Spyware: now with 200% more suck.
Mar. 17th, 2005 10:43 pmWow... I just cleaned up one tonight that had some sort of nasty shiite on it. The machine was getting t3h popups constantly, and everything had been cleaned expect for one little thing.
It showed up in hijackthis as "[etbrun] c:\windows\system32\elitepmm32.exe". If you removed that startup entry it would come right back. There was no running process by that name, and in fact no file by that name in that location... but something odd, if you went to a command prompt and tried "del c:\windows\system32\elitepmm32.exe" you would get something like "the environment variable is incorrect". WTF, whatever happened to "file not found?"
I fired up regmon and filemon. Sure enough, there IS an elitepmm32.exe replacing that [etbrun] entry every few seconds. But apparently that file doesn't exist and it's still not listed in processes.
I booted the machine from a BartPE and in c:\windows\system32 there's an elitepmm32.exe and about a dozen other identical files of the pattern elite???32.exe. Deleted them and the [etbrun] line, and it never came back. The popups stopped.
How nice. Spyware is now using rootkits. A rootkit injects itself into the kernel and can totally hide files and processes. System calls to list files and processes get intercepted by the rootkit and all references to the nasty stuff are removed. No application can see something that the kernel doesn't tell it about, so antispyware programs simply don't see it. There is no way to remove a rootkit without booting the machine from a clean OS. Now, in this case, you might be able to remove it from safe mode, because it installs via a usermode startup. If it has a boot-loading driver component, it's all over.
Try as you might, you just can't see the fnord.
It showed up in hijackthis as "[etbrun] c:\windows\system32\elitepmm32.exe". If you removed that startup entry it would come right back. There was no running process by that name, and in fact no file by that name in that location... but something odd, if you went to a command prompt and tried "del c:\windows\system32\elitepmm32.exe" you would get something like "the environment variable is incorrect". WTF, whatever happened to "file not found?"
I fired up regmon and filemon. Sure enough, there IS an elitepmm32.exe replacing that [etbrun] entry every few seconds. But apparently that file doesn't exist and it's still not listed in processes.
I booted the machine from a BartPE and in c:\windows\system32 there's an elitepmm32.exe and about a dozen other identical files of the pattern elite???32.exe. Deleted them and the [etbrun] line, and it never came back. The popups stopped.
How nice. Spyware is now using rootkits. A rootkit injects itself into the kernel and can totally hide files and processes. System calls to list files and processes get intercepted by the rootkit and all references to the nasty stuff are removed. No application can see something that the kernel doesn't tell it about, so antispyware programs simply don't see it. There is no way to remove a rootkit without booting the machine from a clean OS. Now, in this case, you might be able to remove it from safe mode, because it installs via a usermode startup. If it has a boot-loading driver component, it's all over.
Try as you might, you just can't see the fnord.
no subject
Date: 2005-03-18 03:48 am (UTC)no subject
Date: 2005-03-18 04:03 am (UTC)no subject
Date: 2005-03-18 04:15 am (UTC)no subject
Date: 2005-03-18 04:31 am (UTC)no subject
Date: 2005-03-18 04:46 am (UTC)I think CoolWebSearch is the one that installs itself as a System Service in XP, or at least has a service that automatically reinstalls itself all the time.
no subject
Date: 2005-03-18 04:49 am (UTC)no subject
Date: 2005-03-18 04:54 am (UTC)no subject
Date: 2005-03-18 09:04 am (UTC)no subject
Date: 2005-03-18 01:35 pm (UTC)no subject
Date: 2005-03-18 03:38 pm (UTC)http://www.nu2.nu/bootablecd/
There are a few additions that one will need to get a hold of (like a free version of Mcafee's command line Win32 virus scanner, and Ad-aware), but instructions are there.
If I ever see the person who came up with CoolWebSearch and some of the other nasty spyware, I shall do unspeakable things to them, and I'll video tape it and share the torture.
no subject
Date: 2005-03-21 06:23 am (UTC)It's clever manipulation, but not a true rootkit.
VX2's latest variants actually embed the restore function somewhere to initialize on shutdown, so it's not running to stop until after you've done your scans. There are some very useful tools I've grabbed to deal with that, but I lost the thumbdrive I put them on ):.
no subject
Date: 2005-03-21 06:05 pm (UTC)CoolWebSearch, on the other hand, pulls no punches. It installs Hacker Defender to hide. Now THAT's a real rootkit.