Downadup/ Conficker worm versus HIPS

Discussion in 'other anti-malware software' started by aigle, Jan 19, 2009.

Thread Status:
Not open for further replies.
  1. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    that should be enough...
    open SRP console and right click on the empty board space.select new path rule and try something like that.

    As someone here likes to say,its not pretty the crap to leave the toilet :D
     

    Attached Files:

  2. zopzop

    zopzop Registered Member

    Joined:
    Apr 6, 2006
    Posts:
    642
    Wow I didn't even know we had to manually enter Recycler and the TEMP folders to SRP.

    Quick question though. Chris' above post covers "recycler" what about the "TEMP" folders Kees mentioned? How do we make SRP cover those as well?

    EDIT :

    Hold on a sec, before adding "recycler" to the SRP list, I decided to try copying an executable to the folder and see what happened when I tried to run it :
     

    Attached Files:

    Last edited: Jan 22, 2009
  3. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    Yes,

    But be aware that you can have windows update problems, also a lot of installers won't work.

    But then again that is exactly what I want, so before updating switch to the admin account or enter secpol.msc and let rules not apply for admin.

    I have a test image for instance with
    - OA free DUTCH (no pop-up for new programs, remove unknown entries from start up list after re-boot)
    - Avast free DUTCH only the standard shield with check at write (and blocker warning for executables, delete, rename, format)

    I add this image by setting all receclyer, temp and temp internet files to not alllowed to execute, same as shared directory for P2P, have the mail directory tagged as limited.

    With OA free I run all interfacing aps as run safer.


    It is a test image and performs pretty decent against threats.
     
  4. tlu

    tlu Guest

    Yes, that should be the normal behavior. Adding these folders isn't necessary. If anything can be executed in them with limited rights, something is misconfigured.
     
  5. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    i know this.tlu is very correct,i just answered a question on how one can do this.
    HOWEVER for vista users that have the extra security level "BASIC USER" this way can help them make anti-executable type rules for files,folders e.t.c
    which is VERY cool if you consider that it does exactly what kees had in mind e.g run an admin acc without UAC on and have preconfigured which apps will run in LUA without UAC OR the need of dropmyrights e.t.c
     
  6. tlu

    tlu Guest

    This report is relevant.
     
  7. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Ok, tried it with DW and DW seems to protect against it. Did not check the network part though.

    :thumb: :thumb:

    Anyone can try with:

    PRSC
    Mamutu

    Thanks
     
  8. Creer

    Creer Registered Member

    Joined:
    Jun 29, 2008
    Posts:
    1,345
    Thank you Aigle for your time and tests, good work :thumb:

    cheers
     
  9. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Thanks.

    Still interested in PRSC and Mamutu though I think both will be bypassed. I don,t have a licence for them otherwise I must have tested already.
     
  10. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    Last edited: Jan 23, 2009
  11. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Ok, I found a GAOD licence for Mamutu that I did not use. It has still 35 days left. Tried it with the worm.

    Default settings- Mamutu failed
    Paranoid settings- it gave alert about rundll32.exe( on svchost memory modification), blocking this behaviour Mamutu passed.
     

    Attached Files:

  12. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Thanks for that test.

    PARANOID MODE is a very worthy setting and adds more S.M.A.R.T monitoring IMHO so this latest results is no surprise.

    NASTY WORM INDEED!

    EASTER
     
  13. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    I had a problem with this thing around August or September of last year.
    To be a little more correct, I am still dealing with it. Yeah, I allowed the 16.tmp. So now it's run a muck.

    Infected:
    1. Back up image
    2. Micro SD card
    3. Micro SD card

    I used the infected Micro SD to update the BIOS of a computer. The computer has never been connected to the internet or network.
    Will a wipe be sufficient to clear the worm?
    When I updated the BIOS could the worm have affected that?

    The Back up image alters the CMOS clock after install.
    Will the MSRT be sufficient to clean the reinstalled image if there are no extra tools installed?

    How do I clean the Micro SD cards and keep my files?
    I checked one of the cards and it has 2 partitions. Harddrive1 and Harddrive1 partition 1. I don't know if it is normal for SD cards to have multiple partitions or if this is part of the infection.
     
    Last edited: Jan 23, 2009
  14. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    http://www.f-secure.com/weblog/

    One time I'm glad the USA is not number 1 :)
     
  15. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,694
    Location:
    USA
    Has anyone tested Zemana Anitlogger to see if it will block the worm. I know this program is marketed towards blocking logging malware, but i believe it will stop most other categories of malware as well. Someone please test it!
     
  16. alex_s

    alex_s Registered Member

    Joined:
    Aug 13, 2007
    Posts:
    1,251
  17. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Thanks.
     
  18. andyman35

    andyman35 Registered Member

    Joined:
    Nov 2, 2007
    Posts:
    2,336
    I'm with Chris on this one.Ok the likes of Comodo may give a somewhat generic warning but the fact is if you've merely inserted a thumb drive and something is attempting to run automatically that in itself is highly suspicious and worthy of investigation,regardless of whether or not the warning flags up a sometimes benign action.
     
  19. mantra

    mantra Registered Member

    Joined:
    Jan 25, 2005
    Posts:
    6,180
    is enough nod32 updated or the microsoft patch is a must?
     
  20. arran

    arran Registered Member

    Joined:
    Feb 5, 2008
    Posts:
    1,156
    Did some one test this with sandboxie?
     
  21. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    Yes...it passes.
     
  22. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    For what I could see in this thread, no one has tested Outpost Firewall Pro 2009, have you? Sorry if you have and I totally missed. I did a quick look at the thread.

    Would anyone be willing to test it?

    I'm not using it at the moment and have no virtual machines up.


    Thanks.
     
  23. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    That's a silly question. Of course a patched system is important!


    Regards
     
  24. mantra

    mantra Registered Member

    Joined:
    Jan 25, 2005
    Posts:
    6,180
    no i mean there is a patch from microsoft
    but i can 't get with the regular updates

    you should download manually and install it
     
  25. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Conflicker to me is of script kiddie making.

    Take EQS i use for one example, i simply set a rule to monitor any activations of RunDll32 and even loaded the actual exploit, once the alert came up it was as simple as DENY & TERMINATE the file. Case closed, i cut/pasted it off my System Drive because it's so lame.

    I'm sure theres other methods to abort it before it can advance itself besides EQS, but that's all it took and was so stupidly simply.

    Theres simply more dangerous malware out there then this ridiculous piece of scriptie fun for them.

    EASTER
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.