_Library_Lock_PID_680
0x00000000022a09d8        1        1      1 0x00000000           
0x00000000022a23d8        2        1      1 0x00000000           ServiceModelOperation 4.0.0.0_Perf_Library_Lock_PID_680
0x00000000022a2690        2        1      1 0x00000000           .NET Memory Cache 4.0_Perf_Library_Lock_PID_680
0x00000000022d5298        1        1      1 0x00000000           
0x00000000022d93f0        1        1      1 0x00000000           
0x00000000022e00e8        1        1      1 0x00000000           
0x00000000022e0bd8        1        1      1 0x00000000           
0x00000000022e44c8        1        1      1 0x00000000           
0x00000000022e4fa8        1        1      1 0x00000000           
0x00000000022ea458        1        1      1 0x00000000           
0x00000000022ec568        2        1      1 0x00000000           VMwareGuestDnDDataMutex
0x00000000022ed600        1        1      1 0x00000000           
0x00000000022ee148        1        1      1 0x00000000           
0x00000000022ef148        1        1      1 0x00000000           
0x00000000022f8ad0        1        1      1 0x00000000           
0x00000000022f9db0        3        2      1 0x00000000           WininetProxyRegistryMutex
0x00000000022fc2e0        1        1      1 0x00000000           
0x00000000022fc8a0        1        1      1 0x00000000           
0x0000000002305be0        1        1      1 0x00000000           
0x0000000002309dd0        1        1      1 0x00000000           
0x0000000002309e38        1        1      1 0x00000000           
0x0000000002309ea0        1        1      1 0x00000000           
0x0000000002309ee8        1        1      1 0x00000000           
0x000000000230ea80        1        1      1 0x00000000           
0x000000000230eb08        2        1      1 0x00000000           PerfNet_Perf_Library_Lock_PID_680
0x000000000230f140        1        1      1 0x00000000           
0x0000000002312e70        2        1      1 0x00000000           WininetConnectionMutex
0x0000000002314a40        1        1      1 0x00000000           
0x0000000002314b70        2        1      1 0x00000000           ISAPISearch_Perf_Library_Lock_PID_680
0x00000000023157f0        2        1      1 0x00000000           RemoteAccess_Perf_Library_Lock_PID_680
0x000000000231d4f0        1        1      1 0x00000000           
0x000000000232b500        1        1      1 0x00000000           
0x00000000023318d0        1        1      1 0x00000000           
0x0000000002337020        1        1      1 0x00000000           
0x000000000235e1c8        2        1      1 0x00000000           userenv: Machine Registry policy mutex
0x000000000235ed08        1        1      1 0x00000000           
0x00000000023612c0        2        1      1 0x00000000           ASP.NET_Perf_Library_Lock_PID_680
0x00000000023643f8        1        1      1 0x00000000           
0x00000000023658b0        2        1      1 0x00000000           ContentIndex_Perf_Library_Lock_PID_680
0x0000000002367ca8        2        1      1 0x00000000           RSVP_Perf_Library_Lock_PID_680
0x00000000023a26d0        1        1      1 0x00000000           
0x00000000023a2ac0        3        2      1 0x00000000           ZonesLockedCacheCounterMutex
0x00000000023adc30        2        1      1 0x00000000           VMToolsHookQueueLock
0x00000000023ae9a0        1        1      1 0x00000000           
0x00000000023b0cf8        1        1      1 0x00000000           
0x00000000023b2600        1        1      1 0x00000000           
0x00000000023b75f8        2        1      0 0x81c6d180   668:476 {E41362C3-F75C-4ec2-AF49-3CB6BCA591CA}
0x00000000023b7820        1        1      1 0x00000000           
0x000000000240f300        2        1      1 0x00000000           WPA_LT_MUTEX
0x000000000240f350        2        1      1 0x00000000           WPA_RT_MUTEX
0x000000000240f608        1        1      1 0x00000000           
0x0000000002415828        1        1      1 0x00000000           
0x0000000002416f70        1        1      1 0x00000000           
0x0000000002416fe0        1        1      1 0x00000000           
0x00000000024193c0        1        1      1 0x00000000           
0x000000000241ad28        1        1      1 0x00000000           
0x000000000241ec70        1        1      1 0x00000000           
