Operating system and security Cleaning viruses
Transcription
Operating system and security Cleaning viruses
Faculty of Science and Bio-engineering Sciences Operating system and security Cleaning viruses Titularis : Prof. Dr. Martin Timmerman Students : Seyed Pejman Sajjadi Date : January 2th, 2012 Rolnr. 98519 Table of Contents What is computer malware?......................................................................................................................... 3 What is a computer virus? ............................................................................................................................ 3 Virus propagation: ........................................................................................................................................ 4 Virus classification:........................................................................................................................................ 5 Virus replication: ........................................................................................................................................... 7 Virus payload: ............................................................................................................................................... 7 Virus concealment strategies:....................................................................................................................... 8 Protection from viruses and other malware:.............................................................................................. 11 Detection methods: .................................................................................................................................... 12 Static Detection Methods: ...................................................................................................................... 12 Dynamic Detection Methods: ................................................................................................................. 13 Practical example: ....................................................................................................................................... 14 1. USB_vlad Trojan: ............................................................................................................................. 14 2. Aadrive Trojan: ................................................................................................................................ 17 3. Dropper.generic.baby Trojan .......................................................................................................... 19 4. Virus:Win32 Virus: .......................................................................................................................... 22 Conclusion: .................................................................................................................................................. 31 Appendix: .................................................................................................................................................... 32 List of famous viruses:......................................................................................................................... 32 Bibliography ................................................................................................................................................ 34 What is computer malware? Computer Malware which is the short for “malicious software” are computer programs designed for the sole purpose of damaging and gathering information, exploiting privacy or gaining unauthorized access to system resources, without the owner’s awareness or intervention. Malware is a general term and it covers all different types of threats to computers such as Computer Viruses, Worms, Trojan Horses and etc. What is a computer virus? A computer virus which is a category of computer malware simply speaking is: “a computer program that can replicate itself and spread from one computer to another” (computer virus, 2011). This characteristic of replication is what makes a virus distinct from other computer malwares; keeping in mind that the significance of a computer virus is to replicate and spread, the term "virus" is wrongly realized and equalized to other forms of computer malware including Trojan horse, worms, root-kits and spywares . A real computer virus can spread from one computer to another when it is executed through some mean of sharing for example caused by sending over a local network or internet, or reaching the victim’s computer by any other mean. Computer malware includes computer viruses, computer worms, Trojan horses, most root kits (not all root kits are malwares), spyware, and some adware (not all adwares are malicious, some are legitimate). As mentioned above the term “virus” is usually misunderstood and then interpreted wrongly to cover all kinds of computer malware; Worms and Trojan horses, like viruses, may harm a computer system's data or performance and of course there are different types of worms and Trojans as well. To make a better distinction between these two terms, perhaps it is a good idea to define them as well, since we will be seeing more of these two terms in the “report of the practical” part of this documentation. A Trojan horse is a piece of software (normally malicious) hidden inside a harmless program. They way a Trojan horse works, is that it performs its malicious objective and then starts its host program (which is an ordinary program that the Trojan horse has attached itself to, and appears to be harmless). A Trojan horse does not replicate itself and does not infect other programs or files on the system; its damage is localized. Normally, deleting the host program eliminates the Trojan horse and solves the problem. A computer worm is a program that executes independently of other programs, replicates itself, and spreads through a network from computer to computer. The main difference between a worm and a virus is that a virus embeds itself in another file, whereas a worm doesn’t hide in another file and resides in the computer as an independent program. A computer virus is a usually a small computer program (usually in .exe format but there are various ways to mask it with different extensions and icon images) that injects its content into a host computer when it is executed, thereby infecting it; there are different approaches a virus can use to perform this infection. When the computer executes the virus code, it affects files on the computer basically in two different ways. One is the replication process which can be performed in various ways, and the second is some kind of destructive operation, for example damaging essential kernel files so the operating system cannot start. The combination of the two is what makes viruses distinct from other kind of malwares. “The idea of a program that replicates itself may have originated in the early days of computing, when programmers amused themselves by trying to write the shortest program that prints itself. Such programs have since been written in many programming languages.” The example here is in the C language. (D.Salomon, Virus classification, 2010) --------------------------------------------------------------------------------------------------------------Example: char*a="char*a=%c%s%c;main(){printf(a,34,a,34);}"; main() {printf(a,34,a,34);} ---------------------------------------------------------------------------------------------------------------- Virus propagation: A virus can propagate from file to file inside a computer and between different computers in various ways; some of these will be mentioned here: 1. Once a virus has infected a file on a computer, it will be re-executed each time the infected file is executed again; this way, at each execution the virus can look for an executable file that is not infected yet and infect it. It is only logical to assume that the chances of executing an infected file grows by each execution; This is one way that a virus propagates inside a computer and in this way all the executable files will get infected after some time. 2. Another method would be to use interrupts in the operating system. Some viruses they just copy themselves into the hard disk of a computer; but in order to infect a computer, the virus should be executed. This means that the CPU should be somehow directed to the virus file and executes it. one way to do this is for viruses to use interrupts, for example when an external device (a USB flash memory) is attached to the computer, the virus can be executed as part of the I/O interrupt handling routine and therefore infect the files on the external device. As we will discuss in this paper, we will realize that this method is quite dangerous since the virus can reside for some time in the computer until an interrupt is invoked. 3. Of course the most obvious way a virus can propagate to other system is by sharing a corrupted (infected) file. The virus writer may program an application that looks like something useful and harmless (a scientific calculator, a music player, etc.), embed a virus or a Trojan horse in it, and then share it over a local network or internet. When someone downloads and executes this program they will unconsciously execute the malicious part as well and usually they do not see any immediate effect since the host program is still performing its original operation. This way the virus can replicate inside the victim’s computer and later infect other files within the same computer and over the network. This is one way of propagation from one computer to another. 4. Perhaps nowadays the most probable way to get infected by a virus in through internet, downloading a virus which masks itself as a harmless file, is one way but some very famous viruses propagated using email attachments. Even though this method uses the same technique as above for propagation (over a network) but since it is very popular, I will mention it as a separate point. A virus writer can send a virus in various forms (such as an image file) as an attachment inside an email and send it to thousands of recipients. A famous example for this kind of infection is the “I love you!” virus which was an email attachment and automatically forwarded the message to the entire address book of all its recipients. To sum up the propagation, we can say that viruses propagate inside a computer by execution and between computers through sharing; this is sharing resources such as files, libraries and etc (over a network or other medium like USB drives or external hard disks). When a program is written, a virus may be embedded (hided) as part of the program in it by the programmer, and then spread when it is executed. It is also probable that updating or modifying a file infects it, if it is done by an illegitimate party. (D.salomon, Virus propagation, 2010, pp. 49-51) Virus classification: The classification of viruses in this section is based on their infection strategy. A virus can be a boot sector infector, a file infector, an email virus, or a macro virus. Combination of the above is also possible. 1. A File infector virus attaches itself to an executable file (this is normally referred to as a host file) and is executed when the host file is executed. There are different ways that file infector viruses attach themselves to the host program. Few of those are listed here: A shell virus forms a shell around the original program. A non-overwriting virus appends its malicious code to the host program and performs some modification to make sure that the virus is executed each time the host program is being executed. The infected program is therefore modified a little, but it still can be executed and perform its intended task without raising any suspicion. As it is obvious from its name, an overwriting virus overrides the code in some parts of the host program (usually deleting them and replace the virus code) so when the program is executed, it will perform its job incompletely and then the virus is executed and since the program is incomplete it will crash. An intrusive virus is somehow similar to the overriding virus; the difference is it replaces a procedure of the host program with another one, for example an interrupt-handling procedure. A simple virus which is part of a host program selects a candidate file each time it is executed for infection, and infects it by overwriting some part of it. When the candidate file is executed later on, as expected the virus is executed and the candidate crashes because it has been damaged. The original virus (which now has more than one host files) remains in the system and infects more candidates. 2. A boot sector virus embeds itself in the boot sector part of a disk (either removable or not), and therefore resides in the memory when the computer is booted from the disk (if the disk is bootable) or when the removable disk (e.g a DVD) is inserted into a disk drive and is read. The virus is in memory while the computer is turned on, so it can infect any newly inserted disk in the computer. This type of virus can propagate only when a removable device which has a boot sector virus is being moved from computer to computer. Most decent antivirus programs perform a boot sector scan. 3. A multipartite virus is a combination of boot infectors and file infectors. In theory such a virus could be very effective and dangerous, and propagate really fast. However, in practice this type of virus is rarely seen because it is quite difficult to be designed and implemented. 4. A macro virus are programmed in micro languages, since some applications (namely Microsoft office) allows micro programs to be embedded in office file and then be automatically executed when the file is opened, micro viruses can use this strategy to infect computers. 5. An operating system virus is a virus that infects operating system files. This type of virus is potentially very dangerous and spreads quite fast since the operating system files are executed quite rapidly. If the mechanism for infection is to do over-writing to the files this means that some essential kernel files could be damaged and thus the operating system could not be booted. Another example of an operating virus could be a virus that embeds itself in the launcher, therefore it will be executed each time the user launches a program. 6. A general application virus is a form of virus that attaches itself to an application and is executed each time the infected application is executed. The propagation strength of such virus is from one point of view high since users tend to share application files. However inside a computer the propagation rate is relatively mush lower that operating system viruses for instance since application files are only executed by users and there is chance that an application does not get executed for some time. (D.Salomon, Virus classification, 2010) Virus replication: A computer virus is a computer program. Therefore it is not a complicated task to write the program in way that it copies a set of instructions over and over. so an active virus in the memory can create copy of itself and save it as a file on the disk and then attach this file (in different ways like appending, over writing and etc) to a host file, therefore infecting other files on the system or even send this infected file as an attachment inside an email to hundreds of recipients (without the user not knowing that the file being attached is infected) when it is executed. As mentioned before viruses can also use I/O interrupts to infect removable devices such as USB flash memories and thus infect other computers. This “fast replication” characteristic of viruses makes it quite difficult to delete them manually. The replication rate for some viruses are sometimes so fast that thinking about deleting the infected files manually would be almost an impossible task. (D.Salomon, Virus classification, 2010) Virus payload: The payload is the main destructive and malicious operation a virus performs. It is performed when the virus is executed. Followings are various types of destructive operations that viruses can perform: The virus may do “nothing”; this can happen when the virus is simply not written for the version of the operating system