Oh, it's in the registry. :) In HKEY_CURRENT_USER under the Run key, naturally, so it starts up automagically upon login.
Actually, I believe that if the user who infected the machine has admin rights, it may go under the Run key of HKEY_LOCAL_MACHINE instead, so it impacts ANYONE who logs in. But in our case, all users have limited rights, so the program can't write to that key. Instead, it's limited to the current user. We've found that when the "tool" is running, it breaks things like regedit and Task Manager in an effort to keep you from killing it and cleaning the machine. What we do is to log in with a different account (one with admin rights, of course), run regedit, load the hive of the infected user, then go into their Run key to look for weirdness. We look at the key that calls the malware so that we know what folder and files to delete, then delete those, then delete the key from the registry. That's all it takes-the next time the user logs in, everything is clean. It's not horribly painful, but it gets old doing it again and again. John Hornbuckle MIS Department Taylor County School District www.taylor.k12.fl.us<http://www.taylor.k12.fl.us> From: MMF [mailto:mmfree...@ameritech.net] Sent: Wednesday, September 15, 2010 8:39 PM To: NT System Admin Issues Subject: RE: #*&$&% "Security Tools" Malware John is absolutely correct. My brother got this a couple of weeks ago and asked me for help.I found it by going into task manager and looking at all the processes. I noticed one with a very long name and noted its location and it was exactly where John said it was found. So we shut it down and rebooted, and it was back again, but with a new name. Went to its location and this time deleted the folder with the 2 executables. Deleted the folder and that solved the problem. At least my brother hasn't called me back, and he rebooted his machine a number of times to make sure that we had cleansed his laptop. One question, has anyone found anything in the registry relating to this? My brother was satisfied that his laptop was clean, so we didn't look into the registry. Murray ________________________________ From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us] Sent: Wednesday, September 15, 2010 12:56 PM To: NT System Admin Issues Subject: RE: #*&$&% "Security Tools" Malware >From what I've seen in digging into "Security Tools," the .exe's aren't stored >in the IT temp folder. I'm finding them elsewhere under the user's profile >\application data\local settings. Some random folder name... From: Roger Wright [mailto:rhw...@gmail.com] Sent: Wednesday, September 15, 2010 12:30 PM To: NT System Admin Issues Subject: Re: #*&$&% "Security Tools" Malware An occasional one manages to slip past VIPRE but they're rare. We've also found that they tend to appear after a reboot even when the user is diligent and immediately kills iexplore.exe. We set a GP to automatically delete Temp Internet Files when IE is closed - this eliminates those 123456457.exe downloads that are called from registry entries. Since doing so we've have far fewer infections. Roger Wright ___ When it's GOOD there ain't nothin' like it, and when it's BAD there ain't nothin' like it! On Wed, Sep 15, 2010 at 12:20 PM, John Hornbuckle <john.hornbuc...@taylor.k12.fl.us<mailto:john.hornbuc...@taylor.k12.fl.us>> wrote: The "Security Tools" malware is about to drive me insane. My users keep managing to infect themselves with it, and we're having trouble stopping it. They don't run with admin rights, so there's no real damage done to their systems and we can clean it up in about two minutes. But the time adds up, and I'm tired of my technicians having to waste time on it. Our antimalware software is Microsoft's Forefront Client Security, and it's having a tough time catching this. Every time I get infected, I send the EXE to Microsoft and they update their definitions-but the EXE's used by the malware apparently change rapidly, and seem to constantly be a step ahead of FCS's definitions. I can think of a couple of options that I know would stop it, like blocking all EXE's at our web filter or using group policy to limit the running of EXE's-but this would also prevent users from doing things like installing safe plug-ins from websites, so it's not a first resort. Suggestions? John Hornbuckle MIS Department Taylor County School District www.taylor.k12.fl.us<http://www.taylor.k12.fl.us> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com> with the body: unsubscribe ntsysadmin NOTICE: Florida has a broad public records law. Most written communications to or from this entity are public records that will be disclosed to the public and the media upon request. E-mail communications may be subject to public disclosure. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com> with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com> with the body: unsubscribe ntsysadmin NOTICE: Florida has a broad public records law. Most written communications to or from this entity are public records that will be disclosed to the public and the media upon request. E-mail communications may be subject to public disclosure. No virus found in this incoming message. Checked by AVG - www.avg.com<http://www.avg.com> Version: 9.0.851 / Virus Database: 271.1.1/3136 - Release Date: 09/15/10 01:34:00 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com<mailto:listmana...@lyris.sunbeltsoftware.com> with the body: unsubscribe ntsysadmin NOTICE: Florida has a broad public records law. Most written communications to or from this entity are public records that will be disclosed to the public and the media upon request. E-mail communications may be subject to public disclosure. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin