A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #14322  by Tigzy
 Wed Jun 27, 2012 1:57 pm
So I guess yes it's readable.
Sorry if it have been said yet, but this version does only patches x86/x64 services.exe on Vista/7 ?
No XP?

I've inspected ASLR wipe off, and it seems only binary on vista+ have it enabled by default (DllCharacteristics in optional header : http://msdn.microsoft.com/en-us/library ... s.85).aspx ) I'm trying to build general detection rules over it.
 #14367  by thisisu
 Fri Jun 29, 2012 7:33 pm
Tigzy wrote:Sorry if it have been said yet, but this version does only patches x86/x64 services.exe on Vista/7 ?
No XP?
I think the general consensus is that it's capable of patching XP services.exe but I have not seen anyone's malware logs that prove this.
These blog posts go into more detail on services.exe:

http://artemonsecurity.blogspot.com/201 ... ution.html
http://hitmanpro.wordpress.com/2012/06/ ... infection/

Also would like to thank you Tigzy and Erik as well for your hard work on developing tools that fight this infection (as well as many others). We have had success with both RogueKiller and HitmanPro in removing all components of ZeroAccess CLSID variant as well as restoring a clean services.exe.
 #14398  by Quads
 Sun Jul 01, 2012 11:59 pm
Found another file(s) location that FRST does not show in the log

c:\windows\system32\config\systemprofile\Local Settings\Application Data\{CLSID}
c:\windows\system32\config\systemprofile\Local Settings\Application Data\{CLSID}\@
c:\windows\system32\config\systemprofile\Local Settings\Application Data\{CLSID}\n

Quads
 #14400  by Quads
 Mon Jul 02, 2012 6:36 am
The system I am working on with that location also had ZA in the other known CLSID locations FRST found, but the system also had bamital and other Malware files to break.

Quads
  • 1
  • 20
  • 21
  • 22
  • 23
  • 24
  • 56