it resides in. this can make the virus ineffective since the instructions of the virus do not work in its environment. It may want to gain access to a sensitive or private file to read its content. So each time the operating system is started it will check to see if the current user has for instance the “read” privilege for that specific file or not. Such a virus is in fact a spyware. It may slow the computer down by extensive use of limited resources. Such viruses may use large quantities of CPU power by executing loops that do nothing. Another side effect of resource abuse could be extensive replication and thus occupy large portions of memory or the disk. It may slow down a connection by endlessly sending messages. It may cause system crashes and other kind of problems, and in general annoy the user rather than damaging the data. A virus of this type does not attach itself to other files and is referred to as a “rabbit”. It may completely destroy all the services and functionalities given to the user by the operating system. It will infect all the files on the system so each time the user starts the operating system, (depending on the operations of the virus) it may go to an infinite loop and since all the files are infected therefore the virus is executed again and causes system crash. It may cause serious damage such as deleting files from the host computer. There are variants of this kind of damage; sometimes a virus renames the files as well. Usually this sort of damage is reparable if the user keeps regular backups. The virus may replicate itself and create copies in a stealth mode until a certain date, and then it makes itself known by executing and doing damages. This kind of viruses are referred to as time- bomb viruses and they are quite dangerous, because all the backups prior to the execution of the virus actually DO include the virus! The “Michelangelo” virus is a well-known example of this type. It may choose a file at random and then change some bits in that file again randomly. This type of damage, referred to as “data diddling”. This type of destructive operation is relatively dangerous because the errors caused by these damages might indicate a hardware failure. It may randomly delete files from an operating system. Usually most modern operating system maintains a history of modifications to the files. A virus may search for the files that have not been modified recently and then delete it. a file that was not modified recently implies that the file has not been used for some time. Therefore this type of destructive operation is potentially quite harmful since there might be some time before the user realizes that a file has been deleted. The virus may replicate itself very fast in a network, and thus consume most of the network resources and therefore deny services to users. Read-Only. The user can only read the file. Or the users can only write to the files but not read them. Or neither is possible but the user can still execute the files. (D.Salomon, Virus classification, 2010) Virus concealment strategies: Recovering from a virus can be a time consuming and annoying process. In some cases the only practical solution would be to re-install the operating system even if the virus is identified and the files responsible for causing the problems are deleted. This is due to the fast replication characteristic of computer viruses; however, most of the times it is quite difficult to identify viruses as they employ different strategies to conceal themselves from antivirus software. Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them. Different concealment methods which are taken from different resources are listed as follow: No concealment: as it appears from its name, no effort is taken to conceal the virus, therefore detection of it is fairly an easy task for an anti-virus software or for expert users who intend to detect it manually. Encryption: this strategy is based on encrypting the virus body including its infection, trigger, and payload, so it would become harder to detect. This "encryption" is not in the “cryptography encryption” sense. Virus encryption actually means obfuscation (creating confusion in understanding). When the virus is encrypted it is not runnable until it gets decrypted. What executes first in the virus, then, is a decrypter loop, which decrypts the virus body and transfers control to it. The idea in this concealment strategy is that the decrypter loop is small compared to the virus body, and thus makes it difficult for antivirus software to detect it as malicious. Figure 1 There are varieties of encryption; here I will merely mention the names of these different types which go as follow: simple encryption, static encryption key, variable encryption key, substitution cipher and strong encryption. For more detail on these approaches, one can always refer to the references. Stealth: the idea of the stealth is to not just hide the virus body but the infection itself. A stealth virus tries to hide from everything, not just antivirus software. Some examples of stealth techniques are below: An infected file's original timestamp can be restored after infection, so that the file doesn't look freshly-changed. The virus has the capability of regenerating all the information prior to the infection about a file. For example: timestamp, file size, and the file’s contents. Hiding inside a boot loader. There are two kinds of boot loaders (primary and secondary) the secondary boot loader are saved in some systems as consecutive disk blocks, to make the tasks for primary boot loader simpler. The secondary boot loaders can be viewed as a file in the filesystem. A virus can insert itself into the secondary boot loader’s blocks and then relocate the original block to somewhere else in the system. This results in that the filesystem view shows no obvious changes, but the virus is hidden and gains control over the real primary boot loader. Oligomorphism: An oligomorphic virus is an encrypted virus which has a small, finite number of different decrypter loops that can be used. The virus selects a new decrypter loop from this pool for each new infection. In terms of detection, oligomorphism makes a virus only a little bit more difficult to be spotted by an antivirus. Since the antivirus software will get familiar with the decrypter loop the virus uses, the viruses changes this each time it is executed. However, the antivirus software can have all of the virus’s possible decryptor loops listed, and look for them all. Polymorphism: A polymorphic virus is almost the same as an oligomorphic virus. They are both encrypted viruses and they both change their decrypter loop on each infection. The difference is that a polymorphic virus has an infinite number of decrypter loop variations. The virus “Tremor” for example, has almost six billion possible decrypter loops. Obviously Polymorphic viruses cannot be detected by antivirus software by listing all the possible combinations. Avoiding bait files: some viruses are programmed not to infect host files that are known to be part of anti-virus software because of the integrity check that exists in most antivirus software and therefore the virus would be detected fast. Another type of host that viruses usually avoid to infect is bait files. Bait files (or goat files) are files that are specially created by antivirus software to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus. Self-modification: the idea in the concealment strategy is that the virus modifies the code so each time there is a new variant of the virus; this is done so the signature based detection method used by antivirus applications cannot detect the “similar” pattern of that virus or that family of virus. However, this only makes the detection a bit more difficult but certainly not impossible. Metamorphic code: to avoid detection some viruses rewrite themselves completely each time they infect new executable files; this method is called metamorphic. A metamorphic engine is needed to perform this. A metamorphic virus is usually very large and complex. For example, W32/Simile consisted of over 14000 lines of Assembly language code, 90% of which is part of the metamorphic engine. (computer virus, 2011) (D.salomon, Virus hiding methods, 2010) (Aycock, 2006) Protection from viruses and other malware: Removing computer malwares and specially viruses can be a tedious and time consuming task. However there are good means of protection against infections. Perhaps the easiest steps to protect against computer malwares could constitute the followings: 1. Installing an antivirus application on the computer. 