A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #14066  by Cody Johnston
 Sun Jun 17, 2012 10:11 pm
MSS actually did not completely remove the infection for me when services.exe was infected. I was able to get a fix together for a live system if anyone has interest. This fix assumes that you have a clean copy of services.exe in the C:\ drive.

Here is what I did:

First find which of my controlsets is currently loaded by looking here:
Code: Select all
HKEY_LOCAL_MACHINE\SYSTEM\Select | Default = 1
Assuming my value was 1 (ControlSet001), I would add the following values to ControlSet002 or 003:
Code: Select all
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager
         Value: PendingFileRenameOperations
         Data: \??\C:\services.exe !\??\C:\windows\system32\services.exe
Switch Default value to match modified ControlSet002
Code: Select all
HKEY_LOCAL_MACHINE\SYSTEM\Select | Default = 2 
Then started MSS in full scan and was clean when it rebooted. Doing this same thing within the CurrentControlSet did not work properly. Can anyone tell me why I would have to switch outside of the CurrentControlSet for the PendingFileRenameOperations to work properly? I remember having to use a similar method when removing the "consrv.dll" variant as well. Thanks :D
 #14067  by SecConnex
 Sun Jun 17, 2012 11:13 pm
I have a RKU log from ZA...please give a second opinion for whom can do an analysis.

Anyone know a good tool for MBR dump...I haven't known why MBRCheck does not do dumps anymore.

Log is attached from RKU on fully infected, yet super hidden ZA...
(137.56 KiB) Downloaded 43 times
 #14068  by B-boy/StyLe/
 Sun Jun 17, 2012 11:46 pm
rkhunter wrote:Guys, any idea why AV-guys not detected infected services.exe so far?

Maybe because of this: (Avira report) :P

File ID
26923409

Filename - services.exe.vir

Size (Byte) - 273 KB

Result - DAMAGED FILE (UNKNOWN)
The file 'services.exe.vir' has been determined to be 'DAMAGED FILE (UNKNOWN)'. In particular this means that this file is damaged and not working properly. We could not find any malicious content. However the heuristic detection module may still detect this particular file even though it is damaged. In that case we will not adjust and remove detection for this damaged file.

Regards,
Georgi
Attachments
pass:infected
(127.61 KiB) Downloaded 63 times
 #14069  by kmd
 Mon Jun 18, 2012 12:15 am
oh lolz i start to believe in gostev words, can anyone do ads dump of services.exe from infected box? Services.exe samples ar NOT IMPORTANT - they are damaged by ZA and WON'T work without ZA additional part.
 #14074  by rkhunter
 Mon Jun 18, 2012 7:49 am
kmd wrote:oh lolz i start to believe in gostev words...
Don't believe to Gostev, Kaspersky can't detect infected files and it payload as others...
  • 1
  • 14
  • 15
  • 16
  • 17
  • 18
  • 56