{"id":7873,"date":"2017-06-08T07:10:29","date_gmt":"2017-06-08T15:10:29","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/08\/news-1655\/"},"modified":"2017-06-08T07:10:29","modified_gmt":"2017-06-08T15:10:29","slug":"news-1655","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/06\/08\/news-1655\/","title":{"rendered":"Adware the series, part 5"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 08 Jun 2017 14:00:49 +0000<\/strong><\/p>\n<p>In this series of posts, we will be using the flowchart below to follow the process of determining which\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/adware\/\" target=\"_blank\" rel=\"noopener noreferrer\">adware<\/a>\u00a0we are dealing with. Our objective is to give you an idea of how many different types of adware are around for Windows systems. Though most are\u00a0classified as\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/pup\/\" target=\"_blank\" rel=\"noopener noreferrer\">PUPs<\/a>, you will also see the occasional\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/trojan\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan<\/a>\u00a0or\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/rootkit\/\" target=\"_blank\" rel=\"noopener noreferrer\">rootkit<\/a>, especially for the types\u00a0that are more difficult\u00a0to detect and remove.<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17796 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart.png\" alt=\"flowchart\" width=\"609\" height=\"686\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart.png 609w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart-266x300.png 266w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart-533x600.png 533w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/p>\n<p>In this part of the series, we will be focusing on cases where the process we found as the one that was showing the advertisement was not the actual culprit. We will demonstrate how to use Process Explorer to see which handles, DLL\u2019s and parent processes are involved. Which is a relatively easy way to figure out what a process is doing.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18146\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/handles.png\" alt=\"\" width=\"141\" height=\"125\" \/><\/p>\n<h3>Process Explorer<\/h3>\n<p>As mentioned before the tool we will be using for this episode is Sysinternal\u2019s Process Explorer. At the moment I was writing this post the current version of Process Explorer was v16.21. To view DLLs and handles you will need to enable the <strong>Lower Pane view<\/strong> and set it to <strong>DLLs<\/strong> or <strong>Handles<\/strong> respectively.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18150 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/PELowerPane-1.png\" alt=\"Select lower pane view\" width=\"591\" height=\"434\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/PELowerPane-1.png 591w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/PELowerPane-1-300x220.png 300w\" sizes=\"auto, (max-width: 591px) 100vw, 591px\" \/><\/p>\n<p>To enable the Lower Pane View, click <strong>View<\/strong> &gt; and put a check-mark in front of <strong>Lower Pane View<\/strong>. Then if you hover over the <strong>Lower Pane View<\/strong> option you can either select <strong>DLLs<\/strong> or <strong>Handles<\/strong>.<\/p>\n<h3>Parent process<\/h3>\n<p>But let\u2019s have a look at the parent process first. When you toggle the header of the Process column you will notice one configuration (like in the screenshot above), where the processes are shown in a tree-like fashion. The other configurations are alphabetical and reversed alphabetical. The tree-like representation allows you to see which process started the one(s) listed under it. Example: the processes listed under \u201cexplorer.exe\u201d have explorer.exe as the parent process. Which in the case of explorer.exe often means that the user double-clicked the executable or a shortcut to that executable. But in cases where a browser window is showing you an advertisement, it can be interesting to see which process is the parent process of the browser process, because that could be the one you are after.<\/p>\n<h3>DLLs<\/h3>\n<p>Dynamic Load Libraries (DLLs) are files that can be used by other executable files. They often contain functions or other pieces of code, that can be called by name or entry point. In this way, the code in the library can be executed as part of the running process. To see all the DLLs that are in use by one process, you can look at the Lower Pane. Tip: if you want to present this list to someone to get a second opinion, you can select the process in the top window, then click<\/p>\n<p>Tip: if you want to present this list to someone to get a second opinion, you can select the process in the top window, then click <strong>File<\/strong> &gt; <strong>Save As <\/strong>and save the resulting text file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18151\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/ExportDLL-1.png\" alt=\"Export the list of DLLs\" width=\"614\" height=\"532\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/ExportDLL-1.png 614w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/ExportDLL-1-300x260.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/ExportDLL-1-600x520.png 600w\" sizes=\"auto, (max-width: 614px) 100vw, 614px\" \/><\/p>\n<p>Tip: sort the Lower Pane by <strong>Company Name <\/strong>so you can easily skip all the Microsoft Corporation files. This will usually limit the number of DLLs you need to look at to a few.<\/p>\n<h3>Handles<\/h3>\n<p>Handles are a good way of looking whether a process is using certain resources like ports, sockets, and files. And the beauty of Process Explorer is, that if you know which handle you are looking for, you can search for that handle. For example, if you want to look at which processes have a handle on the counters.dat file, which is often shared among many internet connected processes, you can click <strong>Find<\/strong> &gt; <strong>Find Handle or DLL&#8230; <\/strong>and then type the name of the resource in the prompt to get a list of processes that have a handle on it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18145\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/HandleIt.png\" alt=\"Search for a Handle\" width=\"719\" height=\"272\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/HandleIt.png 719w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/HandleIt-300x113.