{"id":8385,"date":"2017-07-19T08:10:12","date_gmt":"2017-07-19T16:10:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/19\/news-2159\/"},"modified":"2017-07-19T08:10:12","modified_gmt":"2017-07-19T16:10:12","slug":"news-2159","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/07\/19\/news-2159\/","title":{"rendered":"Adware the series, the final: Tools section"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 19 Jul 2017 15:00:46 +0000<\/strong><\/p>\n<p>So far in this series, we have handed you some methods to recognize and remediate adware. We used this diagram as a guideline.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17796\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart.png\" alt=\"flowchart\" width=\"609\" height=\"686\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart.png 609w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart-266x300.png 266w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart-533x600.png 533w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/p>\n<p>During this journey, we have touched upon several free tools that we used to get some insight on what type of infection we were dealing with and where the adware could be hiding. Our objective has been to give you an idea of how many different types of adware are around for Windows systems. Though most are\u00a0classified as\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/pup\/\" target=\"_blank\" rel=\"noopener noreferrer\">PUPs<\/a>, you will also see the occasional\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/trojan\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan<\/a>\u00a0or\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/rootkit\/\" target=\"_blank\" rel=\"noopener noreferrer\">rootkit<\/a>.<\/p>\n<p>This, the final part of the series, will provide you with download-locations and a description of the tools. One word of warning: even though all the tools are free for personal use, that doesn&#8217;t make them less powerful. If you want to use these tools to remediate a problem, make sure you know what you are doing or have some kind of backup at hand, in case anything goes terribly wrong. If you want to learn more about removing malware, there are <a href=\"https:\/\/uniteagainstmalware.com\" target=\"_blank\" rel=\"noopener noreferrer\">several online schools<\/a> that offer free malware removal training.<\/p>\n<h3>The tools<\/h3>\n<h4>Process Explorer (Microsoft\/Sysinternals)<\/h4>\n<p>Site:\u00a0 <a href=\"https:\/\/technet.microsoft.com\/en-us\/sysinternals\/processexplorer.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/en-us\/sysinternals\/processexplorer.aspx<\/a><\/p>\n<p>We used Process Explorer to <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">identify the process that belongs to a window<\/a> and to <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-5\/\" target=\"_blank\" rel=\"noopener noreferrer\">identify parent\/child processes and look at DLLs and handles<\/a>. An <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/05\/process-explorer-an-introduction\/\" target=\"_blank\" rel=\"noopener noreferrer\">introduction to Process Explorer<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/05\/process-explorer-part-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">some more advanced information<\/a> can be found on our blog.<\/p>\n<h4>Resource Monitor (Microsoft)<\/h4>\n<p>Built into Windows since Windows 7.<\/p>\n<p>We explained how to use Resource Monitor to check <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">which processes are connecting where<\/a>.<\/p>\n<h4>FileASSASSIN (Malwarebytes)<\/h4>\n<p>Site: <a href=\"https:\/\/www.malwarebytes.com\/fileassassin\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.malwarebytes.com\/fileassassin\/<\/a><\/p>\n<p>FileAssassin is a tool to <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">delete any type of locked file<\/a>.<\/p>\n<h4>Malwarebytes anti-rootkit BETA (Malwarebytes)<\/h4>\n<p>Site: <a href=\"https:\/\/www.malwarebytes.com\/antirootkit\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.malwarebytes.com\/antirootkit\/<\/a><\/p>\n<p>Malwarebytes anti-rootkit BETA is the tool of choice when you are dealing with <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/\" target=\"_blank\" rel=\"noopener noreferrer\">difficult to remove and even invisible infections<\/a>.<\/p>\n<h4>FRST (Farbar)<\/h4>\n<p>Site: <a href=\"https:\/\/www.bleepingcomputer.com\/download\/farbar-recovery-scan-tool\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.bleepingcomputer.com\/download\/farbar-recovery-scan-tool\/<\/a><\/p>\n<p>There is a 32-bit and 64-bit version. Make sure you download the correct one for your system.<\/p>\n<p>The Farbar Recovery Scan Tool (FRST) is a very useful diagnostic tool. It can also be used as a manual remediation tool, but I want to focus on reading the scan output it produces and which sections to focus on when we are looking for adware. So unless you have cured the problem using Process Explorer, MBAM, MBAR or FileAssassin we are now going to have a look at FRST. FRST works equally well in normal or safe mode and when a machine has boot up problems it will even work in the Windows Recovery Environment.