Manual Malware Identification and Removal
When discussing Manual Malware Identification and Removal. fighting malware, the focus is usually on how well security software protects computers against malware. Malware protection (commonly anti-virus and anti-malware software) is undoubtedly one of the most important defenses computers need, but what do you do if your machine gets infected before you can install security programs?
When working in a computer repair or maintenance environment, you may encounter computers that are already infected. In such cases installing and running a security program may not be enough to remove all malware. While prevention advice is invaluable, it does not help much if you have a computer that’s already infected. The first step would be to download and run a malware scanner (such as our free Emsisoft Emergency Kit). Ideally, such a scanner would take care of all malware, though that may not be so in some cases because of the following:
- Malware has already had a chance to install itself without being effectively hindered by whatever security software was installed (if any). That means the malware might be able to protect itself against being detected or removed, or it is simply too new or rare to be correctly detected and removed yet.
- The malware may actively prevent security software from being installed or launched, i.e., It is already running while the scanner was not, and can intercept the security product before it can run or scan.
- Even if the system can be scanned successfully, many security products rely on behavioral or heuristic analysis to identify all malware. This requires being active before the malware is initially run so it can be intercepted before infection. Running a scan after the malware has already installed itself mainly renders this capability substantially less effective, leading to malware being only partly detected.
Manual Malware Removal
At this point, having a computer that’s still infected, the next step is manual malware removal. This can be a daunting task, especially when you are not familiar with identifying malware, let alone removing it. Where should you start looking, and more importantly, how can you know if a file, folder, or registry object is malicious or not? You can try to perform a web search of file names, but for every legitimate Windows file, multiple search results are claiming they are wrong.
Fortunately, various tools can be used to get an overview of what is happening on a computer. We have opted to demonstrate how malware removal can be done using Autoruns, one of the more popular tools available for the task. Autoruns is developed by Microsoft SysInternals and freely available for anyone to use.
So what is the difference between an automated scanner like Emsisoft Emergency Kit and a logging application like Autoruns? An automated scanner will check the file system and registry to see if any object matches any of its malware definitions. A logging application, on the other hand, will show which files are configured to start with Windows launch and at which point they are supposed to start. Some will also show which processes were running when the scan was performed. Autoruns is designed for the former. It is up to the one running the application to determine whether the objects shown are legitimate or not (Note: Most logging applications do have a whitelist that will exclude known good entries that cannot be used for malicious purposes).
This brings us to the most critical step in manual malware removal: Identification. There is no magical “fix” button to make somehow all suspicious entries go away (at least not yet!). You will first need to determine what needs to go. This does not mean you have to perform complex malware analysis; in most cases, basic knowledge of Windows combined with common logic goes a long way. (Note: Familiarization with Windows Registry is highly recommended at this point. If you are not familiar with Windows Registry, it is recommended to start reading up on it. Start here.)
When malware arrives on a system, it will want to ensure that it has run each time the computer is started. This means that when looking for malware, the first thing of interest is the so-called load point. If you find that, you usually also get an idea of where in the file system the malware is located. Autoruns (as the name suggests) conveniently provides us with an overview of most load points that can be used in Windows.
Now it may sound easier said than done, but to identify a malicious entry, there is another skill you need to master as well: Identification of legitimate objects. For that reason, before looking into a superficial malware infection, let us look at a sample entry on a clean Windows 10 installation. Below is an image of an Autoruns scan (Figure 1). Let us start at the top.
Figure 1: Autoruns Scan – AlternateShell / cmd.exe
The first file we see is cmd.exe, which is listed under a registry key named AlternateShell. To determine whether or not this is legitimate, two things are of interest:
- Is the file legitimate — is this the real Windows cmd.exe, or is it something that calls itself cmd.exe in order to fool us?
- Is the load point normal for this file?
We can also search for “cmd.exe” online (by right-clicking the entry and selecting Search Online). On the first page of search results, you will find explanations of what the legitimate cmd.exe file is, but also examples of how malware can use this file name, so that is not conclusive. To be sure this is a legitimate Windows file, we can check its location instead (default is the system32 folder) and scan it on VirusTotal (right-click and select Submit to VirusTotal). In this case, the file is legitimate.
Searching for “AlternateShell” also proves beneficial. A search result from Microsoft Technet summarizes the purpose of AlternateShell as “Lists the name of the alternative environment used when the Safe mode with Command Prompt option is selected.”