0x000000000241ef40        2        1      1 0x00000000           .NET CLR Data_Perf_Library_Lock_PID_680
0x000000000242d248        2        1      0 0x8210d200 1712:1716 SunJavaUpdateSchedulerMutex
0x000000000242e6f8        1        1      1 0x00000000           
0x0000000002430d38        1        1      1 0x00000000           
0x00000000024333e8        1        1      1 0x00000000           
0x0000000002433c38        1        1      1 0x00000000           
0x0000000002434148        1        1      1 0x00000000           
0x0000000002434960        2        1      1 0x00000000           ExplorerIsShellMutex
0x00000000024361a8        1        1      1 0x00000000           
0x0000000002436a68        1        1      1 0x00000000           
0x000000000244dfe0        2        1      1 0x00000000           .NET Data Provider for SqlServer_Perf_Library_Lock_PID_680
0x0000000002454e88        2        1      1 0x00000000           PerfProc_Perf_Library_Lock_PID_680
0x000000000245e600        2        1      1 0x00000000           ASP.NET_2.0.50727_Perf_Library_Lock_PID_680
0x000000000245e9b0        2        1      1 0x00000000           winlogon: Logon UserProfileMapping Mutex
0x000000000246a768        1        1      1 0x00000000           
0x000000000246e460        1        1      1 0x00000000           
0x0000000002473820        1        1      1 0x00000000           
0x0000000002473a90        1        1      1 0x00000000           
0x0000000002479d38        1        1      1 0x00000000           
0x000000000247dda8        1        1      1 0x00000000           
0x0000000002487618        3        2      1 0x00000000           85991EC7-5621-4A6F-9453-DC19BAE9C542
0x00000000024898d8        1        1      1 0x00000000           
0x000000000248ada8        1        1      1 0x00000000           
0x000000000248b2d8        1        1      1 0x00000000           
0x000000000248b348        1        1      1 0x00000000           
0x0000000002493e10        1        1      1 0x00000000           
0x0000000002497020        1        1      1 0x00000000           
0x0000000002499c90        1        1      1 0x00000000           
0x000000000249c968        2        1      1 0x00000000           ASP.NET_4.0.30319_Perf_Library_Lock_PID_680
0x00000000024a60b8        2        1      1 0x00000000           userenv: User Registry policy mutex
0x00000000024c0470        1        1      1 0x00000000           
0x00000000024c09c8        1        1      1 0x00000000           
0x00000000024c21d8        2        1      1 0x00000000           c:!documents and settings!localservice!local settings!temporary internet files!content.ie5!
0x00000000024c2a60        2        1      0 0x821b63d0 2040:2044 wscntfy_mtx
0x00000000024c5810        2        1      1 0x00000000           userenv: machine policy mutex
0x00000000024c6b08        1        1      1 0x00000000           
0x00000000024ca3c0        1        1      1 0x00000000           
0x00000000024cb4d0        2        1      1 0x00000000           DBWinMutex
0x00000000024ea558        2        1      1 0x00000000           .NETFramework_Perf_Library_Lock_PID_680
0x00000000024ea880        2        1      1 0x00000000           PSched_Perf_Library_Lock_PID_680
0x00000000024eabf8        2        1      1 0x00000000           ServiceModelService 4.0.0.0_Perf_Library_Lock_PID_680
0x00000000024eb828        2        1      1 0x00000000           WmiApRpl_Perf_Library_Lock_PID_680
0x000000000250ac70        1        1      1 0x00000000           
0x000000000250ef50        2        1      1 0x00000000           Windows Workflow Foundation 4.0.0.0_Perf_Library_Lock_PID_680
0x000000000250f0f8        1        1      1 0x00000000           
0x0000000002527c50        1        1      1 0x00000000           
0x000000000252b718        1        1      1 0x00000000           
0x000000000252b7a0        2        1      1 0x00000000           MSDTC_Perf_Library_Lock_PID_680
0x000000000252c328        1        1      1 0x00000000           
0x00000000025310a0        1        1      1 0x00000000           
0x0000000002583220        2        1      1 0x00000000           Spooler_Perf_Library_Lock_PID_680

Burada pek bir sıkıntı yok gibi görünüyor ancak YARA KURALLARI İLE TARAMADAN ASLA BİLEMEYİZ.

