Where are Trojans hiding in your systems?
In any cases of virus/worm/Trojan infections, we should not automatically assume that HKLMSoftwareMicrosoftWindowsCurrentVersionRun registry key is the only place Trojans try to tamper, otherwise we would be in a false sense of security TRAP.
There are many other places on a Windows system that Trojans can add scripts and shortcuts to startup Trojan processes:
· [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun]
· [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunOnce]
· [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServices]
· [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServicesOnce]
· [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun]
· [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce]
Note: For the following registry keys, the key value should be exactly "%1 %*" . Any programs that are added to the key value will get executed every time a binary file (.exe, .com) is executed, i.e."Trojan.exe %1 %*".
· [HKEY_CLASSES_ROOTexefileshellopencommand]
· [HKEY_LOCAL_MACHINESOFTWAREClassesexefileshellopencommand]
Also, check
· Startup folder: to go to this folder, click on Start->Programs->Startup, and right click on Startup and select "Open" from the menu. Check every file in this folder and make sure you know what they are. These files will startup automatically every time you login to your systems.
· Windows Scheduler - check if any programs are scheduled to startup at any specific time. Some Trojans use scheduler as a mean for program execution.
o For Windows NT, 2000 and XP systems, use AT command to verify. Go to command prompt and type "at" and if there is any scheduled tasks, it will display "Status, ID, Day of execution, Time of execution, and Command line to be executed"
o For Windows 9x/ME systems, use Windows Explorer and go to Task Scheduler, which is under My Computer.
· Win.ini (load=Trojan.exe or run=Trojan.exe)
· system.ini (Shell=Explorer.exe trojan.exe)
· autoexec.bat - look for added Trojan files, may be in the following file extensions: .exe, .scr, .pif, .com, .bat
· config.sys - look for added Trojan files
· Any suspicious or new batch files (.BAT), which might call the actual Trojan.
In addition, watch out for social engineering... Social engineering? Yes. Don't be fooled by processes or programs with similar and/or exactly the same filename as the legitimate Windows system programs. Many known Trojans have included programs with exact same name as Windows system programs, but put them into different folders. Many people lower their guard when they see familiar Windows system programs, and some Trojans did successfully create deceptions and exploit this human vulnerability. If you just use the Windows Task Manager to check processes, you might be fooled if you don't examine them carefully. You might want to use some other tools for detailed examination i.e. pstools from
http://www.systeminternals.com[...]
Here are some sample filename of files included in recent Trojans: (assuming Windows is installed in c:windows or c:winnt)
· Explorer.exe - a legitimate program exists in Windows or Winnt folder, NOT Windowssystem32 or Winntsystem32, or anywhere else
· Rundll32.exe - a legitimate program exists in Windowssystem32 or Winntsystem32 folder, not anywhere else
· taskmngr.exe - the legitimate program is called "taskmgr.exe", not taskmngr.exe"
Let's be vigilant about the files, registries and different places that Trojan can touch.
En pæn sjat håber det kan bruges :)
--