I was wondering the exact same thing myself. I`m sure my test would not
be so
thorough as yours Bill but I have just tried editing my hosts file as
follows:
1. Adding an entry
2. Deleting an entry
3. Deleting the Hosts File to the recycle bin and restoring again.
WD remained ominously silent throughout.
Stu
Stu
:
Presumably, Windows Defender would say something about that
ShellExecuteHooks registration--and possibly the Hosts file change as
well.
I doubt that I'm going to be in a position to test this even though
you've
laid it out pretty clearly--but thanks, anyway!
--
[...]
I read somewhere else (and can't find it now) of a variation that
deletes
the hosts file.
I found it.<g>
http://www.mnin.org/write/ani-notes.pdf
There are several malicious ANI files in circulation. The one to
discuss
is
mm.jpg from newasp, but others are likely very similar. Shellcode in
mm.jpg
basically resolves kernel32 functions, downloads, and executes xx.exe
(from
behavioral analysis). It doesn't do much but delete the system's
HOSTS
file,
write bdscheca001.dll to %SYSTEM%, and registers the DLL as
ShellExecuteHooks entry.
Bob Vanderveen