I double clicked on the malware.
I chose “Run Isolated”
3.The FlashPlayer_11_4_update_for_Win.exe was sandboxed as “partially limited”, but the svchost.exe executed by the explorer.exe was not sandboxed.
I checked the autorun entries.
5.environment:
Windows XP Pro SP3 32bit
http://valkyrie.comodo.com/Result.html?sha1=25cfd9454c7b77027a278856d539f6f88222d099&&query=0&&filename=FlashPlayer_11_4_update_for_Win.exe
http://camas.comodo.com/cgi-bin/submit?file=9f1db11106b46925bb964f35719e4362b4309dbe69653fbab2a9b8481cc485d7
process tree:
malware → nothing
explorer.exe → svchost.exe
[attachment deleted by admin]
egemen
January 24, 2013, 8:40pm
#2
Hmmm good one. Thanks for the report. Can you quickly send me the sample link?
what does this malware? Is it able to harm the system, i mean any changes or send data? What happen if u setup the sandbox to full virtualize?
DrHaze
January 25, 2013, 1:05am
#4
I found a copy of this but avast blocks it. i know where to get it. But if your run it you will never really know what was done to your system…
Only “untrusted” and “fully virtualized” can block the malware.
thank u for that info. is it able to run in virtualized sandbox and do not harm the system or does it not run?
It can be run in the virtualized sandbox but the explorer.exe can not execute the svchost.exe.
thank you for that info again. that is a really nice one, interesting!
That are the examples where i ask myself, is it better to make the software more usability friendly or more protective!?
I would choose the second one … even the virtualized sandbox is not userfriendly at all as the default settings, but it seems u get more protection.
There is one problem in COMODO Autorun Analyser.
It can not detect the autorun file, skype.dat
The rating scan can not detect it.
siketa
January 25, 2013, 9:08am
#12
Valkyrie is offline…again…
Is it safe file?
Good to see Fully Virtual blocks this malware.
New malware
The svchost.exe executed by explorer.exe was not sandboxed.
The situation existed in a very short period.
(Maybe the autorun entry also appear in a very short period.)
The event logs did not indicate the malware accessed memory of the explorer.exe
2013-01-27 00:30:44 C:\virus\xbldnpkeg3g6sesakuzhue\xbldnpkeg3g6sesakuzhue.exe Sandboxed As Partially Limited
2013-01-27 00:30:53 C:\virus\xbldnpkeg3g6sesakuzhue\xbldnpkeg3g6sesakuzhue.exe Sandboxed As Partially Limited
4.environment:
Windows XP Pro SP3 32bit
http://camas.comodo.com/cgi-bin/submit?file=7a827d336c0fae31a751fbca444f86c54db1fc57cf2fc7cd9441e841dbf8f620
http://valkyrie.comodo.com/Result.html?sha1=32bf4c24121eb01a2b940b5525f991e57b8ca70d&&query=0&&filename=xbldnpkeg3g6sesakuzhue.exe
[attachment deleted by admin]
I enabled the HIPS and the safe mode.
In the Monitoring Settings, I checked the Protected Registry Keys only.
Then I added a rule for the svchost.exe.
I double clicked on the malware.
5.event logs:
2013-01-27 18:23:45 C:\virus\mpneeamp66r1acnt037iq7\mpneeamp66r1acnt037iq7.exe Sandboxed As Partially Limited
2013-01-27 18:23:54 C:\virus\mpneeamp66r1acnt037iq7\mpneeamp66r1acnt037iq7.exe Sandboxed As Partially Limited
2013-01-27 18:24:06 C:\WINDOWS\system32\svchost.exe Modify Key HKUS\S-1-5-21-448539723-261903793-1801674531-1003\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell
[attachment deleted by admin]