2. Configuring the antivirus application to perform scheduled scans and maintain the application’s signature database up to date. 3. Use instant scanning of files being downloaded or saved on the computer by the antivirus program. A relevant question that could be asked at this point is: what an antivirus is and what does is it does exactly? Antivirus programs are the most effective means of protection against computer malwares. But it is important to mention that there are no antivirus programs guaranteeing 100 percent protection against malwares. Such antivirus application simply do not exist because for each antivirus algorithm it is always possible to suggest a virus counter algorithm that makes a particular virus invisible to a particular antivirus. Moreover, the impossibility of the existence of the absolute antivirus has been mathematically proved based on the theory of finite slot machines the author of this proof is Fred Cohen1. 1. The most commonly used method by antivirus applications is using a list of virus signature definitions or simply speaking having a database of known viruses and compare it against the files on the system mostly the contents in RAM and boot sectors and other files store in non-volatile memory. As one can logically deduce, this approach is not full proof since the system is immune only from known viruses that exist in the signature database. 2. The other approach would be to use heuristic analysis, which is looking for similar patterns that exist among viruses. This method is mostly used to detect viruses that are yet classified or inserted into a signature database. The behavior of a certain virus or a family of viruses can be detected in this method. 3. Some antivirus applications provide “on the fly” scan as well which can better help protecting the system than scanning the entire computer once in a while. Anti-virus software also needs to be regularly updated in order to recognize the latest threats. (Antivirus software, 2011) One may also minimize the damage done by viruses by making regular backups of data. 1 Frederick B. Cohen (born 1957) is an American computer scientist and best known as the inventor of computer virus defense techniques. Detection methods: Static Detection Methods: Static detection method uses pattern recognition to identify viruses based on certain characteristics after proper analysis without actually executing the virus code, some of these methods are follow: • String Scanning method: Search for a sequence of bytes that are common to a virus and are not likely to be found in other programs. • Wildcards method: allows skipping bytes or byte ranges. For example "?" character are skipped and the wildcard % means that the scanner will try to match the next byte. • Mismatches method: allows any given number of bytes in a string to be of arbitrary value, regardless of their position. • Generic Detection method: This technique uses one common string to detect several or all known variants of a family of viruses. • Bookmarks method: calculates the distance between the start of the virus body and the detection string. • Smart Scanning: Smart scanning could skip junk instructions, such as NOPs, in the host file and also did not store them in the virus signature. To enhance the likelihood of detecting related variants of viruses, an area of the virus body was selected which had no references to data or other subroutines. • Skeleton Detection: The scanner parses the statements of the virus line-by-line and drops all nonessential statements. What is left is the skeleton of the body that has only essential macro code common in macro virus. • Heuristics Analysis: Heuristic analysis is an expert based analysis that determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods. MultiCriteria analysis (MCA) is one of the means of weighing. • Virus specific detection: There are cases when the standard algorithm of the virus scanner cannot deal with a virus. In cases like this, a new detection code must be introduced to implement a virus-specific detection algorithm. This method includes Filtering, Decrypter Detection and X-Ray scanning. (Essam Al Daoud, 2008) Dynamic Detection Methods: In contrast to static detection, dynamic method evaluates a file to be infected or not by executing it. The antivirus program looks for known methods for infection and detection avoidance. As it was mentioned before most virus activity eventually need to direct the CPU to itself to actually execute the virus, to do so they use other operations like interrupt handlers for I/O. even though these calls are somehow unclear, when they are executed they will become apparent and detectable. There are several methods for dynamic detection which are mentioned as follow: • Opening an executable, with both “read” and “write” permission. • Reading the portion of the file header containing the executable's start address. • Writing the same portion of the file header. • Seeking to the end of the file. • Appending to the file. Some antivirus programs have a feature called “behavior blocker” that will monitor the behavior of the application while it is working and will terminate or quarantine the operation if it suspects it to be harmful and dangerous. Most antivirus tools run the suspected files on a sand box for testing to see if they are malicious or not. This way the safety of the system is intact Detection Methods have some major problems: 1. They are only good against known viruses and not very good against evolutionary or new viruses. 2. They tend to take a noticeable amount of time to scan a system or networks for the patterns. 3. A scanner or its virus pattern database must be updated very often to remain effective. (Essam Al Daoud, 2008) To conclude this section, it’s perhaps a good idea to suggest a few good free tools for malware detection and removal. I would personally suggest the combination of the following tools in which all are free and quite effective. Tdsskiller, Gmer, Hijackthis, Autoruns, Process Explorer, MalwareBytes, AVG antivirus. Practical example: Disinfecting operating systems from malware, especially viruses are a troublesome and time consuming task. If the idea is to do the mentioned manually it will become even more difficult since the person trying to accomplish the mentioned has to have a great knowledge both about the operating system (the file systems and …) and the malware itself. In order to accomplish this section, I have downloaded a few computer malware, some of which are pure viruses and some are combination of viruses, Trojans and etc. I have executed them on my virtual machine and observed the results. Here I will give a few examples of these malwares and the procedure I went through to delete them. In order to do so, I have used different tools and applications to disinfect the operating system. 