Hi Nina,
The interesting part is here :
{
"scan_what": 0,
"scan_how": [1, 2, 3, 4, 8, 6, 5, 7],
"vendors": ["Hidden.From.Registry"],
"name": "Msfs",
"name_process": "",
"target": "",
"pid": 0,
"path_process": "",
"path": "",
"file_md5": "",
"file_sha256": "",
"file_exists": false,
"file_signed": false,
"file_signer": "",
"file_vtscore": -1,
"file_vttotal": 0,
"is_malicious": true,
"detection_level": 2,
"status_str": "Found",
"status_choice": 2,
"status_kill": 0,
"malpe_score": -1.0,
"id": 6
},
{
"scan_what": 0,
"scan_how": [1, 2, 3, 4, 8, 6, 5, 7],
"vendors": ["Hidden.From.Registry"],
"name": "mshidkmdf",
"name_process": "",
"target": "C:\\Windows\\System32\\drivers\\mshidkmdf.sys",
"pid": 0,
"path_process": "",
"path": "\\SystemRoot\\System32\\drivers\\mshidkmdf.sys",
"file_md5": "22813FD068277CC4994CB3FB5547AA23",
"file_sha256": "AA5FCFEE8161EA12ED65FAB5A662EE3BFF5B7D725DEFF081FCB45C534FAC976A",
"file_exists": true,
"file_signed": false,
"file_signer": "",
"file_vtscore": -1,
"file_vttotal": 0,
"is_malicious": true,
"detection_level": 2,
"status_str": "Found",
"status_choice": 2,
"status_kill": 0,
"malpe_score": -1.0,
"id": 7
},
{
"scan_what": 0,
"scan_how": [1, 2, 3, 4, 8, 6, 5, 7],
"vendors": ["Hidden.From.Registry"],
"name": "mshidumdf",
"name_process": "",
"target": "C:\\Windows\\System32\\drivers\\mshidumdf.sys",
"pid": 0,
"path_process": "",
"path": "\\SystemRoot\\System32\\drivers\\mshidumdf.sys",
"file_md5": "ED11DC4C201FF6C06F171E18B379B589",
"file_sha256": "37E1901ECF54A22D016B844B68847B3894EDCA7854D713C46951BD41684735BB",
"file_exists": true,
"file_signed": false,
"file_signer": "",
"file_vtscore": -1,
"file_vttotal": 0,
"is_malicious": true,
"detection_level": 2,
"status_str": "Found",
"status_choice": 2,
"status_kill": 0,
"malpe_score": -1.0,
"id": 8
},
{
"scan_what": 0,
"scan_how": [1, 2, 3, 4, 8, 6, 5, 7],
"vendors": ["Hidden.From.Registry"],
"name": "MSKSSRV",
"name_process": "",
"target": "C:\\Windows\\System32\\drivers\\mskssrv.sys",
"pid": 0,
"path_process": "",
"path": "\\SystemRoot\\System32\\drivers\\MSKSSRV.sys",
"file_md5": "E3B4680BAB18D0898E80C6E4FE05BF55",
"file_sha256": "2F215EB0122A796674123241D7F34849B4A77E9376A373968D5ADAFAB4D428B2",
"file_exists": true,
"file_signed": false,
"file_signer": "",
"file_vtscore": -1,
"file_vttotal": 0,
"is_malicious": true,
"detection_level": 2,
"status_str": "Found",
"status_choice": 2,
"status_kill": 0,
"malpe_score": -1.0,
"id": 9
},
{
"scan_what": 0,
"scan_how": [1, 2, 3, 4, 8, 6, 5, 7],
"vendors": ["Hidden.From.Registry"],
"name": "msiserver",
"name_process": "",
"target": "C:\\Windows\\System32\\msiexec.exe",
"pid": 0,
"path_process": "",
"path": "C:\\WINDOWS\\system32\\msiexec.exe /V",
"file_md5": "2D9F692E71D9985F1C6237F063F6FE76",
"file_sha256": "199B3890D28A1F5906F4014E73615A268B3C4414F1F71697BF13E0D464258D54",
"file_exists": true,
"file_signed": false,
"file_signer": "",
"file_vtscore": -1,
"file_vttotal": 0,
"is_malicious": true,
"detection_level": 2,
"status_str": "Found",
"status_choice": 2,
"status_kill": 0,
"malpe_score": -1.0,
"id": 10
}
According to the hashes reported by RogueKiller and after submitting them to VirusTotal, these files are legit.
It may be a bug with RogueKiller or, like I said earlier, the rootkit is messing with the files enumeration functions. In any case, it could be interesting to see if those detections are still present after the rootkit removal.
I will follow at thread at whatthetech with great interest.
Regards.