Potentially Unwanted Program Self-Protection Technologies

Last month we discussed potentially unwanted programs that use rootkit components to protect some of their files and registry keys against modification and removal.

This month we will illustrate other self-protection methods that complicate removal and/or disabling potentially unwanted applications.

We analyzed Hometab and found that it prevents users from disabling its Browser Helper Object (BHO) in Internet Explorer. It sets the following value in the system registry:

[HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID]
"{5c75ddfa-a092-4470-8dad-265d257351aa}" = "1"

This means a user cannot disable the BHO component from Internet Explorer’s Manage Add-ons menu:

Typically, a BHO asks for permission before being enabled. However, Hometab doesn’t ask for permission to be enabled. It accomplishes this by adding a CLSID sub key to the following registry key:

[HKEY_USERS\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\ {5c75ddfa-a092-4470-8dad-265d257351aa}]

If you see the disabled “Disable” button you can be sure this was made intentionally by the application’s developers to confuse a user who wants to remove or disable the unsolicited add-on.

An extension from Conduit runs a special service responsible for monitoring changes to its registry keys. Once a modification is detected it will restore the changed parameter. Modifications to its settings cannot be made until the watchdog service is stopped.
To illustrate, the Internet Explorer search scope setting is called “trovi-search”, which is located in the following registry key:

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{014DB5FA-EAFB-4592-A95B-F44D3EE87FA9}]

In theory, it can be disabled from Internet Explorer’s Add-On Manager:

However, after restarting Internet Explorer the Trovi search provider has been re-enabled.

The same is true if we manually delete the corresponding Search Scope registry key from the system registry:

It will be restored after Internet Explorer restarts.
The service is called CltMngSvc and has the following description:

“This service loads the Search Protector, which maintains your selected Search settings, and enables auto-updates.”

And the Search Protector (SPPD) is registered as the driver, SPPD.sys:

We can remove the Search provider only when the service protecting it is stopped:

After restarting Internet Explorer the Trovi search provider’s search suggestions are disabled.

The technique used by the PUP involves injecting its DLL (SPVC32.dll) into Internet Explorer’s processes (iexplore.exe) via the service process (CltMngSvc.exe):

The service manager CltMngSvc.exe starts the process cltmng.exe which has pretty interesting code inside:

The code snippet above allows injecting the DLL into the process using a remote thread. This means the PUP does not need to be installed as Browser Helper Object in Internet Explorer - it can achieve that by injecting its DLL using the service process.

Once installed into Internet Explorer, the PUP can get full access to data submitted and transferred through the browser. Be wary of PUP extensions as they may violate the confidentiality of your private information. For example, the Chrome browser alerts a user about the potential risks of installing the PUP’s extension.

Read also:
Lavasoft Security Bulletin - October 2014: Top Threats.
Lavasoft Security Bulletin - October 2014: Bot Review.

  • Back to articles


  • Share this post:    Twitter Facebook
    x

    Our best antivirus yet!

    Fresh new look. Faster scanning. Better protection.

    Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

    For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

    Download adaware antivirus 12
    No thanks, continue to lavasoft.com
    close x

    Discover the new adaware antivirus 12

    Our best antivirus yet

    Download Now