Ben zaafiyetin ne olduğunu bildiğim için hazır bir yara dosyası kullanacağım. Sizler farklı kurallar bulmak isterseniz buradan ulaşabilirsiniz.

Bu kuralı stuxnet.yar şeklinde kaydediyorum ve şu komutla taramaya başlıyorum

volatility -f stuxnet.vmem yarascan -y stuxnet.yar

Bu komuttan sonra biraz bekliyoruz. Testten sonra eğer virüs bulunursa çıktı şu şekilde oluyor

Rule: StuxNet_Malware_1
Owner: Process services.exe Pid 668
0x01439071  8b 45 08 35 dd 79 19 ae 33 c9 8b 55 08 89 02 89   .E.5.y..3..U....
0x01439081  4a 04 8b 45 08 c7 40 0c 58 bd 43 01 33 c0 5e c9   J..E..@.X.C.3.^.
0x01439091  c3 55 8b ec 83 ec 2c 83 65 e8 00 83 65 f4 00 83   .U....,.e...e...
0x014390a1  65 e4 00 8b 45 20 8b 4d 14 8d 84 01 98 00 00 00   e...E..M........
0x014390b1  89 45 f0 8d 45 f4 50 8d 45 e8 50 8d 45 d8 50 ff   .E..E.P.E.P.E.P.
0x014390c1  75 f0 ff 75 08 e8 14 fe ff ff 83 c4 14 89 45 fc   u..u..........E.
0x014390d1  83 7d fc 00 74 08 8b 45 fc e9 fd 00 00 00 8b 45   .}..t..E.......E
0x014390e1  e8 89 45 f8 8b 45 e8 05 98 00 00 00 89 45 e8 c7   ..E..E.......E..
0x014390f1  45 e4 98 00 00 00 ff 75 20 ff 75 1c 8b 45 f8 05   E......u..u..E..
0x01439101  84 00 00 00 50 8d 45 e4 50 ff 75 f4 8d 45 e8 50   ....P.E.P.u..E.P
0x01439111  e8 79 fe ff ff 83 c4 18 8b 45 e8 89 45 dc ff 75   .y.......E..E..u
0x01439121  14 ff 75 10 8b 45 f8 05 8c 00 00 00 50 8d 45 e4   ..u..E......P.E.
0x01439131  50 ff 75 f4 8d 45 e8 50 e8 51 fe ff ff 83 c4 18   P.u..E.P.Q......
0x01439141  8b 45 dc 89 45 ec 81 7d 14 00 10 00 00 72 47 8b   .E..E..}.....rG.
0x01439151  45 ec 0f b7 00 3d 4d 5a 00 00 75 3a 8b 45 ec 8b   E....=MZ..u:.E..
0x01439161  40 3c 05 f8 00 00 00 3b 45 14 73 2a 8b 45 ec 8b   @<.....;E.s*.E..
Rule: StuxNet_Malware_1
Owner: Process services.exe Pid 668
0x01457b63  8b 45 08 35 dd 79 19 ae 33 c9 8b 55 08 89 02 89   .E.5.y..3..U....
0x01457b73  4a 04 8b 45 08 c7 40 0c 77 25 40 00 33 c0 5e c9   J..E..@.w%@.3.^.
0x01457b83  c3 55 8b ec 83 ec 2c 83 65 e8 00 83 65 f4 00 83   .U....,.e...e...
0x01457b93  65 e4 00 8b 45 20 8b 4d 14 8d 84 01 98 00 00 00   e...E..M........
0x01457ba3  89 45 f0 8d 45 f4 50 8d 45 e8 50 8d 45 d8 50 ff   .E..E.P.E.P.E.P.
0x01457bb3  75 f0 ff 75 08 e8 14 fe ff ff 83 c4 14 89 45 fc   u..u..........E.
0x01457bc3  83 7d fc 00 74 08 8b 45 fc e9 fd 00 00 00 8b 45   .}..t..E.......E
0x01457bd3  e8 89 45 f8 8b 45 e8 05 98 00 00 00 89 45 e8 c7   ..E..E.......E..