1. USB_vlad Trojan: I downloaded a malware called “USB_vlad”. This malware was programmed with C++, and it creates a process with the name “raidhost”. It is a trojan horse and downloads more malware into the victim’s computer. After executing the Trojan, the mentioned process was created and was observable. Figure 2 This process creates a registry entry with the same name in the path: “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run] “ Figure 3 In order to remove this Trojan, I could take two approaches, one would be to kill the process, delete the file created by the process in its location and then delete the mentioned registry entry; the second approach would be to use a single strong anti-virus with additional cleaning tools, or use a combination of different tools (anti-viruses, registry cleaners and etc.) to create the same effect. Just to show how dangerous this thread is rated by AVG anti internet security suite, I have chosen the second approach to delete this malware; of course the first choice is valid and quite practical. As it is apparent in the picture below, the risk level of this threat is quite high. Figure 4 Figure 5 It’s noticeable that just removing the threat does not clean the registry entry of the malware, however without the existence of an executable file; the existence of the registry entry is useless. Using the pc analyzer tool of AVG internet security suite, I have scanned for registry errors and the result was as follow: Figure 6 This is the log for the registry analysis; it is noticeable that the registry for our Trojan is detected and removed. Figure 7 2. Aadrive Trojan: For the second example, I infected my operating system with a Trojan called “aadrive”. This Trojan creates a file in the windows folder called “aadrive32.exe”. On start up, a cmd window will pop up and the CPU usage will reach and stay 100%. Figure 8 This Trojan downloads a lot of file off internet and stores some of them in system32 folder and consumes a lot of internet speed. It also runs at startup as it appears on the screen shot below: Figure 9 One key feature of this Trojan is that it restricts access to antivirus websites, after getting infected I was able to access any website except for ones regarding an antivirus. Even after manually deleting the “aadrive32.exe” the effects of the malware are not completely gone, I could have access to antivirus websites, but still the connection speed was awfully low and I could not track the registry entry for this Trojan. I had to use an antivirus to get rid of this malware. Even though I deleted the file manually, the antivirus still detected a threat with the same exact name “aadrive.exe” and removed it. Figure 10 3. Dropper.generic.baby Trojan For the third example I have downloaded a Trojan which I don’t know the exact name of. It is named as setup.exe in the source I got it from. After opening the file, I got an error saying that the file could not be opened. In less than 30 seconds the CPU usage exceeded 100 percent, and the theme of the windows changed to basics and the internet connection was lost. Figure 11 After rebooting the operating system, the following message was shown. Figure 12 As it appears from the screen shot above, the hal.dll file is removed. Windows Hardware Abstraction Layer (HAL), a file that hides hardware complexities from Windows applications. hal.dll is a system process that is needed for your Windows system to work properly. This problem could be solved my using a windows installation CD to copy the missing file, perhaps a better option would be to run a virus scan on the disk before restoring the missing file, this could be done using various tools, I would personally use “Trinity Rescue Kit” which has an anti virus that can be used to scan the disk and get rid of the malwares, however even after fully scanning the disk and resting the OS some feature were gone including the shutdown and restart button. Out of curiosity I executed this malware again on a new operating system to see if it creates the same effect, and amazingly it did not. The preliminary effects were the same (no internet connection, errors and change in theme) however after rebooting the system; the missing hal.dll file error was not shown. But the OS kept its previous state with the same error message shown as the one when I executed the file for the first time, this time I killed the processes related to it and the theme did not change and CPU usage remained normal and once again I had access to internet. So I installed an anti virus and it detected a Trojan horse called “Dropper.generic.baby” and was able to remove it completely, and the system was once again safe but still some features were gone including shutdown and restart. I could not find a decent solution to this malware. Perhaps re-installing the windows could be the only option. I tried to analyze this Trojan to see how it works, it turned out that it’s a famous Trojan and has so many aliases; the following analysis is taken from threatexpert website: Memory Modifications There were new processes created in the system: Process Name Process Filename Main Module Size [filename of the sample #1] [file and pathname of the sample #1] 73,728 bytes svchost.exe c:\svchost.exe 73,728 bytes System.exe %System%\system.exe 73,728 bytes Note: o %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP). The following system services were modified: Service Display Name Name New Status ALG Application Layer Gateway Service "Stopped" %System%\alg.exe AudioSrv Windows Audio "Stopped" %System%\svchost.exe -k netsvcs Dhcp DHCP Client "Stopped" %System%\svchost.exe -k netsvcs Service Filename SharedAccess Windows Firewall/Internet Connection Sharing (ICS) "Stopped" %System%\svchost.exe -k netsvcs Themes Themes "Stopped" %System%\svchost.exe -k netsvcs WebClient WebClient "Stopped" %System%\svchost.exe -k LocalService wscsvc Security Center "Stopped" %System%\svchost.exe -k netsvcs Registry Modifications The following Registry Keys were created: o o o o o o o o o o o o o o o o o o o o o HKEY_LOCAL_MACHINE\SOFTWARE\Microsaft HKEY_LOCAL_MACHINE\SOFTWARE\Microsaft\Windows HKEY_LOCAL_MACHINE\SOFTWARE\Microsaft\Windows\CurrentVersion HKEY_LOCAL_MACHINE\SOFTWARE\Microsaft\Windows\CurrentVersion\Run HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AVP HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ekrn HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NOD32krn HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AVP HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ekrn HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NOD32krn HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet001 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet001\Services HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet001\Services\AVP HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet001\Services\ekrn HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet001\Services\NOD32krn HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet002 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet002\Services HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet002\Services\AVP HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet002\Services\ekrn HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet002\Services\NOD32krn HKEY_CURRENT_USER\z: The newly created Registry Values are: o [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] (Default) = "[file and pathname of the sample #1]" egui = "" so that [file and pathname of the sample #1] runs every time Windows starts o [HKEY_LOCAL_MACHINE\SOFTWARE\Microsaft\Windows\CurrentVersion\Run] AVP = "" o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AVP] o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ekrn] ImagePath = "" ImagePath = "" o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NOD32krn] o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AVP] ImagePath = "" ImagePath = "" o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ekrn] o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NOD32krn] o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet001\Services\NOD32krn] o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet001\Services\ekrn] ImagePath = "" ImagePath = "" ImagePath = "" ImagePath = "" o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet001\Services\AVP] o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet002\Services\NOD32krn] ImagePath = "" ImagePath = "" o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet002\Services\ekrn] o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet002\Services\AVP] o ImagePath = "" [HKEY_CURRENT_USER] o ImagePath = "" NoDrives = 0x00000000 NoRun = 0x00000000 NoViewOnDrive = 0x00000000 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoLogOff = 0x00000001 NoFolderOptions = 0x00000001 NoClose = 0x00000001 to prevent users from logging off and remove all menu items and buttons that