Home page logo

pauldotcom logo PaulDotCom mailing list archives

Re: Incident Response
From: Josh Little <josh () zombietango com>
Date: Thu, 01 Jul 2010 11:21:02 -0400

 On 7/1/2010 9:58 AM, Craig Freyman wrote:
Not a false positive. Someone used a nasty USB drive that had an
autorun virus on it. The autorun.inf had this in it:

action=Open folder to view files using Windows Explorer

VirusTotal for this file:

So did your AV product block the AR script at runtime? If it did, you
will then need to verify that the exe did not run on the machine at any
time prior. Check things like the various Run and RunOnce keys in the
registry, the Windows Prefetch directory, etc. to see if any trace of
the named exe (spomenar.exe) exists, or even something similar. You may
also want to insert the drive into a Linux or Mac box (some system where
the exe won't run or be pulled automatically by AV from the drive) and
offload a copy of the exe. Since you have a VT report, you probably have
already done this. Submit that exe to someplace like Anubis, CWSandbox,
or ThreatExpert. See what these reports say about the immediate
activities of the binary after launch. You can then compare this
behavior to that seen in the historical record for the machine in
question. If the binary makes network calls at launch, see if the
machine in question has  made the same or similar calls in the past. If
you don't have something like Netflow in place, you could even try
looking in your DNS server's cache to see if a record exists if the
binary makes a call to a hostname instead of an IP.

Hope that helps.

Josh Little
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
Main Web Site: http://pauldotcom.com

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]