Okay, sorry it has taken so long to get back to you folks. Things are going insane here at work. Below are the results of my testing on the original, purposely infected, test machine. Some of the beginning is already posted above, but the whole enchilada shown together gives a better idea of my procedures. This covers one of the 25 machines I am testing, but it is also the only one that I feel is a realtively thorough test. I will post additional results as I get them finished up.
I have also sent this and more to my Computer Associates Rep for him to pass on to their tech support. I'll let you know if there are any replies.
_________________________________
9-16-04
Test box (TS-DC-0001) is a rebuilt test server - 863 MHz processor, 512 MB RAM, running Server 2003. It has McAfee VScan Enterprise 7.0 managed through an ePO 3.0 agent. Up to date on Critical Updates, as well. Machine is freshly rebuilt from a newly formatted drive to eliminate any chance of old contamination.
Disabled ActiveX security settings in IE. Checked on Spybot S&D's restricted site list for some relatively innocuous sounding site names. Visited Gator.com & downloaded their free "software". Visited "0008k.com" (Boy was THAT one a mistake! Turned out to be an adult site. I'm sure I got red flagged in surf control on that one .) Visited "igetnet.com", 1800search.com", "accessthefuture.net", "ace-webmaster.com", "acemedic.com", and "hotbar.com". Clicked several search links on each site while watching my processes in taskmanager. Processor on the machine fluctuated between 2% and 100% during those visits.
Went to Pest Patrol test server & opened PPManagement Console, ran scan on the test machine & found 9 "pests", two of which were actually detections of UltraVNC, which I installed to run the test box remotely. The rest were nothing more than tracking cookies. Decided to leave the machine online overnight and checked it again this morning. Opened IE again & surfed to some of the same sites, clicking various links and bouncing around. Checked PP console and found several more cookies, of course, but nothing else.
Why is it our users have NO trouble completely hosing a pc accidentally, and I can't do it when I'm TRYING to?
9-17-04
Test 1 (TS-DC-0001) – the machine I built out intending to intentionally infest with spyware and hijackers. As stated above, I’ve had trouble finding a site with which I can “catch” anything other than basic adware or tracking cookies.
9-20-04
Went to a WareZ site trying to infect computer. Third one I tried wanted to load a special "downloader" tool. I ran it and my processes shot through the roof. Continued running for a few minutes and the machine prompted me to reboot. Rebooted and checked the system and found Wintools, DyFuCa, BlazeFind, and several others.
Let me point out that Pest Patrol's Active Protection was already enabled on the machine. This seems to indicate that a user's actions can override the Active Protection agent. Anyone else had any experience with this?
Went to the Pest Patrol Management Console and forced a scan with the delete option selected. This cleaned all but one of the hijackers (ISTBar).
Repeated scans yield the same results. ISTBar is buried in the registry & Pest Patrol evidently cannot clean it. I don’t really understand this, as it tells me exactly where it is in the report. Anyone have any insight into this?
Test 1 (TS-DC-0001) Final results –
Having run repeated scans, I have found that while PP has no problem finding pests on the machine, & supposedly has no problems removing them, but they seem to keep coming back, suggesting that PP is not truly getting rid of the source of the problem. Additionally, I would point out that this is AFTER having enabled Pest Patrol’s Active Protection option on the computer.
On 9-20-04, among 40 pests that were detected and deleted from the computer, were:
2004/09/20-11:26:57 (TS-DC-0001) TrojanDropper.Win32.Delf.z Dropper Process terminated
2004/09/20-13:13:05 (TS-DC-0001) TrojanClicker.Win32.Delf.r Dialer Deleted
2004/09/20-13:13:05 (TS-DC-0001) TrojanDropper.Win32.Delf.z Dropper Deleted
Most of the pests were cleaned, but a scan on 9-22-04 showed the following:
2004/09/22-11:35:47 (TS-DC-0001) TrojanDropper.Win32.Delf.z Dropper Deleted
Another scan the following Monday:
2004/09/27-08:53:35 (TS-DC-0001) TrojanDropper.Win32.Delf.z Dropper Deleted
As you can see, despite repeated scans in which Delf is deleted, it keeps returning. The machine stays clean until after reboot, at which time it reestablishes itself. This seems to indicate that there is a registry entry that reloads the application.
Loaded HiJack This to examine registry startups, IE settings, and BHOs for spyware & hijackers. HJT log found:
O2 - BHO: (no name) - {00320615-B6C2-40A6-8F99-F1C52D674FAD} - (no file)
This line is “doxdesk.com” a parasite / Transponder.
O2 - BHO: (no name) - {AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} - C:\WINDOWS\system32\nvms.dll
“eXact Advertising” Parasite.