log the user off to remove the Folder Options item from all Windows Explorer menus and from Control Panel o [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] o [HKEY_CURRENT_USER\z:] Lord4u = "%System%\Explorer.exe" NoDrives = 0x00000000 NoRun = 0x00000000 NoViewOnDrive = 0x00000000 4. Virus:Win32 Virus: For the fourth example, I have infected my operating system with a virus which is called Virus:Win32, and is know with many other aliases, after the infection I have uploaded the virus to the http://www.virustotal.com/ and after analysis of the file, Virustotal detected the file as a virus with the mentioned name. The followings are the characteristics of the mentioned virus which are taken from Microsoft’s website: Aliases: Win32/Virut.F (AhnLab) W32/Virut.AI!Generic (Command) W32/Virut.gen (Avira) Win32.Virtob.Gen.12 (BitDefender) Win32/Virut.17408 (CA) Win32.Virut.56 (Dr.Web) Win32/Virut.NBP (ESET) Virus.Win32.Virut.ce (Kaspersky) W32/Virut.n.gen (McAfee) W32/Virut.CX (Norman) W32/Sality.AO (Panda) Win32.Virut.cl (Rising AV) W32.Virut.CF (Symantec) PE_VIRUX.J-2 (Trend Micro) Description: Virus:Win32/Virut.BN is a detection for a polymorphic file infector that targets .EXE and .SCR Windows files. This virus also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer. Symptoms: There are no common symptoms associated with this threat. Alert notifications from installed Antivirus software may be the only symptom(s). Technical Information (Analysis): Virus:Win32/Virut.BN is a detection for a polymorphic file infector that targets .EXE and .SCR Windows files. This virus also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer. Spreads via: Executable File Infection: Win32/Virut.BN disables Windows System File Protection (SFP) by injecting code into the Windows process "winlogon.exe". The injected code patches the system file "sfc_os.dll" in memory which in turn allows the virus to infect files protected by SFP. The virus infects .EXE and .SCR files on access, hence actions such as copying or viewing files with Explorer, including on shares (with write access) will result in files being infected, and the virus spreading from machine to machine. The virus injects its own code into a system process such as "explorer.exe" or "winlogon.exe", and hooks low-level (NTDLL layer) Windows API calls in order to stay in memory. It hooks the following functions in each running process (NTDLL.DLL): NtCreateFile NtOpenFile NtCreateProcess NtCreateProcessEx Thus, every time an infected process calls one of these functions, execution control is passed to the virus. HTML File Infection: It writes code to HTML files that adds a hidden IFrame pointing to the domain "zief.pl". When the HTML file is opened, the browser connects to this server without the user's knowledge. The HTML page hosted at this location attempts to exploit a number of different vulnerabilities (including those affecting the user's browser and other applications) in order to run a copy of the virus. These modified HTML files are detected as Virus:HTML/Virut.BH. The virus also modifies the local machine's hosts file, redirecting the domain "zief.pl" to localhost (127.0.0.1) so that already-infected machines will not run the remotely-hosted copy of the virus. Payload: Backdoor Functionality: Virut.BN connects to Internet Relay Channel (IRC) server "irc.zief.pl" via port 80 using a particular channel. Should this fail, it instead attempts to connect to " proxim.ircgalaxy.pl" also using port 80. It contains functionality to download and execute arbitrary files on the affected system. This may include additional malware. The backdoor can also be used to change the host that it connects to for control. Registry modifications: The newly created Registry Values are: o [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings] o [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] ProxyEnabled = "FALSE" Microsoft Windows Update Client = "%Windir%\services.exe" so that services.exe runs every time Windows starts o [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer] o [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings] o [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows] UpdateHost = 00 50 5E 3F 95 96 ProxyEnable = 0x00000000 Run = "%Windir%\services.exe" so that services.exe runs every time Windows starts The following Registry Values were deleted: o [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] o VMware User Process = "%ProgramFiles%\VMware\VMware Tools\VMwareUser.exe" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] VMware Tools = "%ProgramFiles%\VMware\VMware Tools\VMwareTray.exe" MSMSGS = ""%ProgramFiles%\Messenger\msmsgs.exe" /background" The following Registry Value was modified: o [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders] Cookies = Cache = History = After the infection, I rebooted my operating system expecting the virus to have made its effects. I installed the free version of “avira” antivirus and started scanning my system. Right after installing avira I got notifications that my OS is infected with a virus called “w32/virut.gen Figure 13 After finishing the scan, avira reported 81 detections of the same virus. Figure 14 It was very interesting to see that this virus affected 81 different files in “boot sector” and some “executable file”. The addresses of the infected files are reported by avira antivirus. Start of the scan: Wednesday, January 04, 2012 16:43 Starting master boot sector scan: Master boot sector HD0 [INFO] No virus was found! Start scanning boot sectors: C:\WINDOWS\system32\ieudinit.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\inf\unregmp2.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\ie4uinit.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\shmgrate.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\regsvr32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Outlook Express\setup50.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\help.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\setup.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\Network Diagnostic\xpnetdiag.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\sessmgr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\rdpclip.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\cmd.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\userinit.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\logonui.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\logon.scr [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\ntsd.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\ctfmon.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\control.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\dllhost.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\mmc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\mshta.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\notepad.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\magnify.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\narrator.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\osk.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\utilman.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Outlook Express\wab.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\cmd.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Windows Media Player\wmplayer.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\NOTEPAD.EXE [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\mobsync.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\tourstart.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Outlook Express\msimn.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\rcimlby.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\accwiz.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\calc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\fsquirt.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Windows NT\hypertrm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus Starting to scan executable files (registry). C:\WINDOWS\system32\wbem\wmiapsrv.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\vssvc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\ups.