J
Jim Howes
As spyware issues seem to pop up in this group, this is a copy of a report I
sent to SANS ISC, because Lavasoft only accept support mail from users of their
pay-for product (and if the free scanner throws false positives like this, I'm
not going to get the paid-up version any time soon...)
(Perhaps a microsoft representative would like to verify the SHA1 checksums
below...)
Lavasoft fingered the Microsoft Internet Transfer Control
(%Windir%\System\MSINET.OCX) as malware a while back, and fixed it shortly after
I attempted to report it to them (but never bothered to respond to email).
It seems to be back in the current detections (SE1R126 12.10.2006)...
Win32.Trojan.Agent Object Recognized!
Type : Regkey
TAC Rating : 10
Category : Malware
Rootkey : HKEY_CLASSES_ROOT
Object : clsid\{48e59293-9880-11cf-9754-00aa00c00908}
Win32.Trojan.Agent Object Recognized!
Type : Regkey
TAC Rating : 10
Category : Malware
Rootkey : HKEY_CLASSES_ROOT
Object : interface\{48e59291-9880-11cf-9754-00aa00c00908}
Win32.Trojan.Agent Object Recognized!
Type : Regkey
TAC Rating : 10
Category : Malware
Rootkey : HKEY_CLASSES_ROOT
Object : typelib\{48e59290-9880-11cf-9754-00aa00c00908}
The MSINET.OCX is the same one I reported before, and is still digitally signed
by Microsoft.
Also, this turned up...
Win32.Trojandownloader.Zlob Object Recognized!
Type : Regkey
TAC Rating : 10
Category : Malware
Rootkey : HKEY_CLASSES_ROOT
Object : clsid\{fe38753a-44a3-11d1-b5b7-0000c09000c4}
This is the Microsoft Flat Scrollbar Control 6.0 (SP4), and relates to
C:\WINNT\System32\MSCOMCT2.OCX, which is also digitally signed by Microsoft.
The sha1sum's I have for the two OCX files on W2K SP4 are
c0c55de97f41a24bf50b2d08eb428371bb4a3cce *MSCOMCT2.OCX
4030e8e94297bc0aa5139fe241e8cf8f8142d8d4 *MSINET.OCX
MSIE is only used on this system for windows update purposes, and the system is
up to date to this week's updates (although it has no office updates, because it
does not have any office products).
I have shoved MSINET.OCX through virustotal before, so I have not done so again
(the wait is long enough as it is), and the results of MSCOMCT2.OCX are negative
across all scanners.
Finally, AdAware is also objecting to HKCU\Software\Microsoft\Internet
Explorer\Main having a non-standard "Window Title", suggesting it is part of the
same malware as MSINET.OCX. (It *is* nonstandard on this system, because I have
a IEAK-produced MSIE kit which I use to roll out up-to-date IE's onto new
machines, because it's faster than mucking about with MS Windows Update)
Needless to say, I'm not about to let AdAware have it's way with my registry today.
sent to SANS ISC, because Lavasoft only accept support mail from users of their
pay-for product (and if the free scanner throws false positives like this, I'm
not going to get the paid-up version any time soon...)
(Perhaps a microsoft representative would like to verify the SHA1 checksums
below...)
Lavasoft fingered the Microsoft Internet Transfer Control
(%Windir%\System\MSINET.OCX) as malware a while back, and fixed it shortly after
I attempted to report it to them (but never bothered to respond to email).
It seems to be back in the current detections (SE1R126 12.10.2006)...
Win32.Trojan.Agent Object Recognized!
Type : Regkey
TAC Rating : 10
Category : Malware
Rootkey : HKEY_CLASSES_ROOT
Object : clsid\{48e59293-9880-11cf-9754-00aa00c00908}
Win32.Trojan.Agent Object Recognized!
Type : Regkey
TAC Rating : 10
Category : Malware
Rootkey : HKEY_CLASSES_ROOT
Object : interface\{48e59291-9880-11cf-9754-00aa00c00908}
Win32.Trojan.Agent Object Recognized!
Type : Regkey
TAC Rating : 10
Category : Malware
Rootkey : HKEY_CLASSES_ROOT
Object : typelib\{48e59290-9880-11cf-9754-00aa00c00908}
The MSINET.OCX is the same one I reported before, and is still digitally signed
by Microsoft.
Also, this turned up...
Win32.Trojandownloader.Zlob Object Recognized!
Type : Regkey
TAC Rating : 10
Category : Malware
Rootkey : HKEY_CLASSES_ROOT
Object : clsid\{fe38753a-44a3-11d1-b5b7-0000c09000c4}
This is the Microsoft Flat Scrollbar Control 6.0 (SP4), and relates to
C:\WINNT\System32\MSCOMCT2.OCX, which is also digitally signed by Microsoft.
The sha1sum's I have for the two OCX files on W2K SP4 are
c0c55de97f41a24bf50b2d08eb428371bb4a3cce *MSCOMCT2.OCX
4030e8e94297bc0aa5139fe241e8cf8f8142d8d4 *MSINET.OCX
MSIE is only used on this system for windows update purposes, and the system is
up to date to this week's updates (although it has no office updates, because it
does not have any office products).
I have shoved MSINET.OCX through virustotal before, so I have not done so again
(the wait is long enough as it is), and the results of MSCOMCT2.OCX are negative
across all scanners.
Finally, AdAware is also objecting to HKCU\Software\Microsoft\Internet
Explorer\Main having a non-standard "Window Title", suggesting it is part of the
same malware as MSINET.OCX. (It *is* nonstandard on this system, because I have
a IEAK-produced MSIE kit which I use to roll out up-to-date IE's onto new
machines, because it's faster than mucking about with MS Windows Update)
Needless to say, I'm not about to let AdAware have it's way with my registry today.