Written by Doc~
Released
2.21.02
This article and the oppinions
are the sole belief of the author, and not those of the website. The author
acknowledges that there maybe some false information, the author releasing
everything at this time fully believes everything to be true, and unless proved
otherwise, should be taken so. By reading and or distributing this information
you the user are responsible for any actions or responses that may occur.
Febuary 19, Megasecurity featured an article about new
spyware program making its rounds to the parents and bosses of america. I am
firmly against this type of software, if we spy on everyday computers then why
are spys who spy on governments treated harshly? It seems to me like there is
some hypocritical beliefs going on somewhere there.
I took it upon my self to squeeze out all the information from this program.
Hopefully today I can give you the hints and tricks of this program and how to
monitor yourself as well as remove this program.
1.1 - Program information
1.1 Program Information Lets think for a second, do we know any other "programs" that do this??
Errmmm I think sub7 is the first to pop into everyones mind. It can do all of
the following without the active window capture and the keyword/alert functions
but of course sub7 can e mail, or page you with information. Then again sub7 has
a slue of features not in winwhatwhere.
1.2 Preventing the program from running
1.3 Programs startup method
1.4 Filenames and registry key names
1.4.1 File Information company name - ProVeen 1.5 Prevention 1.7 Misc
1.8 Final Thoughts
1.2 - Preventing the program from running
1.3
- Programs startup methods
1.4 - Filenames/Registry key names
1.4.1 - File
information
1.5 - Prevention
1.6 - Programs used
1.7 - Misc 1.8 - Final
Thoughts
Winwhatwhere, is a fully developed
spy program. It utilizes just about every feature a trojan has and then some.
I'd like to invent the word Corporate Trojan, beause this is exactly what
this program is. Among its arsenal of features are:
-Keylogging
-Screen
Capture (with the option of capturing the active window)
-Logging of internet
activity and chat room conversations
If this hasn't wet your appetite for
this program, there is more, among some of the new features are the ability to
rename its server files, and registry entries (I will point out some very
important and particular flaws in these methods see -> 1.4.1), some of the
real time features include alert via e mail, and keyword alert.
This section is
awfully short, Winwhatwhere requires vb run time files this is
pretty funny considering the "Corporate Trojan" part. But yes it appears
winwhatwhere was programmed in vb (winwhatwhere was e mailed regarding the
langauge in which their program was programmed in, they were e mailed 02.21.02
and hadn't responded by 2/22/2002 - 4:02 PM). What do we do to stop vb
programs from running?? Delete or move the runtime files. Winwhatwhere also
requires some .ocx files which will also prevent the program from running if not
found or installed correctly(I first installed this program with a slue of
problems one of which corrupted my c drive for a small amount of time). The
moving or deletion of run time files is a great way to see if any program is
starting up with out your knowledge, and if it is vb you will definetly know
about it.
Surprisingly enough, this
program has only one startup method. This is obviously the HKLM and HKCU
\software\microsoft\windows\currentversion\run\
As stated above, the
program generates random file names so I can't help you out there really. But
below I have included as many names as I have come across. All have been in
\winnt\system32\
lln149t3.exe
vlm5hlrk.exe
sjsu2sek.exe
jiku15py.exe
qdgdy87h.exe
ugkj5dcn.exe
wvxejo0i.exe
odes7af9.exe
vnw26ykq.exe
That should give you an idea to look for.
Now comes the juicy part. As of 02.21.02 and their most current release, the
program will alternate registry entries. It will use the following
names:
JalsCo
OL Server
stdrnd
CMA Manager
SVCH
aa
stubpath
starter
DOM Controller
qwerty
windoc16
stubmgr
jtul
intal
LTO-WATA
nav078
systematic
startup
Some are capatilized in funny ways. I found this using Regmon(see
-> 1.6.1) the configuration or setup program tries to access everyone of
theses, its not clear why, but no i didn't infect myself a billion times to get
these names ;)
Finally the most consistent feature and easiest way to catch
the server files is the server icon. They may create random file names and semi
random registry keys but their server icons are always the same. Below is the
server icon both server files will have it.
It reminds you of my computer but it is
diffrent which makes it horribly easy to detect if you are infact infected with
this program. If your on winnt or 2k check winnt\system32, if your on a me/9x I
haven't tested it on those versions so let me know.
