TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: All
from: Mike N
date: 2007-03-25 17:06:52
subject: Re: Gotcha

From: Mike N 

John Beckett wrote on Sat, 05 August 2006 05:32
> Some small entertainment:
>
> Create file autorun.inf as below (three lines - the last two lines shown
> below should be on one line).
> Copy it to root of a USB memory stick.
> Remove and insert memory stick.
> In My Computer, double click the memory stick (or right-click, Open).
>
> ---File autorun.inf---
> [AutoRun]
> Open= cmd.exe /k color 4e && echo Gotcha!
> shell\Open\command= cmd.exe /k for /l %%a in (1,1,9) do start
>     cmd.exe /k color %%ae ^&^& prompt Gotcha!
> ---end---
>
> ---Alternative File autorun.inf---
> [AutoRun]
> Open= cmd.exe /k color 4e && echo Gotcha!
> shell\Open\command= cmd.exe /k for /l %%a in (1,1,10) do calc.exe
>
> ---end---
>
> In the above, we are running cmd.exe from your system. You can run any
> executable that you care to put on the USB.
>
> In the original of this, 'cmd.exe' was actually '.\cmd.exe' (and a copy of
> cmd.exe was on the memory stick). If anyone can tell me whether the '.\'
> is serving any useful or malware function, please let me know.
>
> John



I revisited this thread because malware is now using this technique to
spread. It's scary and nasty.   It's not like the old floppy disk stuff:
you only got
infected if you were stupid and rebooted with the floppy in the drive.   This
one zaps you if you just open a USB drive with Windows Explorer.   Instantly.
EVEN IF YOU HAVE DISABLED AUTOPLAY AND AUTORUN FOR ALL DRIVES AND DRIVE
TYPES using NoDriveAutoRun  and NoDriveTypeAutoRun in the article at
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/shellcc/platfo
rm/shell/programmersguide/shell_basics/shell_basics_extending/autorun/autoplay_
reg.asp.

  Think you're careful and don't exchange data with just anyone using USB
sticks?  What if the client you are exchanging data with had exchanged data
with his son's infected computer the night before?  Virus scanners don't
detect new viruses as a rule rather than the exception.   You can't even
preview the
USB drive contents in any way except from a command line.  And the general
public won't be using ZTree as do we geeks.   And who's to say ZTree won't
end
up invoking the AutoDetect in a future version?

   The answer is contained here: http://www.microsoft.com/technet/security/Bull
etin/MS07-006.mspx in the somewhat-related article on elevation of
privilege in Windows Shell.   Check out the steps under "Vulnerability
details / Workarounds
/ Disable the Shell hardware detection service".

Quote:
> Disabling the Shell Hardware Detection service will help protect the affected
system from attempts to exploit this vulnerability. To disable the Shell
Hardware Detection service, follow these steps:
>
> 1.  Click Start, and then click Control Panel. Alternatively, point to
Settings, and then click Control Panel.
>
> 2.  Double-click Administrative Tools.
>
> 3.  Double-click Services.
>
> 4.  Double-click Shell Hardware Detection service.
>
> 5.  In the Startup type list, click Disabled.
>
> 6.  Click Stop, and then click OK.
>
> You can also stop and disable the Shell Hardware Detection service by using
the following command at the command prompt:
>
> sc stop ShellHWDetection & sc config ShellHWDetection start= disabled
>
> Impact of Workaround: If you disable the Shell Hardware Detection service,
you may not be able to utilize Fast User Switching capabilities. Therefore,
we recommend this workaround only on systems that do not require the use of
Fast User Switching.


  I can understand the convenience of AutoPlay - although it is a
mild-to-serious problem.  But to unleash the feature of auto executing
configuration programs from a USB stick is ludicrous.  Even Microsoft seems
to recognize this in their advisory about autorun.inf -

Quote:
> Note   This feature should not be used to distribute applications on floppy
disks. Because implementing AutoRun on a floppy disk provides an easy way
to spread computer viruses, users should be suspicious of any publicly
distributed floppy disk that contains an Autorun.inf file.


  I would add "be suspicious of ALL USB sticks with Autorun.inf as well.",
although you can only inspect them from a command prompt.

  Anyone: Is Vista also susceptible with the Shell Hardware Detection service
(AKA AutoVirusExecute) enabled?

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 5030/786
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.