0x01457be3  45 e4 98 00 00 00 ff 75 20 ff 75 1c 8b 45 f8 05   E......u..u..E..
0x01457bf3  84 00 00 00 50 8d 45 e4 50 ff 75 f4 8d 45 e8 50   ....P.E.P.u..E.P
0x01457c03  e8 79 fe ff ff 83 c4 18 8b 45 e8 89 45 dc ff 75   .y.......E..E..u
0x01457c13  14 ff 75 10 8b 45 f8 05 8c 00 00 00 50 8d 45 e4   ..u..E......P.E.
0x01457c23  50 ff 75 f4 8d 45 e8 50 e8 51 fe ff ff 83 c4 18   P.u..E.P.Q......
0x01457c33  8b 45 dc 89 45 ec 81 7d 14 00 10 00 00 72 47 8b   .E..E..}.....rG.
0x01457c43  45 ec 0f b7 00 3d 4d 5a 00 00 75 3a 8b 45 ec 8b   E....=MZ..u:.E..
0x01457c53  40 3c 05 f8 00 00 00 3b 45 14 73 2a 8b 45 ec 8b   @<.....;E.s*.E..
Rule: Stuxnet_maindll_decrypted_unpacked
Owner: Process services.exe Pid 668
0x0144d998  25 00 53 00 79 00 73 00 74 00 65 00 6d 00 52 00   %.S.y.s.t.e.m.R.
0x0144d9a8  6f 00 6f 00 74 00 25 00 5c 00 69 00 6e 00 66 00   o.o.t.%.\.i.n.f.
0x0144d9b8  5c 00 6f 00 65 00 6d 00 36 00 43 00 2e 00 50 00   \.o.e.m.6.C...P.
0x0144d9c8  4e 00 46 00 00 00 00 00 4d 00 52 00 78 00 4e 00   N.F.....M.R.x.N.
0x0144d9d8  65 00 74 00 00 00 00 00 4d 00 52 00 58 00 43 00   e.t.....M.R.X.C.
0x0144d9e8  4c 00 53 00 00 00 00 00 44 00 65 00 73 00 63 00   L.S.....D.e.s.c.
0x0144d9f8  72 00 69 00 70 00 74 00 69 00 6f 00 6e 00 00 00   r.i.p.t.i.o.n...
0x0144da08  44 00 69 00 73 00 70 00 6c 00 61 00 79 00 4e 00   D.i.s.p.l.a.y.N.
0x0144da18  61 00 6d 00 65 00 00 00 45 00 72 00 72 00 6f 00   a.m.e...E.r.r.o.
0x0144da28  72 00 43 00 6f 00 6e 00 74 00 72 00 6f 00 6c 00   r.C.o.n.t.r.o.l.
0x0144da38  00 00 00 00 4e 00 65 00 74 00 77 00 6f 00 72 00   ....N.e.t.w.o.r.
0x0144da48  6b 00 00 00 47 00 72 00 6f 00 75 00 70 00 00 00   k...G.r.o.u.p...
0x0144da58  53 00 74 00 61 00 72 00 74 00 00 00 54 00 79 00   S.t.a.r.t...T.y.
0x0144da68  70 00 65 00 00 00 00 00 44 00 61 00 74 00 61 00   p.e.....D.a.t.a.
0x0144da78  00 00 00 00 4d 00 52 00 58 00 4e 00 45 00 54 00   ....M.R.X.N.E.T.
0x0144da88  00 00 00 00 53 00 65 00 4c 00 6f 00 61 00 64 00   ....S.e.L.o.a.d.
Rule: Stuxnet_maindll_decrypted_unpacked
Owner: Process services.exe Pid 668
0x0145345a  40 00 61 00 62 00 66 00 20 00 76 00 61 00 72 00   @.a.b.f...v.a.r.
0x0145346a  62 00 69 00 6e 00 61 00 72 00 79 00 28 00 34 00   b.i.n.a.r.y.(.4.
0x0145347a  30 00 39 00 36 00 29 00 20 00 45 00 58 00 45 00   0.9.6.)...E.X.E.
