D
David H. Lipman
Guest
From: "Geoff" <geoff@invalid.invalid>
| Well, if you have specific info I'd like to see it. If it has a PID, it can
| be seen. Rootkit Revealer found it. Not sure if Mark was using PE at the
| same time when he found the Sony rootkit.
| As for ADS, a process is not a file,to which part of PE are you referring
| to about hiding a process in an ADS?
This is an area where I fall off the ledge. I still have much to learn. However it is my
understanding the following are used to hide processes...
ZwCreateThread
ZwOpenProcess
ZwOpenThread
ZwTerminateProcess
ZwWriteVirtualMemory
The PID would be hidden from normal scrutiny and thus NOT shown in Process Explorer.
You are correct in that ADS refers to how a file is stored and not a process. However,
you can not tell from Process Explorer if a file is executed from an Alternate Data
Stream. SVCHOST.EXE executed as an ADS is most certainly malware.
--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp
| Well, if you have specific info I'd like to see it. If it has a PID, it can
| be seen. Rootkit Revealer found it. Not sure if Mark was using PE at the
| same time when he found the Sony rootkit.
| As for ADS, a process is not a file,to which part of PE are you referring
| to about hiding a process in an ADS?
This is an area where I fall off the ledge. I still have much to learn. However it is my
understanding the following are used to hide processes...
ZwCreateThread
ZwOpenProcess
ZwOpenThread
ZwTerminateProcess
ZwWriteVirtualMemory
The PID would be hidden from normal scrutiny and thus NOT shown in Process Explorer.
You are correct in that ADS refers to how a file is stored and not a process. However,
you can not tell from Process Explorer if a file is executed from an Alternate Data
Stream. SVCHOST.EXE executed as an ADS is most certainly malware.
--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp