SlideShare ist ein Scribd-Unternehmen logo
1 von 7
TECHNICAL CASE STUDY
   Virus – KHATRA.exe




                    1
Introduction                                                                        Quick Facts
                                                                                    Khatra.exe has the following behavior:
                                                                                    • Added as a Registry auto start to load
Virus infection is one big issue for a layman computer user as any virus
                                                                                      Program on Boot up
infection may result in loss and corruption of important data. Even when a virus
                                                                                    • Created as a process on disk
is removed from your computer by the antivirus installed on your computer the
                                                                                    • Executed as a Process
infections and other damages caused by the virus may still remain. The
                                                                                    • Has code inserted into its Virtual
infections which remains after virus removal includes invisible folder options in
                                                                                      Memory space by other programs
windows explorer, task manager still disabled, registry editing disabled and
                                                                                    • Copied to multiple locations on the
some autorun.inf files created by the virus in the root drive of each partition.
                                                                                      system
Here we will share the methods to repair such damages caused by the virus
                                                                                    • Deleted as a process from disk
Khatra.exe.
                                                                                    • Created as a new Background Service on
KHATRA.exe is a virus which automatically closes your browser whenever you            the machine
try to open a browser and search remove khatra.exe. You cannot delete               • Created by processes which appear to be
khatra.exe, gHost.exe or Xplorer.exe which is created by the same virus as            checking for interception by security
these processes will keep running.                                                    products
                                                                                    • Creates multiple folders
Let us discuss how HandsFree Networks has found out a removal procedure to          • Prevents access to Task Manager and
delete khatra.exe or gHost.exe or Xplorer.exe virus.                                  Control panel.




System Changes

The following system changes may indicate the presence of this malware:
       The presence of the following files:
       %SystemDrive%KHATRA.exe
       %windir%Xplorer.exe
       %windir%systemgHost.exe
       <system folder>KHATRA.exe
       The presence of the following registry modifications:
            Added value: "G_Host"
            With data: ""%windir%systemgHost.exe" /Reproduce"
            To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun
            Added value: "Xplorer"
            With data: "<system folder>KHATRA.exe"
            To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun
            Added value: "Taskman"
            With data: "<system folder>KHATRA.exe"
            To subkey: HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon
            Added value: "Xplorer"
            With data: ""%windir%Xplorer.exe" /Windows"
            To subkey: HKLMSOFTWAREKHATRAStartup_List
            Added value: "load"
            With data: "<system folder>KHATRA.exe"
            To subkey: HKCUSoftwareMicrosoftWindows NTCurrentVersionWindows




                                                                                                                                2
Khatra.exe virus Detection / Prevention using HandsFree Tool:

 DART 27 “System Star-up Control” is enabled and it prevents any changes happening to system related registry keys. When Khatra
 virus initiates it tries to add values into the registry which is been blocked using this DART. And the user is also alerted about the
 same via the Dashboard.

 In Dashboard under security we would see the alerts for the same. The screen shot below show how we check these alerts.

 Once we click details it would show us the complete list of events causing these alerts, as shown below.




                                                                                                                                          3
Analysis of Khatra virus process creation & registry value addition

 An analysis of the Khatra virus process creation and registry value addition, we check this through the event log of that machine,
 as mentioned above.

 This clearly shows that the “KHATRA.exe” starts to initiate and tries to create registry values in the startup which have been
 prevented by the HandsFree Tool proactively.




                                                                                                                                      4
Prevent / Remove using HandsFree Tool
 This virus adds few entries into the registry value & also there are 3 file which reside on the machine. The 3 files are khatra.exe,
 Xplorer.exe & gHost.exe. We can prevent as well as remove these files and registry values using DART 240 - Intrusion Protection
 Management & DART 218 –Clean folder, to prevent and remove these files from the machine.

 We add these values in DART 240 under “Items to Disable” to permanently prevent these registry values from adding.
    RegKey,,HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun,G_Host,c:windowssystemgHost.exe
    /Reproduce
    RegKey,,HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun,Xplorer,c:windowssystem32KHATRA
    .exe
    Regkey,,HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon,Taskman,c:windowssystem32KHATRA.exe
    Regkey,,HKLMSOFTWAREKHATRAStartup_List,Xplorer,c:windowsXplorer.exe /Windows
    Regkey,,HKCUSoftwareMicrosoftWindows NTCurrentVersionWindows,load,c:windowssystem32KHATRA.exe

 If the value is already been added we need to manually remove them from the above mentioned location.

 To delete the files from the machine we can use any of the “Clean folder’ DARTs we have taken DART 218 is this case study.

