Rootkit, Daemon Tools weirdness or paranoia?

Discussion in 'malware problems & news' started by Piri_Thomas, Oct 7, 2007.

Thread Status:
Not open for further replies.
  1. Piri_Thomas

    Piri_Thomas Registered Member

    Hi everyone, I'm currently wondering if I have a rootkit on my system or if I'm seeing things in clouds. Long story made long, I came to my system earlier to notice that my firewall (Sygate) was closed. I did not remember closing it, so I restarted it - and, just in case, decided to scan the system with an online scanner (my antivirus monitor, Avira, was active all the time). I opened the browser and tried to connect to Kaspersky's online scanner... and then my network just died, instantly. Connections didn't work at all. I started suspecting the worst ("someone killed my firewall and then my net when he saw me open Kaspersky's address"), I restarted, used a snapshot created by FirstDefenseISR, booted into Windows' "last known good configuration" and started scanning system with Avira, online Bitdefender, online F-Secure, Rootkit Revealer, Sophos AntiRootkit, Panda's online Nanoscan, Prevx CSI, McAfee's Stinger, MS AntiMalware. Nothing was found. For a good measure, I booted into safe mode to try a rootkit scanner there - and found out that the ones I had (Revealer, Blacklight, Avira Rootkit Scan Beta) don't seem to work in safe mode :\ - they either won't run or cause errors. (Or they expired - that's Blacklight!) But I ran IceSword in safe mode and saw something weird. Here's the log:

    Kernel Module:
    \Program Files\DAEMON Tools\daemon.dll

    This puzzled me:

    The file was not there at all. But I tried creating an empty file named ajmgz8bs.SYS and copy it into windows\system32\drivers\ - and saw "Access denied". The empty file wouldn't copy into the \drivers\ dir. Well, that looked like a rootkit hiding itself to me - so after a few tries I found out that the driver's name was apparently randomly created on each bootup (every time I saw it, it began with an A) and the driver was present in both safe mode and normal mode.

    But then I found out that when you skip the sptd.sys driver in safe mode or normal, the weird nonexistent "driver" will not show up in Ice Sword. Sptd.sys is a driver installed by Daemon Tools for drive emulation purposes, so it would seem that the strangely named driver is something like a virtual driver that it makes for its own use? I also found the weirdly named file on another computer where Daemons were installed.

    I still am a bit concerned, though, about that shutdown of Sygate and the "death" of the network. (How would you grade Sygate, by the way? I am behind a router, so I just wanted a small basic firewall and decided to go with Sygate after reading reviews) Are there any other symptoms of potential infection that I should be looking for? I am not showing any outgoing or incoming packets (would it be possible for a rootkit to conceal them? I've been checking them with TCPview and Sygate's own monitor - is there something more powerful worth recommending?), Ice Sword is not showing anything weird other than the awkwardly named driver, there is no disk activity and Filemon shows only normal accesses to files... so am I being paranoid or should I dig further, but with other methods and tools?

  2. fcukdat

    fcukdat Registered Member

    Healthy paranoia and examination but you missed out the leading ARK forensic tool from the equation(RootKit Unhooker):D

    But FYI you will find the random driver is also created by Daemon tools and thus a legitimate object:thumb:
    Last edited: Oct 7, 2007
  3. lucas1985

    lucas1985 Retired Moderator

    Nothing to worry about :)
    Daemon Tools uses rootkit-like techniques to defeat copy protection schemes.
  4. Cerxes

    Cerxes Registered Member

    If you donĀ“t use Securom 7.x games...

Thread Status:
Not open for further replies.