The strange RunOnce virus startup item and the magic URL Protocol

Source: Internet
Author: User

I forgot to share some interesting hooligans I found before I sorted out the disk. Every time I saw the newest, I felt that the dark forces had an endless stream of tricks, which was much better than whether some security vendors had killed each other. during daily use of the computer, we often enter http ftp at the beginning, and click a link such as ed2k. The corresponding functions will be executed behind each link. for example, if http is passed through iexplore.exe, ed2k is opened through QQ Tornado .. this time, the virus author used this feature to implement concealed loading of viruses to avoid virus detection and removal.

 

1 met URL Protocol

(1) Internat Explorer. url

When a user problem was solved remotely in last December, we found thatHttqsImmediately understoodHttps,I thought https://www.baidu.com (I guess here using Baidu is to prevent some security software testing, we all know that this website is too true, too normal) is not very normal? As a result, I opened a web site and found that q is not p. It seems that the problem isHttqs,Open the Registry HKEY_CLASSES_ROOT to find out how tricky It is, and finally open it through IEXPLORE. EXE.H % t % p %: // w %. 6701.c% o % m % /? 12N17Navigation website

[HKEY_CLASSES_ROOT \ httqs]
"URL Protocol" = ""

[HKEY_CLASSES_ROOT \ httqs \ shell \ open \ command]
@ = "Rundll32 shell32.dll, ShellExec_RunDLLA C: \ Program Files \ Internet Explorer \ iw.e. EXE h % t % p %: // w %. 6701.c% o % m % /? 12N17"

 

(2) Goodbye to the magic RunOnce virus startup Item

Next, I encountered several questions and feedbacks. After checking, I found that these computers generally have a seemingly unreasonable RunOnce virus startup Item.ADCS: \ Windows \ system32 \ debug.exe the first impression is whether the virus author has written an error. The second impression is Windows \ system32 \ debug.exe (based on my guess, this is only to bypass security software detection, is there a problem with this file, but there is no problem finding this file in the sys32 directory. in the end, I still focus onADCS: Open the Registry HKEY_CLASSES_ROOT, apparently the ultimate goal is to run the Virus FileD: \ RECYCLERZT1 \ 2.vbe

[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ RunOnce]
"Explorer" = "ExplorerADCS: \ Windows \ system32 \ debug.exe"

[HKEY_CLASSES_ROOT \ ADCS]
@ = "Directory container"
"URL Protocol"= ""
[HKEY_CLASSES_ROOT \ ADCS \ explorer \ open \ command]
@ = "Rundll32 shell32.dll, ShellExec_RunDLLA D: \ RECYCLERZT1 \ 2.vbe"

 

2 URLProtocolView view all URLs in the computer Protocol

URLProtocolView:A small tool can view all the URLs in the computer Protocols. After running URLProtocolView, the suspicious items ADCS and device are immediately listed according to the modification time.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.