 We add the following value in DART 218 under “Directory or file to scan” section,
    1, 1, c:windowssystem,v1
    1, 1, c:windowssystem32,v2
    We add the following in the “File Groups” section.
    v1, Xplorer.exe, gHost.exe
    v2,KHATRA.exe




                                                                                                                                        5
Procedure to remove Khatra.exe virus manually
  1.   Go to task manager and select regsvr.exe (if found), gHost.exe, khatra.exe, Xplorer.exe rt click and select end process tree.
       Press WIN+r or start>RUN
  2.   Type cmd and hit enter
  3.   GO to the the drive where your OS is installed
  4.   In the command prompt make sure you get the command line as c: or d: (this can be achieved by the command "cd .."
       without quotes)
  5.   Type attrib -s -h -r khatra.exe
       Repeat the same process for the location c:windowssystem32
  6.   Type del khatra.exe
  7.   Follow the same process for gHost.exe & Xplorer.exe as they are also part of the virus.

 To make sure that the virus is out of you pc , check your registry
  1. win+R type regedit
  2. ctrl+F type in search one by 1 the names of the 3 processes i.e khatra,gHost,Xplorer
  3. Search the entire registry n go-on deleting the values you find.




                                                                                                                                       6
Do you want to find how to handle more
                                                                                 Support task with less effort?
                                                             Sign up now for a free trial at www.handsfreenetworks.com


To learn more about HandsFree Networks and our solution, visit www.handsfreenetworks.com




HandsFree Networks and related HandsFree Networks Inc. logos are registered trademarks of
HandsFree Networks Inc.

Copyright ©2010 HandsFree Networks. All rights reserved. All other company, product and brand
names are trademarks of their respective owners.



                                                                                                                         7

Weitere ähnliche Inhalte

Was ist angesagt? (8)

Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Atc ny friday-talk_20080808
Atc ny friday-talk_20080808
 
Care & Feeding Of Your Computer
Care & Feeding Of Your ComputerCare & Feeding Of Your Computer
Care & Feeding Of Your Computer
 
2600 v03 n07 (july 1986)
2600 v03 n07 (july 1986)2600 v03 n07 (july 1986)
2600 v03 n07 (july 1986)
 
Optimize Your Pc
Optimize Your PcOptimize Your Pc
Optimize Your Pc
 
SysInfoTools NSF Local Security Remover
SysInfoTools NSF Local Security RemoverSysInfoTools NSF Local Security Remover
SysInfoTools NSF Local Security Remover
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 

Ähnlich wie Technical case study on khatra exe virus

Optix Pro Bo2 K Trojan
Optix Pro Bo2 K TrojanOptix Pro Bo2 K Trojan
Optix Pro Bo2 K Trojan
Shinra
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
eugeniadean34240
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
Concentrated Technology
 

Ähnlich wie Technical case study on khatra exe virus (20)

Optix Pro Bo2 K Trojan
Optix Pro Bo2 K TrojanOptix Pro Bo2 K Trojan
Optix Pro Bo2 K Trojan
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
How to remove conduit search and other toolbars — extended guide
How to remove conduit search and other toolbars — extended guideHow to remove conduit search and other toolbars — extended guide
How to remove conduit search and other toolbars — extended guide
 
Antivirus
AntivirusAntivirus
Antivirus
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Introduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse EngineeringIntroduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse Engineering
 
Virus Elimination Course
Virus Elimination Course Virus Elimination Course
Virus Elimination Course
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
Chapter 8 system soft ware
Chapter 8 system soft wareChapter 8 system soft ware
Chapter 8 system soft ware
 
Gopcpro Computer Cleaning-Software | PC-Cleaner
Gopcpro Computer Cleaning-Software | PC-CleanerGopcpro Computer Cleaning-Software | PC-Cleaner
Gopcpro Computer Cleaning-Software | PC-Cleaner
 
Win32patched blogspot in
Win32patched blogspot inWin32patched blogspot in
Win32patched blogspot in
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Technical case study on khatra exe virus