0x0145348a  43 00 20 00 40 00 68 00 72 00 20 00 3d 00 20 00   C...@.h.r...=...
0x0145349a  73 00 70 00 5f 00 4f 00 41 00 43 00 72 00 65 00   s.p._.O.A.C.r.e.
0x014534aa  61 00 74 00 65 00 20 00 27 00 41 00 44 00 4f 00   a.t.e...'.A.D.O.
0x014534ba  44 00 42 00 2e 00 53 00 74 00 72 00 65 00 61 00   D.B...S.t.r.e.a.
0x014534ca  6d 00 27 00 2c 00 20 00 40 00 61 00 6f 00 64 00   m.'.,...@.a.o.d.
0x014534da  73 00 20 00 4f 00 55 00 54 00 20 00 49 00 46 00   s...O.U.T...I.F.
0x014534ea  20 00 40 00 68 00 72 00 20 00 3c 00 3e 00 20 00   ..@.h.r...<.>...
0x014534fa  30 00 20 00 47 00 4f 00 54 00 4f 00 20 00 65 00   0...G.O.T.O...e.
0x0145350a  6e 00 64 00 71 00 20 00 45 00 58 00 45 00 43 00   n.d.q...E.X.E.C.
0x0145351a  20 00 40 00 68 00 72 00 20 00 3d 00 20 00 73 00   ..@.h.r...=...s.
0x0145352a  70 00 5f 00 4f 00 41 00 53 00 65 00 74 00 50 00   p._.O.A.S.e.t.P.
0x0145353a  72 00 6f 00 70 00 65 00 72 00 74 00 79 00 20 00   r.o.p.e.r.t.y...
0x0145354a  40 00 61 00 6f 00 64 00 73 00 2c 00 20 00 27 00   @.a.o.d.s.,...'.
Rule: Stuxnet_maindll_decrypted_unpacked
Owner: Process services.exe Pid 668
0x01451aa0  53 00 54 00 4f 00 52 00 41 00 47 00 45 00 23 00   S.T.O.R.A.G.E.#.
0x01451ab0  56 00 6f 00 6c 00 75 00 6d 00 65 00 23 00 31 00   V.o.l.u.m.e.#.1.
0x01451ac0  26 00 31 00 39 00 66 00 37 00 65 00 35 00 39 00   &.1.9.f.7.e.5.9.
0x01451ad0  63 00 26 00 30 00 26 00 00 00 00 00 00 00 00 00   c.&.0.&.........
0x01451ae0  7b 00 35 00 33 00 66 00 35 00 36 00 33 00 30 00   {.5.3.f.5.6.3.0.
0x01451af0  37 00 2d 00 62 00 36 00 62 00 66 00 2d 00 31 00   7.-.b.6.b.f.-.1.
0x01451b00  31 00 64 00 30 00 2d 00 39 00 34 00 66 00 32 00   1.d.0.-.9.4.f.2.
0x01451b10  2d 00 30 00 30 00 61 00 30 00 63 00 39 00 31 00   -.0.0.a.0.c.9.1.
0x01451b20  65 00 66 00 62 00 38 00 62 00 7d 00 00 00 00 00   e.f.b.8.b.}.....
0x01451b30  7b 00 35 00 33 00 66 00 35 00 36 00 33 00 30 00   {.5.3.f.5.6.3.0.
0x01451b40  64 00 2d 00 62 00 36 00 62 00 66 00 2d 00 31 00   d.-.b.6.b.f.-.1.
0x01451b50  31 00 64 00 30 00 2d 00 39 00 34 00 66 00 32 00   1.d.0.-.9.4.f.2.
0x01451b60  2d 00 30 00 30 00 61 00 30 00 63 00 39 00 31 00   -.0.0.a.0.c.9.1.
0x01451b70  65 00 66 00 62 00 38 00 62 00 7d 00 00 00 00 00   e.f.b.8.b.}.....
0x01451b80  5c 00 44 00 6f 00 73 00 44 00 65 00 76 00 69 00   \.D.o.s.D.e.v.i.
0x01451b90  63 00 65 00 73 00 5c 00 00 00 00 00 5c 00 5c 00   c.e.s.\.....\.\.
