09.02.2014 Views

Windows sysinternals

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 18 Malware 433<br />

FIGURE 18-9 Strings revealing malware in the fake Csrss.exe.<br />

Greg has also diagnosed malware files with Strings by discovering text such as “UPX0”<br />

( indicating that the file was packed) or references to “non-professional” PDB symbol file<br />

paths such as “d:\hack.86” or “c:\mystuff”.<br />

Having confirmed that this fake <strong>Windows</strong> component was indeed malicious, Greg and his<br />

team worked with the Microsoft Malware Protection Center to document its behaviors and<br />

recovery steps and to provide an anti-malware solution.<br />

The Case of the Mysterious ASEP<br />

Greg was assigned a case from a customer representing a large US hospital network that<br />

reported it had been hit with an infestation of the Marioforever virus. The customer had discovered<br />

the virus when its printers started getting barraged with giant print jobs of garbage<br />

text, causing its network to slow and the printers to run out of paper. Their antivirus software<br />

identified a file named Marioforever.exe in the %SystemRoot% folder of one of the machines<br />

spewing files to the printers as suspicious, but deleting the file just resulted in it reappearing<br />

at the subsequent reboot. Other antivirus programs failed to flag the file at all.<br />

Greg started looking for clues by seeing if there were additional suspicious files in the<br />

%SystemRoot% directory of one of the infected systems. One file, a DLL named Nvrsma.dll,<br />

had a recent time stamp, and although it was named similarly to Nvidia display driver components,<br />

the computer in question didn’t have an Nvidia display adapter. When he tried to<br />

www.it-ebooks.info

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!