For526 Handout Apt-Answers
For526 Handout Apt-Answers
You can see from the above that the iexplore.exe (PID 796) was spawned from svchost.exe (pid 884). If you inspected
the volatility getsids output for PID 796 you will notice that iexplore.exe is running as a SYSTEM user. Both of these
occurrences is very odd and not normal. Iexplore.exe should be launched from explorer.exe and should be running as
a user process.
When you examine the dlllist output for PID 796 (iexplore.exe) you will notice that there is a rogue named dll which is
hard to see. Irykmmww.d1l is named odd because the dll is spelled with a 1 (one) in the second letter where an l
(lower case L) should be seen.
So it looks as though PID 796 is malware, but it is clear that it isn’t started normally. If you tried to see if the
svchost.exe was injected it would fail and not show up. Svchost.exe is not injected. So how does the malware start
on the system?
Finally we can tell the driver irykmmww.sys is a rootkit loaded in the system. Clearly it is meant to do file hiding and
more.
Here is some additional information on the IP address found earlier in our output of connscan.
DNS INFORMATION FOR 218.85.133.23