Rule: Stuxnet_maindll_decrypted_unpacked
Owner: Process services.exe Pid 668
0x0144f9c1  76 69 65 77 20 4d 43 50 56 52 45 41 44 56 41 52   view.MCPVREADVAR
0x0144f9d1  50 45 52 43 4f 4e 20 61 73 20 73 65 6c 65 63 74   PERCON.as.select
0x0144f9e1  20 56 41 52 49 41 42 4c 45 49 44 2c 56 41 52 49   .VARIABLEID,VARI
0x0144f9f1  41 42 4c 45 54 59 50 45 49 44 2c 46 4f 52 4d 41   ABLETYPEID,FORMA
0x0144fa01  54 46 49 54 54 49 4e 47 2c 53 43 41 4c 45 49 44   TFITTING,SCALEID
0x0144fa11  2c 56 41 52 49 41 42 4c 45 4e 41 4d 45 2c 41 44   ,VARIABLENAME,AD
0x0144fa21  44 52 45 53 53 50 41 52 41 4d 45 54 45 52 2c 50   DRESSPARAMETER,P
0x0144fa31  52 4f 54 4f 4b 4f 4c 4c 2c 4d 41 58 4c 49 4d 49   ROTOKOLL,MAXLIMI
0x0144fa41  54 2c 4d 49 4e 4c 49 4d 49 54 2c 53 54 41 52 54   T,MINLIMIT,START
0x0144fa51  56 41 4c 55 45 2c 53 55 42 53 54 56 41 4c 55 45   VALUE,SUBSTVALUE
0x0144fa61  2c 56 41 52 46 4c 41 47 53 2c 43 4f 4e 4e 45 43   ,VARFLAGS,CONNEC
0x0144fa71  54 49 4f 4e 49 44 2c 56 41 52 50 52 4f 50 45 52   TIONID,VARPROPER
0x0144fa81  54 59 2c 43 59 43 4c 45 54 49 4d 45 49 44 2c 4c   TY,CYCLETIMEID,L
0x0144fa91  41 53 54 43 48 41 4e 47 45 2c 41 53 44 41 54 41   ASTCHANGE,ASDATA
0x0144faa1  53 49 5a 45 2c 4f 53 44 41 54 41 53 49 5a 45 2c   SIZE,OSDATASIZE,
0x0144fab1  56 41 52 47 52 4f 55 50 49 44 2c 56 41 52 58 52   VARGROUPID,VARXR
Rule: Stuxnet_maindll_decrypted_unpacked
Owner: Process services.exe Pid 668
0x01450431  76 69 65 77 20 4d 43 50 56 52 45 41 44 56 41 52   view.MCPVREADVAR
0x01450441  50 45 52 43 4f 4e 20 61 73 20 73 65 6c 65 63 74   PERCON.as.select
0x01450451  20 56 41 52 49 41 42 4c 45 49 44 2c 56 41 52 49   .VARIABLEID,VARI
0x01450461  41 42 4c 45 54 59 50 45 49 44 2c 46 4f 52 4d 41   ABLETYPEID,FORMA
0x01450471  54 46 49 54 54 49 4e 47 2c 53 43 41 4c 45 49 44   TFITTING,SCALEID
0x01450481  2c 56 41 52 49 41 42 4c 45 4e 41 4d 45 2c 41 44   ,VARIABLENAME,AD
0x01450491  44 52 45 53 53 50 41 52 41 4d 45 54 45 52 2c 50   DRESSPARAMETER,P
0x014504a1  52 4f 54 4f 4b 4f 4c 4c 2c 4d 41 58 4c 49 4d 49   ROTOKOLL,MAXLIMI
0x014504b1  54 2c 4d 49 4e 4c 49 4d 49 54 2c 53 54 41 52 54   T,MINLIMIT,START
0x014504c1  56 41 4c 55 45 2c 53 55 42 53 54 56 41 4c 55 45   VALUE,SUBSTVALUE
0x014504d1  2c 56 41 52 46 4c 41 47 53 2c 43 4f 4e 4e 45 43   ,VARFLAGS,CONNEC
0x014504e1  54 49 4f 4e 49 44 2c 56 41 52 50 52 4f 50 45 52   TIONID,VARPROPER
