- Feb 22, 2007
- 16,240
- 7
- 76
I have a pc that I purposely infect with spyware and virus to study how they work. There are some really talented coders out there, but the majority of the stuff I find is virtual basic scripts and simple trojans or rootkits. Friday I encountered something I had never seen before.
I run any downloaded files on the test system before I open them on my main pc . I virus scanned the file with avg, clamav, microsoft security essentials, all said it was safe. I then used uniextract to extract the setup file to make sure nothing was packed in with the file, which is what has become a more common way to infect pc, nothing suspicious that I saw.
So I put the file on my main pc and ran it, program installed and all was fine or so I thought. I also run another program called process explorer. Later that day I was running process explorer and noticed a process named svchost1 was running. I checked to see what it is attached to and notice it has access to networking and is doing a lot of I/O with the hard drive. I immediately disconnected the network and suspended the process. When working with virus it is important you do not kill or terminate a process because that just causes the virus to restart. Suspending the process, basically freezes the virus from executing code.
I ran antivirus on the main pc and nothing found. I tracked down how it got into the system and managed to bypass antivirus and windows 7 UAC . The file contained a dll called graph.dll . I disassembled the file and found that it contained all the code that the normal graph.dll contained but it also contained extra code so that each time graph.dll was called by the main program it performed other functions. The more the graph.dll file was used the faster it was able to work on the system . The main program had permission to run by UAC so UAC did not have a problem with the code hidden in the dll performing other task.
I don't know of an easy way to detect trojans like this with the way current AV products work. I submitted all I found to the main AV companies and MS actually responded wanting more information on where I got the files and anything else I found, so I guess they were intrigued too.
So be careful where you download from because not even AV or UAC is enough protection.
I run any downloaded files on the test system before I open them on my main pc . I virus scanned the file with avg, clamav, microsoft security essentials, all said it was safe. I then used uniextract to extract the setup file to make sure nothing was packed in with the file, which is what has become a more common way to infect pc, nothing suspicious that I saw.
So I put the file on my main pc and ran it, program installed and all was fine or so I thought. I also run another program called process explorer. Later that day I was running process explorer and noticed a process named svchost1 was running. I checked to see what it is attached to and notice it has access to networking and is doing a lot of I/O with the hard drive. I immediately disconnected the network and suspended the process. When working with virus it is important you do not kill or terminate a process because that just causes the virus to restart. Suspending the process, basically freezes the virus from executing code.
I ran antivirus on the main pc and nothing found. I tracked down how it got into the system and managed to bypass antivirus and windows 7 UAC . The file contained a dll called graph.dll . I disassembled the file and found that it contained all the code that the normal graph.dll contained but it also contained extra code so that each time graph.dll was called by the main program it performed other functions. The more the graph.dll file was used the faster it was able to work on the system . The main program had permission to run by UAC so UAC did not have a problem with the code hidden in the dll performing other task.
I don't know of an easy way to detect trojans like this with the way current AV products work. I submitted all I found to the main AV companies and MS actually responded wanting more information on where I got the files and anything else I found, so I guess they were intrigued too.
So be careful where you download from because not even AV or UAC is enough protection.