  • 1. TECHNICAL CASE STUDY Virus – KHATRA.exe 1
  • 2. Introduction Quick Facts Khatra.exe has the following behavior: • Added as a Registry auto start to load Virus infection is one big issue for a layman computer user as any virus Program on Boot up infection may result in loss and corruption of important data. Even when a virus • Created as a process on disk is removed from your computer by the antivirus installed on your computer the • Executed as a Process infections and other damages caused by the virus may still remain. The • Has code inserted into its Virtual infections which remains after virus removal includes invisible folder options in Memory space by other programs windows explorer, task manager still disabled, registry editing disabled and • Copied to multiple locations on the some autorun.inf files created by the virus in the root drive of each partition. system Here we will share the methods to repair such damages caused by the virus • Deleted as a process from disk Khatra.exe. • Created as a new Background Service on KHATRA.exe is a virus which automatically closes your browser whenever you the machine try to open a browser and search remove khatra.exe. You cannot delete • Created by processes which appear to be khatra.exe, gHost.exe or Xplorer.exe which is created by the same virus as checking for interception by security these processes will keep running. products • Creates multiple folders Let us discuss how HandsFree Networks has found out a removal procedure to • Prevents access to Task Manager and delete khatra.exe or gHost.exe or Xplorer.exe virus. Control panel. System Changes The following system changes may indicate the presence of this malware: The presence of the following files: %SystemDrive%KHATRA.exe %windir%Xplorer.exe %windir%systemgHost.exe <system folder>KHATRA.exe The presence of the following registry modifications: Added value: "G_Host" With data: ""%windir%systemgHost.exe" /Reproduce" To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun Added value: "Xplorer" With data: "<system folder>KHATRA.exe" To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun Added value: "Taskman" With data: "<system folder>KHATRA.exe" To subkey: HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon Added value: "Xplorer" With data: ""%windir%Xplorer.exe" /Windows" To subkey: HKLMSOFTWAREKHATRAStartup_List Added value: "load" With data: "<system folder>KHATRA.exe" To subkey: HKCUSoftwareMicrosoftWindows NTCurrentVersionWindows 2
  • 3. Khatra.exe virus Detection / Prevention using HandsFree Tool: DART 27 “System Star-up Control” is enabled and it prevents any changes happening to system related registry keys. When Khatra virus initiates it tries to add values into the registry which is been blocked using this DART. And the user is also alerted about the same via the Dashboard. In Dashboard under security we would see the alerts for the same. The screen shot below show how we check these alerts. Once we click details it would show us the complete list of events causing these alerts, as shown below. 3
  • 4. Analysis of Khatra virus process creation & registry value addition An analysis of the Khatra virus process creation and registry value addition, we check this through the event log of that machine, as mentioned above. This clearly shows that the “KHATRA.exe” starts to initiate and tries to create registry values in the startup which have been prevented by the HandsFree Tool proactively. 4
  • 5. Prevent / Remove using HandsFree Tool This virus adds few entries into the registry value & also there are 3 file which reside on the machine. The 3 files are khatra.exe, Xplorer.exe & gHost.exe. We can prevent as well as remove these files and registry values using DART 240 - Intrusion Protection Management & DART 218 –Clean folder, to prevent and remove these files from the machine. We add these values in DART 240 under “Items to Disable” to permanently prevent these registry values from adding. RegKey,,HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun,G_Host,c:windowssystemgHost.exe /Reproduce RegKey,,HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun,Xplorer,c:windowssystem32KHATRA .exe Regkey,,HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon,Taskman,c:windowssystem32KHATRA.exe Regkey,,HKLMSOFTWAREKHATRAStartup_List,Xplorer,c:windowsXplorer.exe /Windows Regkey,,HKCUSoftwareMicrosoftWindows NTCurrentVersionWindows,load,c:windowssystem32KHATRA.exe If the value is already been added we need to manually remove them from the above mentioned location. To delete the files from the machine we can use any of the “Clean folder’ DARTs we have taken DART 218 is this case study. We add the following value in DART 218 under “Directory or file to scan” section, 1, 1, c:windowssystem,v1 1, 1, c:windowssystem32,v2 We add the following in the “File Groups” section. v1, Xplorer.exe, gHost.exe v2,KHATRA.exe 5
  • 6. Procedure to remove Khatra.exe virus manually 1. Go to task manager and select regsvr.exe (if found), gHost.exe, khatra.exe, Xplorer.exe rt click and select end process tree. Press WIN+r or start>RUN 2. Type cmd and hit enter 3. GO to the the drive where your OS is installed 4. In the command prompt make sure you get the command line as c: or d: (this can be achieved by the command "cd .." without quotes) 5. Type attrib -s -h -r khatra.exe Repeat the same process for the location c:windowssystem32 6. Type del khatra.exe 7. Follow the same process for gHost.exe & Xplorer.exe as they are also part of the virus. To make sure that the virus is out of you pc , check your registry 1. win+R type regedit 2. ctrl+F type in search one by 1 the names of the 3 processes i.e khatra,gHost,Xplorer 3. Search the entire registry n go-on deleting the values you find. 6
  • 7. Do you want to find how to handle more Support task with less effort? Sign up now for a free trial at www.handsfreenetworks.com To learn more about HandsFree Networks and our solution, visit www.handsfreenetworks.com HandsFree Networks and related HandsFree Networks Inc. logos are registered trademarks of HandsFree Networks Inc. Copyright ©2010 HandsFree Networks. All rights reserved. All other company, product and brand names are trademarks of their respective owners. 7