Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: metalmunna
« on: 18. May 2011., 18:56:27 »



Just a quick thought,

It may that the file that is suspected of being a virus or  trojan has created a hidden partition which it keeps restoring from with an associated config file given it a list of different names to copy itself back as many provalent rootkit's/Trojan's/Virus's utilise the same trick, try Uf Disk utilitie's, can be found for free on the web with a bit of looking it's not designed for all USB sticks but I have yet to find on that this software wont work on this not only allows you to FULLY Format so you can use the FULL storage space of the pen drive but also allows you to create a secure partition create a CDFS partition so that you can boot form the USB stick as if it were a CD drive but more importanly it will obliterate any partition inc data that maybe lurking on the stick that Windows management tools simpy wont touch, out of interest you said about it being a govt based office enviroment, is this your pen or the company's?

Regds

HD

hi, thanks for the reply.

that's the staffs pendrive of that office and the user have no installation rights. so there has no way to execute any program by that user rights. that's a Microsoft security leak. only formatting wasn't solve coz that workstation keep doing same on any newly attached pendrive as well .. best way to get escape from there; keep update to date Windows Update from Microsoft .. if your OS is updated then it can't make any trouble .. anyway, have a nice day guys and thanks for the help ..
Posted by: hazedaze
« on: 18. May 2011., 11:02:19 »



Just a quick thought,

It may that the file that is suspected of being a virus or  trojan has created a hidden partition which it keeps restoring from with an associated config file given it a list of different names to copy itself back as many provalent rootkit's/Trojan's/Virus's utilise the same trick, try Uf Disk utilitie's, can be found for free on the web with a bit of looking it's not designed for all USB sticks but I have yet to find on that this software wont work on this not only allows you to FULLY Format so you can use the FULL storage space of the pen drive but also allows you to create a secure partition create a CDFS partition so that you can boot form the USB stick as if it were a CD drive but more importanly it will obliterate any partition inc data that maybe lurking on the stick that Windows management tools simpy wont touch, out of interest you said about it being a govt based office enviroment, is this your pen or the company's?

Regds

HD
Posted by: Samker
« on: 14. May 2011., 04:59:31 »


Solution
:

Please be informed that this may happen due to a Vulnerability on the unpatched Operating System. Microsoft has released the hotfix (KB2286198) which will fix the vulnerability.


Please implement the hotfix on the affected Operating Systems specified on the link mentioned below.

"MS10-046: Vulnerability in Windows Shell could allow remote code execution"

http://www.microsoft.com/technet/security/bulletin/ms10-046.mspx


Thanks for info's MM...  :thumbsup:

Posted by: metalmunna
« on: 14. May 2011., 00:30:05 »

anyway, got the solution:

Problem Reported:
"Shortcut links" folder-like icon gets created which redirects to execute a hidden .scr, .exe files created by the virus itself on that particular drive and the Genuine files\folder gets hidden automatically".

For example, if you have a folder named "TEST" , then the virus will hide the folder and its sub-folder (if any) with SH attribute and creates shortcut folders with same name. User thinks that their folder are changed to shortcuts and cannot access any data. And if you check the properties of that shortcut folder, the Target path will be .scr, .exe file.


Solution:

Please be informed that this may happen due to a Vulnerability on the unpatched Operating System. Microsoft has released the hotfix (KB2286198) which will fix the vulnerability.

Please implement the hotfix on the affected Operating Systems specified on the link mentioned below.

"MS10-046: Vulnerability in Windows Shell could allow remote code execution"

http://www.microsoft.com/technet/security/bulletin/ms10-046.mspx
Posted by: metalmunna
« on: 11. May 2011., 18:22:06 »

Did somebody put exceptions for the pendrive or executable files in ePO?

no exceptions has been added for the pendrive on ePO, although we already added that executable files on unwanted programs policy to delete from everywhere but as i told before that it can change their own file name ... now waiting for the virus file from those lazy guys, when i will get those time i will share again ...
Posted by: jheysen
« on: 11. May 2011., 01:56:16 »

Did somebody put exceptions for the pendrive or executable files in ePO?
Posted by: Samker
« on: 10. May 2011., 22:46:28 »

thank you guys for the help and will let you know the result later ... have a nice day to all of you ...

Any news about this case, MM??


... still i didn't get that virus file which isn't detected by McAfee Enterprise (that's not fake coz i saw that too on their pen drive before), but they sent me some files yesterday but that's already protected by McAfee .. so waiting for the files which was cause of the Pen Drive ..

Probably some "mistake" in ePO configuration... but we'll see.
Posted by: metalmunna
« on: 10. May 2011., 18:49:39 »

thank you guys for the help and will let you know the result later ... have a nice day to all of you ...

