1. Gather the hash value of the malware.
2. Activate monitor tools (in an order that is tailored to capture the maximum information)
3. Run the malware in the host-only virtual machine, under the observation of some dynamic tools (such as Process Explorer and TCPView)
4. Don't kill the process unless it is terminated by itself.
5. Wait for a few minutes. If the process is terminated by itself, at least wait for another 1-2 minutes.
6. Pause the monitoring tools (in a reverse order of their start ups)
7. Observe logs and suspicious entries. (Write down all identified information and revisit the logs if new traces are found)
8. Exercise your judgements to interpret your findings. (This is an art)
9. Based on the above findings, call up additional tools (such as: Process Explorer, WinObj or VMmap) to inspect the possible artifacts in the process or memory and keep screen captures for the new findings.
10. Terminate the process if it is still running.
11. Call up the tools again to re-examine the possible artifacts in the registry, process or memory.
12. Write down all MAC times and hash values for all add, deleted and modified files and copy these files to a "file" folder.
13. Back up all logs, screen captures to "data" folder for further reference.
14. Zip these folders with password and copy to the host machine before rollback your virtual machine.
15. Further analyze your logs by the helps of the search capability from an editor or import into Excel if they are CSV format for further searching.
16. Never inspect the "file" folder in your host machine.
17. Finally, document all your findings and prepare a formal report.
Of course, I did not cover on how to mode the network to response the malware's requests and I am assuming these procedures will be carried out after the studying of pcap file contained in the CaptureBAT log.
Sunday, August 7, 2011
Saturday, May 5, 2007
SPYLOCKS
From Wiki: http://en.wikipedia.org/wiki/SpyLocked
Try this:
Try this:
You need to remove all these files
spylocked.exe
xkrdk.dll
onwtj.dll
fyxkaah.dll
higehsg.dll
geplxss.dll
tvomnc.dll
you can find more information here
http://www.xp-vista.com/spyware-removal/spylocked-removal-instructions
OR:
Check this: http://www.bleepingcomputer.com/forums/topic85376.html
MSRundll.exe
From Symantec this virus is called W32.Vibmaru
Try to fix it by the following golden rules for virus removing:
1. Disable System Restore, if you are using XP
2. Update virus defintions
3. Run a full scan
4. Delete some registry
4. To delete the value from the registry
Try to fix it by the following golden rules for virus removing:
1. Disable System Restore, if you are using XP
2. Update virus defintions
3. Run a full scan
4. Delete some registry
4. To delete the value from the registry
- Delete these entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"System" = "system.exe (74295303)" - Restore the following registry entries to their original values, if required:
HKEY_CLASSES_ROOT\scrfile\"(default)" = ""
HKEY_CLASSES_ROOT\inifile\shell\open\command\"(default)" = "system32.exe %1"
HKEY_CLASSES_ROOT\txtfile\shell\open\command\"(default)" = "msrundll.exe %1"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation\"ActiveTimeBias" = "420"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation\"ActiveTimeBias" = "480"
Virus for China
Just fixed a browser hijack called My123.com for one of my friend in China....
At first, I think it is a simply job by removing some files by booting up a UBCD4Win CD and delete some registry entries. However, the virus comes back and I found it is a rootkit hidden inside drivers which are loaded during boot up.
It drive me to get the interest to study and find solutions for the unique viurs in China. I prepare to put some solutions on this blog and hope others could provides me the viurs sample so that I can do some more research....
At first, I think it is a simply job by removing some files by booting up a UBCD4Win CD and delete some registry entries. However, the virus comes back and I found it is a rootkit hidden inside drivers which are loaded during boot up.
It drive me to get the interest to study and find solutions for the unique viurs in China. I prepare to put some solutions on this blog and hope others could provides me the viurs sample so that I can do some more research....
Subscribe to:
Posts (Atom)