You maybe asking yourself "what else
is there about the files that I could want to know??" A legit question. Since
the filenames were random there was no real way to consitently get the right
file the first time. They how ever didn't bother to randomize the file
properties -> company, internal names etc.
company name - KPPJ
Internal
name - WinSDoc8
Orginal Filename - WinSDoc8.sys
Product name - WINSHDOC
internal name - winsdoc32
original filename -
winsdoc32.sys
product name - WinSHDoc7
These are the only two I
*believe*... I've done a pretty good amount of testing, which makes me
come to this conclusion. Winwhatwhere will install two files, one which
communicates or interacts with the internet (this is also the bigger of the two)
then there is a smaller file which is the one called from the registry which
intern calls the bigger file.
This is easier said than done. I recommend,
double checking your process and registry startup files regularly if you live in
fear of this. Also checking for open ports a tad bit, notice longer loading
these can all be due to hidden files running. If you notice you type a certain
word and then the mouse flickers that means that word is the alert keyword most
likely. I'm sure parents will use words like "sex" and words of that
genre.
To remove winwhatwhere officially run the invetigator config file
MSdfCng.exe it will say if invetigator is running. You click uninstall to remove
the files. Yes I believe it is that simple! 1.6 Programs Used
I used the following programs, to discover what I have
reported:
Lockdown
Generics(trial version) - This program monitors system.ini win.ini
autoexec.bat config.sys and your registry it shows you all the files that
startup. It will display all the files that use the internet and startup. It
will notify you a program is using the internet if it is run.
Lockdown Process
Monitor(trial version) - A great process monitor, you can terminate programs
or .dlls it shows you what programs use what .dlls etc.
Filemon - A superior
program, written by sysinternals.com This program will monitor all file calls
and folder calls. This is how you discover where files are being stored, by
running filemon then your program it monitors all calls and records what program
called what and the response it got. It allows for easy filtering a must have
for anyone doing program bashing.
Regmon 95- Another must
have this is great for trojan testing and program cracking. This program
monitors the registry for changes it shows what program accessed what key it
shows whether it was a write query or close. It is indespenciable I would give
up enterprise software for this tool.
This might be the miscellaneous section of the
paper. But it no means is it the unimportant section. Lets take a walk through
this. You have identified that their is this winwhatwhere deployed on your
computer. You have removed it from startup. But you want to know what was
recorded. Because VB is easy to encorporate with Microsoft Access, winwhatwhere
does just that. Lets use me as an example:
The directory in which the data is
recorded would be - c:\temp work\winwhatwhere\w3files\
There is a file called
ZW84.DAT it is actually in the format of an mdb file for microsoft access
database. So we then open it in microsoft access and see most of what was
recorded you will figure out from the database what options were selected, and
how long the program has been running.
You must now be asking how the hell do
i find the installation folder??? Well I have found no simple solution. Though
the solution is simple. Run filemonitor, type a few things or even run the
winwhatwhere investigator that will tell you where the files are installed, its
a shortcut. You will see calls to c:\(installation folder)\ it will access .dat
files and other files without extensions that is your clue that, that folder is
the installation folder. If that doesn't work then run the filemon then
investigator finally view reports it will call the folder where teh data is
because the program will summerize or place in the correct format all the data
it has collected.
If this is also too much work for you then just run the
investigator setup, there is an option where you can specify the installation
directory it will show you the current installation directory which is what you
are looking for. See there is always a simple solution for us lazy americans.
The program also appears to make some files to store specific things, most of
which are file names that have been run.
Here is an example of what they look
like these are my actual file names.
_il58082
_il57464
_il57340
They
have no extension! That makes them a lot easier to identify.
As long as their is spyware no one is
safe! Yet by spreading information about these programs and creating a working
archive of how these programs work we can greatly decrease this risk.
This
program itself could improve massivly there are hundreds of features they are
lacking, but we wont list them here ;)
No one is perfect if there is false
information or spelling and grammatical errors please e mail me and help me
correct them I am firmly against false information and have gone to great
lengths to verify everything mentioned
above -> E mail -> [email protected]
Thanks goes to the following people in no special
order:
Cyberfly, M_R, weed, #tnt, skuzlenuts, and ap0calaps. If you have been
forgotten I m sure I was having a memory lapse thanks to you too.
MegaSecurity.org