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18814\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/FRSTmain.png\" alt=\"Farbar Recovery Scan Tool\" width=\"567\" height=\"342\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/FRSTmain.png 567w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/FRSTmain-300x181.png 300w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\" \/><\/p>\n<p>The output of the FRST scans is nicely formatted in a way that makes it easy to check most of the problem areas that we have pointed out during the course of this series.<\/p>\n<h3><strong>Browser sections<\/strong><\/h3>\n<p>These are divided per installed browser and there is a general section.<\/p>\n<p>==================== Internet (Whitelisted) ====================<\/p>\n<p>This section contains information like DNS servers that are in use in the format:<\/p>\n<p><code>TcpipParameters: [DhcpNameServer] {IP address 1} {IP address 2}<\/code><\/p>\n<p><code>Tcpip..Interfaces{CLSID}: [DhcpNameServer] {IP address 1} {IP address 2}<\/code><\/p>\n<p>Internet Explorer:<\/p>\n<p>==================<\/p>\n<p>This section has the add-ons for Internet Explorer listed in the format:<\/p>\n<p><code>BHO: {name} -&gt; {CLSID} -&gt; {path + filename} [{date of install}] [{signed-by-company-name}]<\/code><\/p>\n<p>It also list other items like Startpage, Searchscopes, Handlers, Toolbars, Filters and ActiveX objects<\/p>\n<p>FireFox:<\/p>\n<p>========<\/p>\n<p>This section holds the extensions for Firefox in the format:<\/p>\n<p><code>FF Extension: {name} \u2013 {folder to the extension} [{date of install}] [{signed-by-company-name}]<\/code><\/p>\n<p>And the Plugins in these format types:<\/p>\n<p><code>FF Plugin: @{company}\/{name} -&gt; {path + filename} [{date of install}] ({signed-by-company-name})<\/code><\/p>\n<p>FF Plugin ProgramFiles\/Appdata: {path + filename} [date of install}] ({signed-by-company-name})<\/p>\n<p>It also list other information about Firefox like Homepage, Default search engine and the presence of user.js files.<\/p>\n<p>Chrome:<\/p>\n<p>=======<\/p>\n<p>This section holds the extensions for each Chrome profile in these formats:<\/p>\n<p><code>CHR Extension: ({name}) \u2013 {path to the extension folder} [{date of install}]<\/code><\/p>\n<p><code>CHR HKLM...ChromeExtension: [{extension identifier string}] \u2013 [{update_url}]<\/code><\/p>\n<p>It also lists information about the Homepage and policies that may be active.<\/p>\n<p>Opera:<\/p>\n<p>=======<\/p>\n<p>This section holds the extensions for Opera in the format:<\/p>\n<p><code>OPR Extension: ({name}) \u2013 {path to the extension folder} [{date of install}]<\/code><\/p>\n<p>It also shows StartupUrls and StartMenuInternet where applicable.<\/p>\n<h3><strong>Loaded modules<\/strong><\/h3>\n<p>You can find some information about loaded modules in the section:<\/p>\n<p>==================== Loaded Modules (Whitelisted) ==============<\/p>\n<p>In the format:<\/p>\n<p><code>{Date\/time on system} \u2013 {Date\/time created} \u00a0- {filesize} {permissions} () {path to file}{filename + extension}<\/code><\/p>\n<p>Note: it lists only unsigned files. Even if the files are signed by known malware publishers, they will not be listed.<\/p>\n<h3><strong>Scheduled Tasks<\/strong><\/h3>\n<p>Scheduled Tasks are flagged in the Addition log of FRST in the following format:<\/p>\n<p><code>Task: {CLSID} - System32 or WindowsTasks{jobname} =&gt; {path to the file}{filename} [date] (signature)<\/code><\/p>\n<h3><strong>Services<\/strong><\/h3>\n<p>Services are reported along with their startup method and whether they are running or not.<br \/> <code><br \/> R=Running<\/code><\/p>\n<p><code>S=Stopped<\/code><\/p>\n<p><code>U=Unknown<\/code><\/p>\n<p>The startup type numbers are:<br \/> <code><br \/> 0=Boot<\/code><\/p>\n<p><code>1=System<\/code><\/p>\n<p><code>2=Auto<\/code><\/p>\n<p><code>3=Demand<\/code><\/p>\n<p><code>4=Disabled<\/code><\/p>\n<p><code>5=Unknown<\/code><\/p>\n<p>In the format:<\/p>\n<p><code>{Letter}{number}{name of the service};{path to the file}{byte-size creation-date}{signed by}<\/code><\/p>\n<h3><strong>LSP hijackers<\/strong><\/h3>\n<p>As the order of the LSP layers is stored in the Winsock Service Provider you will find LSP entries listed in the Winsock section of a FRST log.<\/p>\n<p>Example:<\/p>\n<p><code>Winsock: Catalog5 000000000001\\LibraryPath =&gt; restored successfully (%SystemRoot%system32NLAapi.dll)<\/code><\/p>\n<p>The catalog numbers are important to keep in mind. Whenever you want to remove a Winsock:Catalog9 entry, it is recommended to use &#8220;netsh winsock reset&#8221;. This is to avoid the user ending up with a broken internet connection. You may have to repeat this after a reboot.<\/p>\n<h3><strong>DNS hijackers and proxies<\/strong><\/h3>\n<p><strong>\u00a0<\/strong>On the victim&#8217;s computer there are a few options for DNS hijacks:<\/p>\n<ul>\n<li>Alternative or altered hosts file. If the user has a non-standard hosts file FRST will report in Addition.txt: There are more than one entries detected in hosts&#8221;. This is not necessarily bad. Some security programs use the hosts file as a block-list.