diTii.com Digital News Hub

Sign up with your email address to be the first to know about latest news and more.

I agree to have my personal information transfered to MailChimp (more information)


MS08-067: How to diagnose, fix guide, tips tutorial

A quick word of warning here – there are other reasons that SVCHOST.EXE might be experiencing high CPU usage, or may crash – remember that if your systems are already patched, then you’re probably experiencing something other than an MS08-067 exploit. Here’s some of the common symptoms that you may see in relation to MS08-067 exploits:

  1. High CPU usage – especially by SVCHOST.EXE.
  2. High connections to TCP port 445 (see the screenshot below)  
  3. SVCHOST.EXE crashes – all of the services running in the same SVCHOST.EXE process will crash

Here’re some ways to identify if you are the victim of the exploit:

Steps taken to identify Worm: Win32/Conficker.A

  1. Run SERVICES.MSC: Check for a service that does not have a description with a name that is 4 to 8 bytes in length.  This may be a Random Service Name (RANDOMSERVICENAME) that changes with each reboot
  2. Check the Registry for RANDOMSERVICENAME:
    Check this RANDOMSERVICENAME service in the registry
    "ImagePath"= “C:\Windows\system32\svchost.exe -k netsvcs”
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ RANDOMSERVICENAME \Parameters]
  3. The DLL may be 62xxx bytes in size – depending on the variant of the malware

Steps taken to identify Backdoor:Win32/IRCbot.BH

  1. Run Registry Editor
  2. Check two subkeys:
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    • HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  3. Check for the presence of one o the following registry values / data.  If the entries are there, the system is infected:
    Value: "MS Gaurd Driver"
    With data: "%ProgramFiles%\msgaurd.exe"
    Value: "SoundMAX Driver"
    With data: "%ProgramFiles%\soundmax.exe"
    Value: "MediaAVI Driver"
    With data: "%ProgramFiles%\mediaavi.exe"

If you discover that you have an infected system, here are the next steps:

  1. Use ACL’s to block port 445 on all network devices until all systems are patched
  2. Use IPSec to block inbound and outbound access to TCP port 445 on all Windows systems.  By blocking inbound access, a system can be protected from the attack, and by blocking outbound access, affected systems can be prevented from attacking others.  Windows Firewall is only able to block inbound access – which is why IPSec is required.
  3. All infected and uninfected systems should be patched with the latest security updates.  The uninfected systems will be protected from the worms by the updates, however the infected systems will still try to attack systems
  4. On the infected systems, ensure that your AV software is up to date.  The major AV packages such as Antigen, ESET, EZETrust, Kaspersky, McAfee, Microsoft Forefront, Symantec and Trend have AV definitions to detect these worms

As always, if you have any questions regarding this or any other exploit on a Windows system, or if you run into difficulties with cleaning infected Windows systems, please open a Support Incident with our Security team.  Below are some additional resources regarding Security and Vulnerabilities.

With that, we’ve come to the end of this post.  Until next time …

Additional Resources:

Ask Perf

Share This Story, Choose Your Platform!

Get Latest News

Subscribe to Digital News Hub

Get our daily newsletter about the latest news in the industry.
First Name
Last Name
Email address
Secure and Spam free...