A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #14981  by EP_X0FF
 Thu Aug 02, 2012 11:22 am
1) Binary compare with original.
2) Brains on.
3) Done.
 #14983  by kmd
 Thu Aug 02, 2012 11:44 am
EP_X0FF wrote:1) Binary compare with original.
2) Brains on.
3) Done.

what bin compare u use?
need enlight besides.
this one not patches ScTcp stuff.
 #14984  by EP_X0FF
 Thu Aug 02, 2012 11:58 am
kmd wrote:
EP_X0FF wrote:1) Binary compare with original.
2) Brains on.
3) Done.

what bin compare u use?
need enlight besides.
this one not patches ScTcp stuff.
I use several BinDiffs (all sucks in some points of view) as well as such magical tool like FC. What kind of enlights you need. Seriously, you can't handle such trivial thing like analysis of modified services.exe which is identical for all W7 versions? OK, enlights - it is old ZeroAccess version that overwrites .reloc section with lame and big shellcode and changes PE structure to make this former .reloc section be TLS. Also ASLR flag must be turned off from characteristics, of course otherwise this won't work. This method was modified to more optimised shellcode in future versions. If you still don't get it, here is screenshot.

Image
 #14987  by kmd
 Thu Aug 02, 2012 2:31 pm
EP_X0FF wrote: What kind of enlights you need. Seriously, you can't handle such trivial thing like analysis of modified services.exe which is identical for all W7 versions?
i thought it was something new..
thxn anyway

detection based on .reloc contents?
 #14988  by EP_X0FF
 Thu Aug 02, 2012 2:39 pm
Yes. On what else? What they modifed is the perfect marker. The method they used was worst so no suprise they don't use it anymore.
 #14996  by EP_X0FF
 Fri Aug 03, 2012 6:55 am
Tigzy wrote:Thanks EP_X0FF.
My question was more "which tool do you use to disassemble x64 binary" :?
IDAPro, Hiew enough for everything.
 #15010  by EP_X0FF
 Sat Aug 04, 2012 1:10 am
Tigzy wrote:But Hiew is not a disassembler ?
Who told you this? http://hiew.ru/#hiew
Tigzy wrote:@EP_X0FF

IDA Pro is .... for pros, and kinda expensive
Hiew is not a freeware too...
And what? I use company version so I don't really care :D

Offtop moved here
 #15021  by svinoth1610
 Sun Aug 05, 2012 7:44 pm
This malware also infects the services.exe in windows vista and windows 7 systems. You have to replace the infected services.exe with the clean services.exe from "c:\windows\winsxs" folder. Once it's replaced, reboot the system and after reboot you can delete the ZerAccess CLSID folders from "C:\windows\installer" and "C:\users\username\Appdata\Local" folders.
If you get any "file in use"error while deleting the ZeroAccess folder from %localappdata% then it is most probably running under explorer.exe process. In such case use the "cacls" command to deny the permission for '@' and 'n' infections, which is present inside the folder and reboot the system. After reboot use "cacls" again to give permission for the '@' and 'n' files and delete them. You can also edit permissions using the "security" tab in the properties window.

This malware removes the following windows services from the system. "Base filtering engine", "Security center", "Windows defender" and "Windows firewall".

It may also removes the "Background intelligent service" and "Windows update" services. These services should be manually added to the system.
  • 1
  • 24
  • 25
  • 26
  • 27
  • 28
  • 56