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\tlntsvr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\smlogsvc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\scardsvr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\rsvp.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\locator.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\netdde.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\msiexec.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\msdtc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\mnmsrvc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\dmadmin.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\clipsrv.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\cisvc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\wupdmgr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Movie Maker\moviemk.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\spider.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\sol.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Windows NT\Pinball\PINBALL.EXE [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\winmine.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\MSN Gaming Zone\Windows\shvlzm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\MSN Gaming Zone\Windows\Rvsezm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\MSN Gaming Zone\Windows\hrtzzm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\MSN Gaming Zone\Windows\chkrzm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\MSN Gaming Zone\Windows\bckgzm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\mshearts.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\sndrec32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\sndvol32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\mspaint.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\mstsc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\ntbackup.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\charmap.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\cleanmgr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\usmt\migwiz.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\restore\rstrui.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Windows NT\Accessories\wordpad.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\odbcad32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\freecell.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\mshearts.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\MSN Gaming Zone\Windows\bckgzm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\MSN Gaming Zone\Windows\chkrzm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\MSN Gaming Zone\Windows\hrtzzm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\MSN Gaming Zone\Windows\Rvsezm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\MSN Gaming Zone\Windows\shvlzm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\winmine.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Windows NT\Pinball\PINBALL.EXE [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\sol.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\spider.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\Program Files\Movie Maker\moviemk.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\control.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\wupdmgr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\cisvc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\clipsrv.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\dmadmin.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\mnmsrvc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\msdtc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\msiexec.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\netdde.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\locator.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\rsvp.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\scardsvr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\smlogsvc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\tlntsvr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\ups.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\vssvc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus C:\WINDOWS\system32\wbem\wmiapsrv.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\freecell.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\odbcad32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Windows NT\Accessories\wordpad.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\restore\rstrui.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\usmt\migwiz.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\cleanmgr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\charmap.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\ntbackup.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\mstsc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\mspaint.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\sndvol32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\sndrec32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Windows NT\hypertrm.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\fsquirt.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\calc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\accwiz.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\rcimlby.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Outlook Express\msimn.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\tourstart.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\mobsync.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Windows Media Player\wmplayer.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Outlook Express\wab.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\utilman.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\osk.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\narrator.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\magnify.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\notepad.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\mshta.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\mmc.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\dllhost.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\control.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\ctfmon.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\ntsd.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\logon.scr [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\logonui.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\userinit.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\cmd.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\rdpclip.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\sessmgr.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\Network Diagnostic\xpnetdiag.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\setup.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\help.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\Program Files\Outlook Express\setup50.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\regsvr32.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\shmgrate.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\ie4uinit.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\inf\unregmp2.