0x014504f1  54 59 2c 43 59 43 4c 45 54 49 4d 45 49 44 2c 4c   TY,CYCLETIMEID,L
0x01450501  41 53 54 43 48 41 4e 47 45 2c 41 53 44 41 54 41   ASTCHANGE,ASDATA
0x01450511  53 49 5a 45 2c 4f 53 44 41 54 41 53 49 5a 45 2c   SIZE,OSDATASIZE,
0x01450521  56 41 52 47 52 4f 55 50 49 44 2c 56 41 52 58 52   VARGROUPID,VARXR
Rule: Stuxnet_maindll_decrypted_unpacked
Owner: Process services.exe Pid 668
0x01450f71  76 69 65 77 20 4d 43 50 56 52 45 41 44 56 41 52   view.MCPVREADVAR
0x01450f81  50 45 52 43 4f 4e 20 61 73 20 73 65 6c 65 63 74   PERCON.as.select
0x01450f91  20 56 41 52 49 41 42 4c 45 49 44 2c 56 41 52 49   .VARIABLEID,VARI
0x01450fa1  41 42 4c 45 54 59 50 45 49 44 2c 46 4f 52 4d 41   ABLETYPEID,FORMA
0x01450fb1  54 46 49 54 54 49 4e 47 2c 53 43 41 4c 45 49 44   TFITTING,SCALEID
0x01450fc1  2c 56 41 52 49 41 42 4c 45 4e 41 4d 45 2c 41 44   ,VARIABLENAME,AD
0x01450fd1  44 52 45 53 53 50 41 52 41 4d 45 54 45 52 2c 50   DRESSPARAMETER,P
0x01450fe1  52 4f 54 4f 4b 4f 4c 4c 2c 4d 41 58 4c 49 4d 49   ROTOKOLL,MAXLIMI
0x01450ff1  54 2c 4d 49 4e 4c 49 4d 49 54 2c 53 54 41 52 54   T,MINLIMIT,START
0x01451001  56 41 4c 55 45 2c 53 55 42 53 54 56 41 4c 55 45   VALUE,SUBSTVALUE
0x01451011  2c 56 41 52 46 4c 41 47 53 2c 43 4f 4e 4e 45 43   ,VARFLAGS,CONNEC
0x01451021  54 49 4f 4e 49 44 2c 56 41 52 50 52 4f 50 45 52   TIONID,VARPROPER
0x01451031  54 59 2c 43 59 43 4c 45 54 49 4d 45 49 44 2c 4c   TY,CYCLETIMEID,L
0x01451041  41 53 54 43 48 41 4e 47 45 2c 41 53 44 41 54 41   ASTCHANGE,ASDATA
0x01451051  53 49 5a 45 2c 4f 53 44 41 54 41 53 49 5a 45 2c   SIZE,OSDATASIZE,
0x01451061  56 41 52 47 52 4f 55 50 49 44 2c 56 41 52 58 52   VARGROUPID,VARXR
Rule: StuxNet_Malware_1
Owner: Process svchost.exe Pid 940
0x00d49071  8b 45 08 35 dd 79 19 ae 33 c9 8b 55 08 89 02 89   .E.5.y..3..U....
0x00d49081  4a 04 8b 45 08 c7 40 0c 58 bd d4 00 33 c0 5e c9   J..E..@.X...3.^.
0x00d49091  c3 55 8b ec 83 ec 2c 83 65 e8 00 83 65 f4 00 83   .U....,.e...e...
0x00d490a1  65 e4 00 8b 45 20 8b 4d 14 8d 84 01 98 00 00 00   e...E..M........
0x00d490b1  89 45 f0 8d 45 f4 50 8d 45 e8 50 8d 45 d8 50 ff   .E..E.P.E.P.E.P.
0x00d490c1  75 f0 ff 75 08 e8 14 fe ff ff 83 c4 14 89 45 fc   u..u..........E.
0x00d490d1  83 7d fc 00 74 08 8b 45 fc e9 fd 00 00 00 8b 45   .}..t..E.......E
0x00d490e1  e8 89 45 f8 8b 45 e8 05 98 00 00 00 89 45 e8 c7   ..E..E.......E..
