Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
ShizCakes
Jul 16, 2001
BANNED

Otacon posted:

My Toolkit lately has included 4 pieces of software:

1. ComboFix
2. Malwarebytes/SuperANTIspyware
3. CCleaner

That seems to fix 98% of the things I come across at my job. One client had a particularly bad rootkit like the ones above - it would not let me install any of these tools. I had to take the drive out and scan using another machine.

With these 4 tools, you can do no wrong.

Thanks for the SuperANTISpyware recommendations in this thread. I'm a HUGE NOD32 fan, but it failed me today. I remembered looking at this thread, and came back, downloaded the free edition, and will now be purchasing a professional license.

Adbot
ADBOT LOVES YOU

ShizCakes
Jul 16, 2001
BANNED
By the way, if you have things that are "hidden", and resurgent or whatever, you need this tool:

http://www.gmer.net/index.php

It's aimed at rootkits but really it picks up anything running on the system.

ShizCakes
Jul 16, 2001
BANNED

BillWh0re posted:

Different tools for different jobs mainly. Process Explorer is great for seeing whats happening with loaded modules and handles. GMER is more of a rootkit-revealer type tool and extracts a lot of information about the internal state of the Windows kernel (and even the DOS IVTs and boot sectors).

This is pretty much exactly it. ProcEXP doesn't show hidden services or other things like that; this will show (and highlight in red!) the bad guys. It's small and light, but packs a mean punch (insofar as details about what's going on) and is way easy to misuse.

ShizCakes
Jul 16, 2001
BANNED

hyperborean posted:

If you mean things that hide in svchost or whatever, yes it does. Maybe not to the same extent? And they do have to be running, going by what BillWh0re says maybe they don't with GMER?

I use ProcEXP as my task manager replacement on my work laptop, and I don't see the same thing - I've only seen hidden services here and there, but I've never seen one with ProcEXP.

I unfortunately lack the terminology to explain what the difference is, but essentially I don't mean the stuff launching as a service through SVCHost (which ProcEXP will show), but services that are actually "hidden" services. There's also some weird process injection stuff that it will pick up and highlight as well - that autoruns doesn't find.

It's essentially a robust rootkit revealer, but if said rootkit/hidden process/whatever is in memory, you know about it instantly. Before GMER, I would bang my head against a wall trying to figure out where the hell this poo poo was spawning from.

When you get a non-standard PE386 rootkit or some poo poo, you'll understand the true power of GMER.

I also like it's ability to kill every process on the system and go into GMER safe mode - without rebooting. Killing auto-regenerating files has never been easier.

ShizCakes
Jul 16, 2001
BANNED

darkforce898 posted:

GMER is telling me things that the Internet knows nothing about... None of these things show anything in Google, but I think the devices section is fine.

GMER 1.0.14.14536 - http://www.gmer.net
Rootkit scan 2008-12-20 12:57:18
Windows 5.1.2600 Service Pack 3


---- System - GMER 1.0.14 ----

SSDT spdz.sys ZwEnumerateKey [0xBA6C6CA2]
SSDT spdz.sys ZwEnumerateValueKey [0xBA6C7030]

---- Devices - GMER 1.0.14 ----

Device \FileSystem\Ntfs \Ntfs 8A35D1F8

AttachedDevice \FileSystem\Ntfs \Ntfs SiWinAcc.sys (Windows Accelerator Driver/Silicon Image, Inc.)

---- EOF - GMER 1.0.14 ----

I can't find references to spdz.sys on google (like you said) - find the file on your system and determine if it's related to something of value by inferring from it's location and from it's properties.

The SiWinAcc seems to be related to a storage driver - so you should leave it alone. (Silicon Image makes storage controller chipsets)

  • Locked thread