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! C:\WINDOWS\system32\ieudinit.exe [DETECTION] Contains code of the W32/Virut.Gen Windows virus [WARNING] The file was not repaired as requested! End of the scan: Wednesday, January 04, 2012 16:45 Used time: 01:52 Minute(s) As the virus was replicating so fast, after a few minutes the infected files were about 419. I asked the antivirus to do a system repair. In order to do that I had to restart my machine, but after rebooting I received an error saying “the end point format is invalid”. Even booting with safe mode brought up the same error. Figure 15 At this stage, there is not much one can do except for using rescue kits. I have downloaded a rescue kit called “trinity” and booted from there, this rescue kit has some interesting tools and features especially designed to detect and remove viruses. There are several anti viruses embedded in trinity rescue kit including, bitdefender, avira and Calm antivirus. I have used all of them to scan and disinfect my operating system. Figure 16 Even after deleting all the detected malwares by these anti viruses, I still could not have access to my OS and the same error appeared on start up. I decided to use bitdefender bootable rescue CD to scan and disinfect my computer. To make sure that all the traces of the virus will be gone I used Kaspersky bootable CD as well. Figure 17 Figure 18 Even after using two antivirus software and one rescue kit, my OS was not recovered. In my opinion some essential system files are damaged and deleting them, which are marked and recognized by anti viruses as virus, disabled me from recovering my OS. Perhaps the proper solution would be to re-install windows. Keep in mind that most the essential files and personal information can be copied using these rescue kits and then be used on a clean OS to get them disinfected and archived. This virus has no effect on windows vista and seven. Conclusion: In this paper we have seen the definition of a malware, and the differentiation between different forms of malwares. Since the main focus of the paper was on viruses, we have seen infection, replication, and detection strategies especially for viruses, based on the practical examples shown, one can conclude that some of the malwares are completely removable by different tools and the chances to recover the infected operating systems are fairly high, however as I have shown with another example, there are situations where reinstalling the operating system seems to be the only solution. To conclude this paper, the main objectives of the paper which was providing information to the readers about the sources of infections and tools and applications that can be used to recover from these situations were introduced successfully. Appendix: List of famous viruses: 1. Jerusalem - 1987 For the first time it was discovered in 1987 on October 1. The virus was dubbed Jerusalem because it was identified in a Hebrew university, but in 1991 antivirus experts found that Italy is the country were the first traces of the computer virus were noticed. Jerusalem is believed to be one of the oldest computer viruses in history, being able to infect both .EXE and .COM files. Initially the Jerusalem virus included a bug that led to a repeat infection of the files that continued until the size of the files overcome computer resources. In addition, each Friday 13 it deleted all programs in the infected system as a result of a malicious payload that set off on the respective day. Jerusalem considerably slowed down the machine. A person could identify the virus but noticing two lines on the monitor. 2. Morris (a.k.a. Internet Worm) - 1988 Previously at www.InfoNIAC.com we wrote about this computer worm, which is believed to be one of the first worms that spread over the Internet. The name of the virus comes from its developer Robert Tappan Morris, who was a student at Cornell University. The computer worm was set off on November 2, 1988 and after some time it managed to infect 6,000 to 9,000 machines. It overloaded the whole Internet, leading to the failure of a large number of servers. According to its developer, the goal was to discover just how far and fast a computer worm can spread all over the network. Robert Tappan Morris was found guilty and sentenced to 3 years of probation along with 400 hours of community service. In addition, he had to pay a $10,000 fine. 3. Barrotes - 1993 This is believed to be the first popular computer virus developed in Spain. As soon as it infected the system, it would remain there until January the 5th, when it would set off showing a series of bars on the screen. It infected .COM, .EXE and overlay files. The Barrotes computer virus represents a resident virus - it becomes a resident of the computer memory each time the machine starts up. Due to a series of vertical lines that appear on the monitor, it was easy to identify the virus. It could also overwrite the Master Boot Record of the HDD, thus making it impossible for the uses to access the hard disk. 4. Solar Sunrise - 1998 This is not the name of the computer virus; it is the name of the situation that occurred in 1998 when a team of hackers managed to take control of more than 500 computer system of the army, government as well as private sector of the United States. The name Solar Sunrise comes after the well-known vulnerabilities in machines that run on the Sun Solaris OS. At first the attack was believed to have been organized by hackers from Iraq, but later it was discovered that the ones to blame were two American youngsters from California. 5. CIH (a.k.a. Chernobyl) - 1998 Our list of the most dangerous computer viruses on the 20th century continues with CIH virus that caused an estimated damage of $20 to $80 million around the globe. After its launch, the computer virus managed to affect huge amounts of data stored on computers. Later it was discovered that the computer virus was launched in Taiwan. It has been recognized to be one of the most dangerous computer viruses in history. It infected Windows 95, 98, and ME executable files. In addition, CIH remained resident in the memory of the machine, being able to carry on infecting other executables. After being activated, the virus overwrote data on the HDD of the infected PC, making the latter inoperable. CIH could also overwrite the BIOS of the infected computer, thus preventing boot-up. The second name of the virus - Chernobyl - was given because some of the biggest damages occurred on the day when the nuclear reactor exploded. 6. Melissa - 1999 This computer virus managed to cause a damaged estimated between $300 and $600 million. The famous computer virus gained huge fame on March 26, 1999. Experts claimed that this computer virus managed to infect between 15 and 20 percent of all business PCs on the planet. Melissa virus spread so fast that a number of big companies, including Intel and Microsoft, that used Outlook, had to shut down their email systems to hold up the damage. The computer virus took advantage of Microsoft outlook to send email messages of itself to 50 names on the contact list of a user. The message in the email read: "Here is that document you asked for don’t show anyone else." It featured an attached Word document, which, when opened, unleashed the virus that infected the computer and then repeated the replication. When the virus was activated it changed Word documents by leaving quotes from the popular animated show "The Simpsons". 7. ILOVEYOU - 2000 Considered to be one of the most dangerous computer worms in history, ILOVEYOU was for the first time detected in Philippines on May 4. In just one day it spread worldwide, with about 10 percent of all Internet users being affected by the worm. ILOVEYOU also caused $5.5 billion damage. Its name comes from the subject of the email that a user received. The email included an attachment that said "LOVELETTER-FOR-YOU.TXT.vbs". When activated, the computer worm overwrote all files on the host, attacking a copy of itself to each file. In addition, the worm sent a copy of itself to everyone in a user's contact list. Bibliography Antivirus software. (2011, 12 21). Retrieved 12 29, 2011, from Wikipedia: http://en.wikipedia.org/wiki/Antivirus_software Aycock, J. (2006). Computer Viruses and Malware. Springer. computer virus. (2011, 12 14). Retrieved 12 24, 2011, from wikipedia: http://en.wikipedia.org/wiki/Computer_virus D.Salomon. (2010). Virus classification. In D.salomon, Elements of Computer Security (pp. 51-53). London: Springer. D.salomon. (2010). Virus hiding methods. In D.salomon, Elements of Computer Security (pp. 83-84). London: Springer. D.salomon. (2010). Virus propagation. In D.salomon, Elements of Computer Security (pp. 49-51). London: Springer. D.Salomon. (2010). Virus replication. In D.Salomon, Elements of Computer Security (p. 72). London: Springer. Essam Al Daoud, I. H. (2008). Computer Virus Strategies and Detection . 8.