A forum for reverse engineering, OS internals and malware analysis 

Search found 12 matches: zombified

Searched query: zombified

 Go to advanced search

Process Doppelganging

 by EP_X0FF ¦  Wed Dec 13, 2017 2:31 pm ¦  Forum: User-Mode Development ¦  Topic: Process Doppelganging ¦  Replies: 7 ¦  Views: 19082

... much different and all based on presentation slides. Method advantages: - It is relatively new; - Can execute payload from memory (fileless); - Zombified target process has legitimate look; - It is Windows design feature, not a bug or vulnerability not in NTFS not in loader, nothing to fix here; ...

Re: Malware collection

 by EP_X0FF ¦  Tue Oct 18, 2016 4:25 am ¦  Forum: Malware ¦  Topic: MSIL/Golroted ¦  Replies: 2 ¦  Views: 4640

... bedia1.exe - MSIL/Golroted dugefia2.exe - MSIL/Golroted bejodea.exe.exe - MSIL obfuscated dropper-injector (zombified vbc.exe type) for modified MailPassView program. Doc3.doc - Office macro virus O97M/Donoff Doc5.doc - Office macro virus O97M/Donoff Doc6.doc ...

Re: New Qakbot VM Detection?

 by EP_X0FF ¦  Fri Aug 29, 2014 5:48 am ¦  Forum: Malware ¦  Topic: Win32/Qakbot ¦  Replies: 20 ¦  Views: 16872

... hide it process, NtResumeThread hook used for self-propogation in newly spawned processes (from explorer.exe). Payload downloading performed from zombified IEXPLORE process copy. Hides part of registry values related to own Win32 service with help of RegEnumValueW/RegEnumValueA hooks. Seems to ...

Win32/Poweliks

 by EP_X0FF ¦  Tue Jul 15, 2014 10:44 am ¦  Forum: Malware ¦  Topic: Win32/Poweliks ¦  Replies: 36 ¦  Views: 113160

... find another base64 encoded which is attached as PayloadA.txt. This is base64 encoded dll which is actual malware designed to be running inside zombified copy of dllhost.exe (this malware aware about WOW64 and will select appropriate version of this executable - Wow64DisableWow64FsRedirection ...

Re: Win32/Betabot (alias Neurevt)

 by Thanat0S ¦  Sun Sep 22, 2013 10:11 am ¦  Forum: Malware ¦  Topic: Win32/Betabot (alias Neurevt) ¦  Replies: 59 ¦  Views: 121533

... name which itself is suspicious by default. Malware body still in Common Files\Betabot folder + hidden attribute. While loading bot starts zombified copy of explorer.exe and injects itself inside, performs hooking of KiFastSystemCall + some winsock routines (GetAddrInfo) and start working, ...

Re: Win32/Betabot (alias Neurevt)

 by EP_X0FF ¦  Sun Sep 22, 2013 5:41 am ¦  Forum: Malware ¦  Topic: Win32/Betabot (alias Neurevt) ¦  Replies: 59 ¦  Views: 121533

... name which itself is suspicious by default. Malware body still in Common Files\Betabot folder + hidden attribute. While loading bot starts zombified copy of explorer.exe and injects itself inside, performs hooking of KiFastSystemCall + some winsock routines (GetAddrInfo) and start working, ...

WinNT/Wowliks (Alureon)

 by EP_X0FF ¦  Thu May 30, 2013 6:27 am ¦  Forum: Malware ¦  Topic: WinNT/Wowliks (Alureon) ¦  Replies: 8 ¦  Views: 9156

Another Alureon of the new generation (7 if count). Trojan downloader, works from explorer.exe as first stage and then from zombified svchost.exe. Contain small x64 loader which only purpose is to launch specified by command line file using syswow64\rundll32.exe Dropper uses NTFS encryption ...

Re: Trojan Ransom / FakePoliceAlert

 by rinn ¦  Sat Nov 17, 2012 6:09 pm ¦  Forum: Malware ¦  Topic: Win32/Urausy (aka "WinLocker") ¦  Replies: 80 ¦  Views: 81657

... Second stage - memory inject in explorer.exe. After this code activates it is creating new special desktop named wLockDesktop, starting zombified copy of svchost.exe with injected (again) trojan code and initial process desktop value set to be wLockDesktop. Then execution transfers to ...

Re: Backdoor Andromeda (alias Gamarue)

 by EP_X0FF ¦  Mon May 28, 2012 7:35 am ¦  Forum: Malware ¦  Topic: Backdoor Andromeda (waahoo, alias Gamarue) ¦  Replies: 129 ¦  Views: 198755

... SOFTWARE\Microsoft\Windows\CurrentVersion\Run Software\Microsoft\Windows\CurrentVersion\Run SunJavaUpdateSched Payload injected into zombified wuauclt.exe process.