RE: Method to Clean up IIS servers hit by CRv2

From: Walling, Ken (Ken.Wallingat_private)
Date: Mon Aug 06 2001 - 14:32:57 PDT

  • Next message: Ralph Mellor: "Why can't "experts" get it right? (Was Re: Symantec Report)"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    I have verified items 2 and 3 below.  The original settings are in
    fact 204 and 205 respectively.
    
    	Ken
    
    
    - -----Original Message-----
    From: Doug.Barbinat_private [mailto:Doug.Barbinat_private]
    Sent: Monday, August 06, 2001 14:57
    To: dmuzat_private; INCIDENTSat_private
    Subject: RE: Method to Clean up IIS servers hit by CRv2
    
    
    As far as we can tell, there are some significant registry changes
    made by
    the program. 
    
    1.  SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable
    is set
    to 0FFFFFF9Dh.  It should be set back to zero.  This is an
    undocumented
    registry setting allows for Windows File Protection to be fully
    disabled.  A
    value of 0 enables file protection.
    
    2. 
    SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\VirtualRoots\Scripts
    
    is set at 217.  We believe the original settings to be 204.
    
    3. 
    SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\VirtualRoots\msadc
    is
    set at 217.  We believe the original settings to be 205.
    
    SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\VirtualRoots\c and
    SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\VirtualRoots\d do
    not
    appear at all and should most likely be deleted.  We believe that
    these
    facilitate the virtual web root that is created by the rootkit.  
    
    The natural problem with Trojans is . . . how do you know if this
    Trojan was
    used to deposit another?    
    
    Regards,
    DB
    
    Douglas  W. Barbin, CISSP, CFE
      Senior Consultant
      W: 703.535.8203 Ext 6547 E-Fax: 240.331.6030 M: 703.338.4003
      625 N Washington Street, Suite 209
      Alexandria, VA 22314  www.guardent.com
      Text Messaging: <mailto:7033384003at_private> 
      PGP:  64CB ACA8 0474 B9AF 1B24  6756 FA80 A274 55A3 4122
    ______________________________________________________
    G U A R D E N T  
      Enterprise Security and Privacy Programs
    
    
    
    - -----Original Message-----
    From: dmuz [mailto:dmuzat_private]
    Sent: Monday, August 06, 2001 2:24 PM
    To: INCIDENTSat_private
    Subject: Method to Clean up IIS servers hit by CRv2
    
    
    Hey folks,  Isn't this fun? (har..)
    
    So what are people doing to clean out IIS servers hit by CRv2?
    
    So far I've been doing the following:
    
    1. Patch the server.
    
    2. Remove root.exe from the web directories.
    
    3. Remove explorer.exe from c: and/or d:
    
    4. reboot.
    
    My main question is do you need to mess with the registry keys that it
    alters? Are these reset on reboot or do you need to set them to some
    value? If so what values? Or delete them all together?
    
    Thanks,
    dmuz
    
    
    
    
    - ------------------------------------------------------------------------
    - ----
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    
    
    - ------------------------------------------------------------------------
    - ----
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP 6.0.2
    
    iQA/AwUBO28MjlazzDkAkAuFEQIqXgCfQQaUAWmnK+kQRZzx0O37xy4q08wAoOmB
    /tKtCj0bJMltilUGOr23BDs5
    =q+X0
    -----END PGP SIGNATURE-----
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Tue Aug 07 2001 - 09:18:54 PDT