Adware the series, part 6

Credit to Author: Pieter Arntz| Date: Wed, 28 Jun 2017 15:00:13 +0000

In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our objective is to give you an idea of how many different types of adware are around for Windows systems. Though most are classified as PUPs, you will also see the occasional Trojan or rootkit, especially for the types that are more difficult to detect and remove.

flowchart adware

In this part of the series, we are going to have a look at types of adware that are very hard to find and remove. Luckily these are rare, but there are a few adware authors out there that are not afraid to swat a fly with an elephant gun. These hard to find and sometimes hard to remove types of malware, because that is what they are, even if their objective is “only” to show you advertisements, the methods they are using qualify them as malware, not as potentially unwanted.

hard to find malware

ADS

ADS is short for Alternate Data Streams. It’s a feature on Windows NTFS systems where you can append any kind of data to a file using the $DATA attribute of the file. The convenient part for the adware author is that the regular user will not see the ADS attached to any file unless he uses some special tools or is familiar enough with Powershell to hunt them down. Another opportunity given to the (ab)users of ADS is the wide range of storage options. You can append a complete executable file or just a script that you can execute by feeding it as an argument to the proper program. If ADS were not technically considered files, using ADS in combination with a registry key for persistence, this method would qualify as a file-less infection. But at least they are hard to find and it can be used in very much the same way.

Rootkits

Where Alternate Data Streams are hard to find, rootkits are invisible even for the Operating System (Windows in our case). By definition, a Rootkit is a software that hides itself or another application. The name, however, is derived from the fact that a rootkit has administrator level access (Unix: root) for the system. While there are many tools around that can detect and remove rootkits, the consensus among experts is that a system that has been infected with a rootkit, should never be fully trusted and it’s better to reformat the system drive and re-install the Operating System. This is harsh and some rootkits can be fully removed, but it is sound advice in many cases. You can find more information about the types of rootkits in our threat description “Rootkits”.

File-less infections

File-less infections come in different forms and sizes, but the ones we see most of the time in adware are encoded Powershell commands hidden in the registry. Famous examples are Poweliks and Kovter. Another file-less infection we have seen in use was the WMI hijacker, that used Windows Management Instrumentation to add a site as an argument to each browser shortcut it could find. Effectively making sure that the affected user was always hijacked to their search site.

Malwarebytes Anti Rootkit

Malwarebytes Anti-Rootkit (beta)

If you run into any of these hard to find and remove adware infections and Malwarebytes is unable to remediate them, please download our very special tool for these cases Malwarebytes Anti-Rootkit BETA or look in the Malware Removal Self-Help Guides section of our forums to see if we have posted a special removal guide for your problem. Malwarebytes Anti-Rootkit BETA will usually be able to install ad run when other tools are not and it will free the way for Malwarebytes to help you clean out the rest of the infection(s).

Index

Part 1

  • Identify the process
  • Clear browser caches
  • Remove browser extensions

Part 2

  • Proxies
  • Winsock hijackers
  • DNS hijackers

Part 3

  • Type of software
  • Uninstall
  • Remove file
  • Replace file

Part 4

  • Scheduled tasks
  • Services

Part 5

  • DLL’s
  • Handles
  • Parent process

Part 6

  • ADS
  • Rootkits
  • Fileless infections

Up next, part 7

  • Tools to investigate with

 

Pieter Arntz

The post Adware the series, part 6 appeared first on Malwarebytes Labs.

https://blog.malwarebytes.com/feed/