Jump to content

Recommended Posts

Hi

No, this is not a false positive.

Malware can use this technique to load it's own executables.

http://blogs.mcafee.com/mcafee-labs/image-file-execution-options

Here's one example of malware using that.

http://www.threatexpert.com/report.aspx?md5=a527f6279d441cfc0d11cccd3ce82883

Installs a default debugger that is injected into the execution sequence of a target application. If a threat is installed as a default debugger, it will be run every time a target application is attempted to be launched - either to mimic it and hide its own presence (e.g. an open port or a running process), or simply to be activated as often as possible.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe]

Debugger = ""%UserProfile%\%UserName%1\winlogon.exe""

so that winlogon.exe is injected into the execution sequence of avp.exe by being installed as its default debugger

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.