<\/li>\n<li>The DNS servers are listed in the \u201cOther Areas\u201d section. This also requires additional research as most DNS servers are legitimate.<\/li>\n<li>Proxies are listed in the \u201cInternet\u201d section of the FRST log.<\/li>\n<\/ul>\n<h3><strong>Uninstall list<\/strong><\/h3>\n<p>Programs that are listed in the list of installed Programs and Features can be found in the \u201cInstalled Programs\u201d section of the Addition log including \u201chidden\u201d entries.<\/p>\n<h3><strong>ADS<\/strong><\/h3>\n<p>Alternate Data Streams have a special section for themselves. Note that this section is white-listed, as are many others.\u00a0 The format looks like this:<\/p>\n<p><code>AlternateDataStreams: {Path to the file}:{name of the stream} [number of bytes]<\/code><\/p>\n<h3><strong>WMI<\/strong><\/h3>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/10\/explained-wmi-hijackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hijackers using the Windows Management Instrumentation<\/a> can be spotted in the Addition log. Example:<\/p>\n<p><code>WMI_ActiveScriptEventConsumer_ASEC: &lt; ===== ATTENTION<\/code><\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>I really enjoyed sharing some of the knowledge that I gathered over the years and I\u2019m also glad I now have it in a relatively organized fashion. I hope you, the readers have found it useful too. Or entertaining at least. Feel free to let us know in the comments.<\/p>\n<h3>Index<\/h3>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 1<\/a><\/p>\n<ul>\n<li>Identify the process<\/li>\n<li>Clear browser caches<\/li>\n<li>Remove browser extensions<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 2<\/a><\/p>\n<ul>\n<li>Proxies<\/li>\n<li>Winsock hijackers<\/li>\n<li>DNS hijackers<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 3<\/a><\/p>\n<ul>\n<li>Type of software<\/li>\n<li>Uninstall<\/li>\n<li>Remove file<\/li>\n<li>Replace file<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-4\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 4<\/a><\/p>\n<ul>\n<li>Scheduled tasks<\/li>\n<li>Services<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-5\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 5<\/a><\/p>\n<ul>\n<li>DLL\u2019s<\/li>\n<li>Handles<\/li>\n<li>Parent process<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 6<\/a><\/p>\n<ul>\n<li>ADS<\/li>\n<li>Rootkits<\/li>\n<li>Fileless infections<\/li>\n<\/ul>\n<p>Part 7<\/p>\n<ul>\n<li>Tools to investigate with<\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/07\/adware-the-series-the-final-tools-section\/\">Adware the series, the final: Tools section<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/07\/adware-the-series-the-final-tools-section\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 19 Jul 2017 15:00:46 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/puppum\/2017\/07\/adware-the-series-the-final-tools-section\/' title='Adware the series, the final: Tools section'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_95920150.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The final episode of our adware series talks specifically about the tools that we use in identifying adware and the places where it lurks on a system.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/puppum\/\" rel=\"category tag\">PUP<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fileassassin\/\" rel=\"tag\">FileASSASSIN<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/frst\/\" rel=\"tag\">frst<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pieter-arntz\/\" rel=\"tag\">Pieter Arntz<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/process-explorer\/\" rel=\"tag\">process explorer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/resource-monitor\/\" rel=\"tag\">Resource Monitor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rootkit\/\" rel=\"tag\">rootkit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/the-more-you-know\/\" rel=\"tag\">the more you know<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tools\/\" rel=\"tag\">tools<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/puppum\/2017\/07\/adware-the-series-the-final-tools-section\/' title='Adware the series, the final: Tools section'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/07\/adware-the-series-the-final-tools-section\/\">Adware the series, the final: Tools section<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,13088,13089,10523,12216,10566,13090,11002,10524,13091,10833],"class_list":["post-8385","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-fileassassin","tag-frst","tag-pieter-arntz","tag-process-explorer","tag-pup","tag-resource-monitor","tag-rootkit","tag-the-more-you-know","tag-tools","tag-trojan"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8385"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8385\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8385"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}