0x00d490f1  45 e4 98 00 00 00 ff 75 20 ff 75 1c 8b 45 f8 05   E......u..u..E..
0x00d49101  84 00 00 00 50 8d 45 e4 50 ff 75 f4 8d 45 e8 50   ....P.E.P.u..E.P
0x00d49111  e8 79 fe ff ff 83 c4 18 8b 45 e8 89 45 dc ff 75   .y.......E..E..u
0x00d49121  14 ff 75 10 8b 45 f8 05 8c 00 00 00 50 8d 45 e4   ..u..E......P.E.
0x00d49131  50 ff 75 f4 8d 45 e8 50 e8 51 fe ff ff 83 c4 18   P.u..E.P.Q......
0x00d49141  8b 45 dc 89 45 ec 81 7d 14 00 10 00 00 72 47 8b   .E..E..}.....rG.
0x00d49151  45 ec 0f b7 00 3d 4d 5a 00 00 75 3a 8b 45 ec 8b   E....=MZ..u:.E..
0x00d49161  40 3c 05 f8 00 00 00 3b 45 14 73 2a 8b 45 ec 8b   @<.....;E.s*.E..
Rule: StuxNet_Malware_1
Owner: Process svchost.exe Pid 940
0x00e14bd5  8b 45 08 35 dd 79 19 ae 33 c9 8b 55 08 89 02 89   .E.5.y..3..U....
0x00e14be5  4a 04 8b 45 08 c7 40 0c 58 3f 00 10 33 c0 5e c9   J..E..@.X?..3.^.
0x00e14bf5  c3 55 8b ec 83 ec 2c 83 65 e8 00 83 65 f4 00 83   .U....,.e...e...
0x00e14c05  65 e4 00 8b 45 20 8b 4d 14 8d 84 01 98 00 00 00   e...E..M........
0x00e14c15  89 45 f0 8d 45 f4 50 8d 45 e8 50 8d 45 d8 50 ff   .E..E.P.E.P.E.P.
0x00e14c25  75 f0 ff 75 08 e8 14 fe ff ff 83 c4 14 89 45 fc   u..u..........E.
0x00e14c35  83 7d fc 00 74 08 8b 45 fc e9 fd 00 00 00 8b 45   .}..t..E.......E
0x00e14c45  e8 89 45 f8 8b 45 e8 05 98 00 00 00 89 45 e8 c7   ..E..E.......E..
0x00e14c55  45 e4 98 00 00 00 ff 75 20 ff 75 1c 8b 45 f8 05   E......u..u..E..
0x00e14c65  84 00 00 00 50 8d 45 e4 50 ff 75 f4 8d 45 e8 50   ....P.E.P.u..E.P
0x00e14c75  e8 79 fe ff ff 83 c4 18 8b 45 e8 89 45 dc ff 75   .y.......E..E..u
0x00e14c85  14 ff 75 10 8b 45 f8 05 8c 00 00 00 50 8d 45 e4   ..u..E......P.E.
0x00e14c95  50 ff 75 f4 8d 45 e8 50 e8 51 fe ff ff 83 c4 18   P.u..E.P.Q......
0x00e14ca5  8b 45 dc 89 45 ec 81 7d 14 00 10 00 00 72 47 8b   .E..E..}.....rG.
0x00e14cb5  45 ec 0f b7 00 3d 4d 5a 00 00 75 3a 8b 45 ec 8b   E....=MZ..u:.E..
0x00e14cc5  40 3c 05 f8 00 00 00 3b 45 14 73 2a 8b 45 ec 8b   @<.....;E.s*.E..

Kıssadan hisse...

Bu makinada belirli araştırma yöntemlerini kullanarak stuxnet virüsünün svchost.exe ve services.exe üzerine bulaştığını görmekteyiz. Burada derhal makinayı kapatıp dışarıya kapalı bir ağda gereken aksiyonları almalıyız.

Değerli vaktinizi ayırdığınız için teşekkür ederim. Daha fazla bu tarz makale için takip etmeyi unutmayın.

Destekleri icin Numan Kuzu'ya teşekkürler