O2 - BHO: (no name) - {CE188402-6EE7-4022-8868-AB25173A3E14} - C:\WINDOWS\system32\mscb.dll
“eXact Advertising” Parasite.
O2 - BHO: (no name) - {F4E04583-354E-4076-BE7D-ED6A80FD66DA} - C:\WINDOWS\system32\msbe.dll
“eXact Advertising” Parasite.
O8 - Extra context menu item: Web Rebates - file://C:\Program Files\Web_Rebates\Sy1150\Tp1150\scri1150a.htm
Web Rebates is a known adware program that is pretty tenacious in that it writes itself into the registry in several locations, runs repeated processes in the task manager, and loads executables in the system32 directory of the computer.
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} -
“BlazeFind "Windupdates" targeted advertising
While Pest Patrol found a considerable amount of adware / spyware and other pests on the computer, it also left a considerable amount behind.
9-28-04
Scanned, but did not clean with HJT.
Ran Spybot Search & Destroy. SBSD found:
MediaPlex: Tracking cookie (Internet Explorer: administrator) (Cookie, fixed)
Alexa Related: Link (Replace file, fixed)
C:\WINDOWS\Web\related.htm
BFast: Tracking cookie (Internet Explorer: administrator) (Cookie, fixed)
Cool
Tracking cookie (Internet Explorer: administrator) (Cookie, fixed)
Cool
Tracking cookie (Internet Explorer: administrator) (Cookie, fixed)
DoubleClick: Tracking cookie (Internet Explorer: administrator) (Cookie, fixed)
DSO Exploit: Data source object exploit (Registry change, fixed)
HKEY_USERS\S-1-5-21-8915387-1868962325-1446904402-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\1004!=W=3
DyFuCA.InternetOptimizer: Uninstall settings (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WSEM Update
HitBox: Tracking cookie (Internet Explorer: administrator) (Cookie, fixed)
HitBox: Tracking cookie (Internet Explorer: administrator) (Cookie, fixed)
HitBox: Tracking cookie (Internet Explorer: administrator) (Cookie, fixed)
n-Case: User settings (Registry key, fixed)
HKEY_USERS\S-1-5-21-8915387-1868962325-1446904402-500\Software\180solutions
n-Case: Autorun settings (rodarab) (Registry value, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rodarab
SexList: Settings (Registry value, fixed)
HKEY_USERS\S-1-5-21-8915387-1868962325-1446904402-500\Software\Microsoft\Internet Explorer\URLSearchHooks\_{CFBFAE00-17A6-11D0-99CB-00C04FD64497}
SexList: Settings (Registry key, fixed)
HKEY_USERS\S-1-5-21-8915387-1868962325-1446904402-500\Software\Avenue Media
VX2/f: Web page (File, fixed)
Ran another Pest Patrol scan after this. PP showed system clean. Rebooted & ran another PP Scan. This time the machine shows clean even after a reboot.
Ran HJT. Log includes the following:
O2 - BHO: (no name) - {00320615-B6C2-40A6-8F99-F1C52D674FAD} - (no file)
localNrd.dll Parasite MX-Targeting
O2 - BHO: (no name) - {AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} - C:\WINDOWS\system32\nvms.dll
nvms.dll Parasite eXact Advertising
O2 - BHO: (no name) - {CE188402-6EE7-4022-8868-AB25173A3E14} - C:\WINDOWS\system32\mscb.dll
mscb.dll Parasite eXact Advertising
O2 - BHO: (no name) - {F4E04583-354E-4076-BE7D-ED6A80FD66DA} - C:\WINDOWS\system32\msbe.dll
msbe.dll Parasite eXact Advertising
O4 - HKLM\..\Run: [Windows SyncroAd] C:\Program Files\Windows SyncroAd\SyncroAd.exe
Adware – removable through Add / Remove Programs only
O8 - Extra context menu item: Web Rebates - file://C:\Program Files\Web_Rebates\Sy1150\Tp1150\scri1150a.htm
Here it is again!
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} -
Still here . . . “BlazeFind "Windupdates" targeted advertising
Uninstalled SyncroAd, then had HJT fix remaining entries.
Rebooted.
Pest Patrol Scan is clean.
SBSD scan is clean.
HJT log is clean.
Ran RegEdit search for “webrebates”. Found & deleted one registry entry.
Ran search for keyword “rebate” on local drives. Found two cookies & ten files already quarantined by Pest Patrol. Deleted quarantined files.
No further testing on this computer.
"The Crystal Wind is the storm, and the storm is data, and the data is life. You have been slaves, denied the storm, denied the freedom of your data. That is now ended; the whirlwind is upon you . . . . . . Whether you like it or not."
"Trent the Uncatchable" in The Long Run by Daniel Keys Moran