09.02.2014 Views

Windows sysinternals

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 18 Malware 431<br />

The culprit was easy to identify: it had no description or publisher, had the nondescriptive<br />

name “eMpId08200”, launched from the HKCU RunOnce key, was installed under the<br />

C:\ProgramData folder, and to top it all off it had the same icon that the fake anti- malware<br />

displayed. Aaron deleted the ASEP in Autoruns and deleted its files in Cmd.exe. (See<br />

Figure 18-6.) For good measure, he left the unnecessary file-sharing programs and Internet<br />

Explorer extensions disabled. He restarted the computer, which ran without issue.<br />

It is interesting to note that the malware in this case never appears to have used<br />

administrative rights. It installed itself to a user-writable folder and ensured that it would run<br />

again by hooking one of the user’s ASEPs instead of a global ASEP. In fact, the same malware<br />

infected Aaron’s mother-in-law’s <strong>Windows</strong> XP computer a few weeks later. Because Aaron<br />

had made sure that she always logged on with a standard user account, Aaron was able to<br />

clean the infection easily by logging on to the administrative account, which the malware<br />

had not been able to infect. From there, he ran Autoruns, selected the infected account from<br />

the User menu, and deleted the offending ASEP entry. (Unfortunately, he failed to capture<br />

any screen shots.) The two lessons here are that malware is increasingly able to cause harm<br />

without requiring administrative rights, and that such malware is much easier to clean than<br />

malware that is able to subvert the integrity of the operating system.<br />

FIGURE 18-6 Deleting the malware from Cmd.exe in Safe Mode.<br />

The Case of the Fake System Component<br />

The next two cases were brought to me by Greg Cottingham, a Senior Support Escalation<br />

Engineer at Microsoft. In September 2010, Greg’s team began receiving reports from several<br />

companies of a new worm that was eventually called Win32/Visal.b. Greg was assigned<br />

one such case and began his investigation of a suspected infected work station by pressing<br />

Ctrl+Shift+Esc to start Task Manager. At first glance, none of the processes shown in Task<br />

Manager in Figure 18-7 might appear suspicious to an untrained observer. However, when<br />

Show Processes From All Users is not selected, there should be only one Csrss.exe listed, but<br />

Task Manager showed two. (Task Manager’s Show Processes From All Users option actually<br />

determines whether Task Manager shows processes only from the current terminal services<br />

session or from all TS sessions. See Chapter 2 for more information about TS sessions.)<br />

www.it-ebooks.info

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!