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/HandleIt-600x227.png 600w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/p>\n<p>When in doubt, you can enable the Virustotal lookup of handles by clicking <strong>Options<\/strong> &gt; <strong>VirusTotal.com<\/strong> &gt; <strong>Check VirusTotal.com<\/strong>. This will send the hashes to Virustotal, a free service that analyzes suspicious files and URLs. With a bit of luck, you will notice a detection in the list that you would have missed if you had only checked the list of processes against Virustotal.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18147\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/HandleVT.png\" alt=\"Virustotal result\" width=\"690\" height=\"269\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/HandleVT.png 690w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/HandleVT-300x117.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/HandleVT-600x234.png 600w\" sizes=\"auto, (max-width: 690px) 100vw, 690px\" \/><\/p>\n<p>When you right-click a Handle, you will see the option to <strong>Close Handle<\/strong>. Releasing these handles can sometimes help when you encounter files that are undeletable because they are in use. By closing all the handles these files will become deletable as they will be no longer in use.<\/p>\n<h3>Example<\/h3>\n<p>Let\u2019s use some adware, as an example, that uses your default browser to open advertisements. On this system, Firefox is the default browser. Every time I open Firefox I will get a new tab with a different advertisement (all redirects in this case).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18173 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/examplead.png\" alt=\"example advertisement\" width=\"800\" height=\"513\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/examplead.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/examplead-300x192.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/examplead-600x385.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>It is obvious that the process is <strong>firefox.exe <\/strong>and a quick examination tells me there are no extensions at play and no active proxy is present. A little deeper investigation showed no LSP or DNS hijacks.<\/p>\n<p>So I looked at my list of installed programs and saw something unknown, which was also suspicious because it has no <strong>Publisher<\/strong> and no<strong> Version, <\/strong>and the install date happens to match the date the advertisements started.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18171 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/warning4.png\" alt=\"list of programs and features\" width=\"746\" height=\"154\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/warning4.png 746w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/warning4-300x62.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/warning4-600x124.png 600w\" sizes=\"auto, (max-width: 746px) 100vw, 746px\" \/><\/p>\n<p>So I performed a search for DLLs and Handles with Process Explorer and found the <strong><a href=\"https:\/\/forums.malwarebytes.com\/topic\/202040-removal-instructions-for-qipapp\/\" target=\"_blank\" rel=\"noopener noreferrer\">QIPApp<\/a> <\/strong>in quite a lot of processes and it even has a process with\u00a0the same name.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18174 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/FoundQA.png\" alt=\"list of handles\" width=\"508\" height=\"333\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/FoundQA.png 508w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/FoundQA-300x197.png 300w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/p>\n<p>In this case, the uninstall worked and the adware was gone after a reboot, so we didn&#8217;t have to remove it manually. We also could have used <a href=\"https:\/\/www.malwarebytes.com\/mwb-download\/\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes<\/a> to remove it, but I used it as an example to demonstrate the method of investigation.<\/p>\n<p>See you next time when we will tackle the ones that are a lot harder to find and remove.<\/p>\n<h4>Index<\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 1<\/a><\/p>\n<ul>\n<li>Identify the process<\/li>\n<li>Clear browser caches<\/li>\n<li>Remove browser extensions<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 2<\/a><\/p>\n<ul>\n<li>Proxies<\/li>\n<li>Winsock hijackers<\/li>\n<li>DNS hijackers<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 3<\/a><\/p>\n<ul>\n<li>Type of software<\/li>\n<li>Uninstall<\/li>\n<li>Remove file<\/li>\n<li>Replace file<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-4\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 4<\/a><\/p>\n<ul>\n<li>Scheduled tasks<\/li>\n<li>Services<\/li>\n<\/ul>\n<p>Part 5<\/p>\n<ul>\n<li>DLL\u2019s<\/li>\n<li>Handles<\/li>\n<li>Parent process<\/li>\n<\/ul>\n<p>Up next, part 6<\/p>\n<ul>\n<li>ADS<\/li>\n<li>Rootkits<\/li>\n<li>Fileless infections<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-5\/\">Adware the series, part 5<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-5\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 08 Jun 2017 14:00:49 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-5\/' title='Adware the series, part 5'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/photodune-13776058-software-xxl.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Part 5 of this adware series shows the reader how the can use Process Explorer to have a close look at other files that are interacting with a suspicious process.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/puppum\/\" rel=\"category tag\">PUP<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dlls\/\" rel=\"tag\">DLLS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/handles\/\" rel=\"tag\">handles<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/parent-process\/\" rel=\"tag\">parent process<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pieter-arntz\/\" rel=\"tag\">Pieter Arntz<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/process-explorer\/\" rel=\"tag\">process explorer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/the-series\/\" rel=\"tag\">the series<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-5\/' title='Adware the series, part 5'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-5\/\">Adware the series, part 5<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,12587,12588,12589,10523,12216,10566,12387],"class_list":["post-7873","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-dlls","tag-handles","tag-parent-process","tag-pieter-arntz","tag-process-explorer","tag-pup","tag-the-series"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7873"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7873\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7873"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}