Any news about this case, MM??


Nothing new yet, as i told you that it's not my problem and on my network and system has no trouble like that. it's a friend's office network and that's a Govt. office and you know how lazy they are on their own trouble! still i didn't get that virus file which isn't detected by McAfee Enterprise(that's not fake coz i saw that too on their pen drive before), but they sent me some files yesterday but that's already protected by McAfee .. so waiting for the files which was cause of the Pen Drive ..
Posted by: Samker
« on: 09. May 2011., 19:36:23 »

thank you guys for the help and will let you know the result later ... have a nice day to all of you ...

Any news about this case, MM??
Posted by: metalmunna
« on: 05. May 2011., 02:13:10 »

thank you guys for the help and will let you know the result later ... have a nice day to all of you ...
Posted by: Samker
« on: 04. May 2011., 06:23:04 »


Hi MM, like "jheysen", I'm also 99% sure that this cause some nasty virus...  :-\

Check this solution also:

Quote
1. If you did not format your flash drive, then check whether the files are not in hidden mode (Go to folder options-> view tab and uncheck the option of “Hide protected operating system files(Recommended)).

2. Click on "Start" -->Run-->type cmd and click on OK.

3. Enter this command: attrib -h -r -s /s /d g:\*.*

Note : Replace the letter g with your flash drive letter.

4. Now check for your files in Pen Drive.

5. After that, download the Malwarebytes' Anti-Malware and run Full scan: http://scforum.info/index.php/topic,2201.0.html


Finally check mentioned PC with some Online AV scanner: http://scforum.info/index.php/topic,734.0.html (my suggestion for this case is NOD32), also here is one great tool "Panda USB Vaccine": http://scforum.info/index.php/topic,4274.0.html


Hope some of this things will help you to resolve this problem??




Posted by: jheysen
« on: 04. May 2011., 03:32:50 »

For submitting samples to AVERT..
http://service.mcafee.com/FAQDocument.aspx?id=TS100095
http://www.mcafee.com/us/mcafee-labs/resources/how-to-submit-sample.aspx

As for your problem, It looks like the case, that PC is infected, maybe it's a memory resident?
I don't know... but if you delete the files from linux maybe? (a live CD or something.. you can even use a Virtual Machine)
Posted by: metalmunna
« on: 04. May 2011., 00:39:11 »

Well.. first thing is to disable autorun, then you might want to access the pendrive via system console.
there I suggest you to do a dir /a to see what's actually in there, after that proceed to delete unwanted files, starting by autorun.ini

Anyway, if you can create a compressed file with all of the pendrive's content, you can sumbit it to AVERT lab so they provide a extra.dat for you (wich can be deployed via ePO) and eventually will be included in a official DAT Release.

thanks for the reply and i can delete all of them(included hidden executable files) but the problem is after sometime it will be created again with new file name(Example; before it was; abc.exe and when deleted that file after then it will be created with new file name like xyz.exe. as it can change it's own file name that's why not working if i added that on the unwanted programs Policies on McAfee Enterprise). so the source might be inside the PC but it can't make any trouble on PC, only doing that on the PenDrive. More even the user was logged in they haven't installation rights on the domain and on domain policy has blocked to install anything from the removable drive ...


Quote
(if you can create a compressed file with all of the pendrive's content, you can sumbit it to AVERT lab so they provide a extra.dat for you (wich can be deployed via ePO) and eventually will be included in a official DAT Release.)

note; can you please give me the mail address for this solution?
Posted by: jheysen
« on: 03. May 2011., 22:59:04 »

Well.. first thing is to disable autorun, then you might want to access the pendrive via system console.
there I suggest you to do a dir /a to see what's actually in there, after that proceed to delete unwanted files, starting by autorun.ini

Anyway, if you can create a compressed file with all of the pendrive's content, you can sumbit it to AVERT lab so they provide a extra.dat for you (wich can be deployed via ePO) and eventually will be included in a official DAT Release.
Posted by: metalmunna
« on: 03. May 2011., 20:22:00 »

hi guys,

fall on a trouble and the problem on the PenDrive only ..

whole the network is secured by McAfee Enterprise 8.8 VirusScan with latest update. on some client PC when attached a PenDrive those time all files gone hidden and some shortcut folder(my music, my documents .. etc) has been created automatically. VirusScan can't find any virus inside there. When take a look on the hidden files those time saw that some unknown Executable file inside there. If deleted that although not solved even added that Executable files on McAfee Unwanted files to deleted that when find inside the PC or PendDrive. But after sometime saw that problem isn't solved and the Executable files changed their own name and keep doing the same problem.

any help please? that's it and have a nice day guys ...
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising