A forum for reverse engineering, OS internals and malware analysis 

All off-topic discussion goes here.
 #4884  by EP_X0FF
 Fri Feb 04, 2011 5:31 pm
How somebody might have sample, if this stuff not yet released?
I dont understand why this rootkit is undetectable...
According to original "Cached Data Attack" published in 2008 main goal of this technique was on the fly patching kernel memory belongs to registry hives.
In simple words:

1. virtual memory address for key located
2. determined address of sensitive data value (that holds administrator hashes)
3. value rewrites with precomputed fake data

Since this was done without using Configuration Manager internal/external mechanisms data wasn't flushed on disk (as Windows normally does with reg hives - creates list of so-called dirty bins when registry value is written and then schedules hive flush).

This is detectable via cross checking of the in-memory hive and on-disk hive. Volatility for example does it.

Thread moved, because it's malware unrelated.
 #4886  by Flopik
 Fri Feb 04, 2011 6:45 pm
I have coded registry parsing lib that will able to view this kind of attack then. The usermode registry api will return the data spoofed if I understand correctly.
This is far from being a advanced technic