We also see that cmd.exe is the default value, which means that the cmd.exe / Alternateshell line entry in our Autoruns report is legitimate and can be ignored, at least when it comes to malware removal. (Note: This is true in most cases. There is an outside case, though, in which an otherwise legitimate entry with a legitimate filename has had its actual file replaced with a malicious copy — a topic for another day!).
Moving on, let us look at a superficial malware infection next. The trojan sample used can be found here. With this malware installed on the system, Autoruns looks as follows:
Figure 2: Autoruns Scan – Trojan Sample
At first glance, this might look like a lot of very confusing data, but fortunately, Autoruns sorted the collected data by load point. It will also show the location of any load point, which can be, for example, in the registry or the file system. When we start to analyze the data in the report (see Figure 2), two lines jump out: both contain a string of letters and numbers, while all other objects have a humanly readable name of some sort. According to Autoruns, the objects are located in:
- C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
You can see that the first questionable entry is a registry key and the second, a folder. These two locations are among the most commonly used load points by both malware and legitimate applications. If you want to ensure that your application runs when Windows is started, you can use either of these locations.
Let us start with the most accessible load point: the Startup folder. According to Autoruns, a file named “edf6e17148b3b3408342ac7be2e79536.exe” is located in that folder. Before looking any further, this raises two red flags already:
- You usually expect to see shortcuts (.lnk) in the Startup folder that will run an application on startup, not the actual executable (.exe) file.
- The file name is just a random-looking string, with no indication of what it might load. You would expect a name that indicates what application is loaded, in combination with that application actually being present in the computer.
To confirm our suspicion here, we can right-click the object in Autoruns and select the “Check VirusTotal” option. This will provide a link to the VirusTotal scan results, which confirms the file is indeed malicious and should be removed.
Now let us move on to the other load point, the run value. If we open this entry in Regedit by right-clicking and selecting “Jump to Entry,” this is what we see (see Figure 3):
Figure 3: Regedit Snapshot
Again, without even checking the details of the file, there are already a few alarm bells ringing because:
- The value name is a random-looking string without any indication of what program is being run.
- The value data points to a file named svhost.exe in the Temp folder, not to be confused with svchost.exe, a legitimate Windows file that usually resides in \Windows\system32.
Moving on, we see that Autoruns provides additional information and has extracted some metadata from the file. We can verify this by opening the file Properties (right-click the file and select Properties). (See Figure 4):
Figure 4: Metadata – svchost.exe
The file’s product name is “Windows Service” (sounds pretty legitimate, even though there is no actual Windows file that has this product name and there is a typo in the word “serivce”). The Original Filename is “game.exe,” which is not generally associated with either svchost.exe or any Windows service. A VirusTotal scan confirms that this file is malicious as well.
To confirm if both objects identified belong to the same infection or not, you can compare both VirusTotal reports. You can determine this by going to the Details tab in the VirusTotal results, and you will see that the file hashes are identical.
Now that we have identified two files and one registry object that needs to go, we are finally ready for the actual removal. Autoruns does have a “delete” option, but the malware sample we are studying may be actively running (and is running in this case). As mentioned before, malware may re-add itself if removed or even stop the removal attempt. Autoruns is not able to remove it in that case. We could use Windows Task Manager to stop the malware, but it is a somewhat limited option. A better alternative, especially in malware removal, is Process Explorer. Process Explorer is an excellent option because it provides a lot more information about listed processes than Task Manager, as you can see here.
Now that we have already identified the malware, the last thing on our list is finding the offending process.
Figure 5: Process Explorer
As you can see in Figure 5, only one matches all details of the wrong entry: Our svhost.exe name, “Windows Serivce” description, and Temp folder location (you can see this by hovering the mouse pointer over the line). It is important to verify an exact match, especially since “svchost.exe” is an otherwise legitimate Windows file name.
Once this process is killed (right-click > Kill Process), all identified entries in Autoruns can be deleted without any problems. Please note that if Autoruns removes a registry load point, the associated file may need to be removed manually.
An alternative solution would be to reboot the computer in Safe Mode, which will load neither Run values nor Startup folder files. This method would have avoided the additional download of Process Explorer.
Cybersecurity essentials for IT pros, researchers and malware enthusiasts
Layered Malware Protection
Here is an on-demand Manual Malware Removal Tutorial :
Elise, ,Malware Analyst/Specialist
Emsisoft Malware LabAntivirus Deals Inc.