{"id":8187,"date":"2017-06-28T08:10:44","date_gmt":"2017-06-28T16:10:44","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/28\/news-1963\/"},"modified":"2017-06-28T08:10:44","modified_gmt":"2017-06-28T16:10:44","slug":"news-1963","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/06\/28\/news-1963\/","title":{"rendered":"Adware the series, part 6"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 28 Jun 2017 15:00:13 +0000<\/strong><\/p>\n<p>In this series of posts, we will be using the flowchart below to follow the process of determining which\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/adware\/\">adware<\/a>\u00a0we are dealing with. Our objective is to give you an idea of how many different types of adware are around for Windows systems. Though most are\u00a0classified as\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/pup\/\">PUPs<\/a>, you will also see the occasional\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/trojan\/\">Trojan<\/a>\u00a0or\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/rootkit\/\">rootkit<\/a>, especially for the types\u00a0that are more difficult\u00a0to detect and remove.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17796 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart.png\" alt=\"flowchart adware\" width=\"609\" height=\"686\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart.png 609w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart-266x300.png 266w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/flowchart-533x600.png 533w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/p>\n<p>In this part of the series, we are going to have a look at types of adware that are very hard to find and remove. Luckily these are rare, but there are a few adware authors out there that are not afraid to swat a fly with an elephant gun. These hard to find and sometimes hard to remove types of malware, because that is what they are, even if their objective is \u201conly\u201d to show you advertisements, the methods they are using qualify them as malware, not as potentially unwanted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18458 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/hardtofind.png\" alt=\"hard to find malware\" width=\"91\" height=\"130\" \/><\/p>\n<h3>ADS<\/h3>\n<p>ADS is short for Alternate Data Streams. It\u2019s a feature on Windows NTFS systems where you can append any kind of data to a file using the $DATA attribute of the file. The convenient part for the adware author is that the regular user will not see the ADS attached to any file unless he uses some special tools or is familiar enough with <a href=\"https:\/\/blog.malwarebytes.com\/101\/2015\/07\/introduction-to-alternate-data-streams\/\" target=\"_blank\" rel=\"noopener noreferrer\">Powershell to hunt<\/a> them down. Another opportunity given to the (ab)users of ADS is the wide range of storage options. You can append a complete executable file or just a script that you can execute by feeding it as an argument to the proper program. If ADS were not technically considered files, using ADS in combination with a registry key for persistence, this method would qualify as a file-less infection. But at least they are hard to find and it can be used in very much the same way.<\/p>\n<h3>Rootkits<\/h3>\n<p>Where Alternate Data Streams are hard to find, rootkits are invisible even for the Operating System (Windows in our case). By definition, a Rootkit is a software that hides itself or another application. The name, however, is derived from the fact that a rootkit has administrator level access (Unix: root) for the system. While there are many tools around that can detect and remove rootkits, the consensus among experts is that a system that has been infected with a rootkit, should never be fully trusted and it\u2019s better to reformat the system drive and re-install the Operating System. This is harsh and some rootkits can be fully removed, but it is sound advice in many cases. You can find more information about the types of rootkits in our threat description \u201c<a href=\"https:\/\/blog.malwarebytes.com\/threats\/rootkits\/\" target=\"_blank\" rel=\"noopener noreferrer\">Rootkits<\/a>\u201d.<\/p>\n<h3>File-less infections<\/h3>\n<p>File-less infections come in <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/03\/fileless-infections-an-overview\/\" target=\"_blank\" rel=\"noopener noreferrer\">different forms and sizes<\/a>, but the ones we see most of the time in adware are encoded Powershell commands hidden in the registry. Famous examples are <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/11\/no-more-poweliks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Poweliks<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/07\/untangling-kovter\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kovter<\/a>. Another file-less infection we have seen in use was the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/10\/explained-wmi-hijackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">WMI hijacker<\/a>, that used Windows Management Instrumentation to add a site as an argument to each browser shortcut it could find. Effectively making sure that the affected user was always hijacked to their search site.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18460\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MBAR.png\" alt=\"Malwarebytes Anti Rootkit\" width=\"647\" height=\"546\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MBAR.png 647w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MBAR-300x253.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MBAR-600x506.png 600w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/p>\n<h3>Malwarebytes Anti-Rootkit (beta)<\/h3>\n<p>If you run into any\u00a0of these hard to find and remove adware infections and Malwarebytes is unable to remediate them, please download our very special tool for these cases <a href=\"https:\/\/www.malwarebytes.com\/antirootkit\/\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes Anti-Rootkit BETA<\/a> or look in the <a href=\"https:\/\/forums.malwarebytes.com\/forum\/39-malware-removal-self-help-guides\/\" target=\"_blank\" rel=\"noopener noreferrer\">Malware Removal Self-Help Guides<\/a> section of our forums to see if we have posted a special removal guide for your problem. Malwarebytes Anti-Rootkit BETA will usually be able to install ad run when other tools are not and it will free the way for Malwarebytes to help you clean out the rest of the infection(s).<\/p>\n<h2>Index<\/h2>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 1<\/a><\/p>\n<ul>\n<li>Identify the process<\/li>\n<li>Clear browser caches<\/li>\n<li>Remove browser extensions<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 2<\/a><\/p>\n<ul>\n<li>Proxies<\/li>\n<li>Winsock hijackers<\/li>\n<li>DNS hijackers<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 3<\/a><\/p>\n<ul>\n<li>Type of software<\/li>\n<li>Uninstall<\/li>\n<li>Remove file<\/li>\n<li>Replace file<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/05\/adware-the-series-part-4\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 4<\/a><\/p>\n<ul>\n<li>Scheduled tasks<\/li>\n<li>Services<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-5\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 5<\/a><\/p>\n<ul>\n<li>DLL\u2019s<\/li>\n<li>Handles<\/li>\n<li>Parent process<\/li>\n<\/ul>\n<p>Part 6<\/p>\n<ul>\n<li>ADS<\/li>\n<li>Rootkits<\/li>\n<li>Fileless infections<\/li>\n<\/ul>\n<p>Up next, part 7<\/p>\n<ul>\n<li>Tools to investigate with<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Pieter Arntz<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/\">Adware the series, part 6<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 28 Jun 2017 15:00:13 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/' title='Adware the series, part 6'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/shutterstock_396506092-e1498053485696.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In this part of the series, we are going to have a look at types of adware that are very hard to find and remove, like ADS, rootkits, and file-less infections.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/puppum\/\" rel=\"category tag\">PUP<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ads\/\" rel=\"tag\">ads<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware-series\/\" rel=\"tag\">adware series<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fileless\/\" rel=\"tag\">fileless<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pieter-arntz\/\" rel=\"tag\">Pieter Arntz<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pups\/\" rel=\"tag\">PUPs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rootkit\/\" rel=\"tag\">rootkit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wmi\/\" rel=\"tag\">wmi<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/' title='Adware the series, part 6'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/\">Adware the series, part 6<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11533,12842,12843,10523,10566,2130,11002,10833,12844],"class_list":["post-8187","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ads","tag-adware-series","tag-fileless","tag-pieter-arntz","tag-pup","tag-pups","tag-rootkit","tag-trojan","tag-wmi"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8187"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8187\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}