0% found this document useful (0 votes)
408 views

Trojan Multi Accesstr

Trojan.Multi.Accesstr detection occurs when essential Windows utilities like osk.exe and magnify.exe in the system32 folder have been replaced with cmd.exe or powershell.exe, granting attackers command line access with SYSTEM privileges. To repair an affected system, sfc /scannow and DISM commands should be run to attempt restoring the original files. If that fails, the files must be manually replaced using the listed detection names and file paths.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
408 views

Trojan Multi Accesstr

Trojan.Multi.Accesstr detection occurs when essential Windows utilities like osk.exe and magnify.exe in the system32 folder have been replaced with cmd.exe or powershell.exe, granting attackers command line access with SYSTEM privileges. To repair an affected system, sfc /scannow and DISM commands should be run to attempt restoring the original files. If that fails, the files must be manually replaced using the listed detection names and file paths.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

What is detected as Trojan.Multi.Accesstr ?

Trojan.Multi.Accesstr detection is triggered when KES detects that one of Windows utilities in %systemroot%\system32 folder is
replaced by cmd.exe or powershell.exe.
Please see below for a list of affected files with exact detection names. Detection event looks like this :

Trojan.Multi.Accesstr object detected in System Memory


Result: Untreated: Trojan.Multi.Accesstr.a Reason: Skipped

 Detection names and affected files :

 Trojan.Multi.Accesstr.a.ok :
"%SystemRoot%\\system32\\osk.exe"
"%SystemRoot%\\syswow64\\osk.exe"
 Trojan.Multi.Accesstr.a.mf :
"%SystemRoot%\\system32\\magnify.exe"
"%SystemRoot%\\syswow64\\magnify.exe"
 Trojan.Multi.Accesstr.a.ds :
"%SystemRoot%\\system32\\displayswitch.exe"
"%SystemRoot%\\syswow64\\displayswitch.exe"
 Trojan.Multi.Accesstr.a.ab :
"%SystemRoot%\\system32\\atbroker.exe"
"%SystemRoot%\\syswow64\\atbroker.exe"
 Trojan.Multi.Accesstr.a.um
"%SystemRoot%\\system32\\utilman.exe"
"%SystemRoot%\\syswow64\\utilman.exe"
 Trojan.Multi.Accesstr.a.sh
"%SystemRoot%\\system32\\sethc.exe"
"%SystemRoot%\\syswow64\\sethc.exe"
 Trojan.Multi.Accesstr.a.ed
"%SystemRoot%\\system32\\easeofaccessdialog.exe"
"%SystemRoot%\\syswow64\\easeofaccessdialog.exe"
 Trojan.Multi.Accesstr.a.nr
"%SystemRoot%\\system32\\narrator.exe"
"%SystemRoot%\\syswow64\\narrator.exe"

 Why was the detection published ? :

Replacing aforementioned utilities with cmd.exe/powershell.exe provides adversaries with an easily available backdoor. For
example C:\Windows\System32\sethc.exe is launched when the shift key is pressed five times and
C:\Windows\System32\utilman.exe is launched when the Windows + U key combination is pressed. Both utilities can be executed
from login screen (both offline and when connected through RDP).
If these tools are replaced with cmd.exe/powershell.exe, then a command line with SYSTEM privileges will be launched.
Through Kaspersky Managed Protection service AMR has observed that this attack has been executed several times recently, so a
corresponding record was published in order for KL products to detect the corrupted system files allowing the attack.
 How to repair an affected system?

After attack is detected, KES will try to restore the original files by looking for a backup of the file on the endpoint machine.
According to AMR statistics, this operation is successful 60% of the times.
However backup of these files may be missing from the affected PC, so a manual attempt might be in order.

Here's the recommended way to proceed with repairing an affected system manually:

1) Run sfc /scannow


2) If sfc command fails to repair the files, customer should follow these steps :
- run DISM tool by executing DISM /Online /Cleanup-Image /RestoreHealth
- run sfc /scannow again after DISM finishes
3) If all of the above fails to restore original files or these tools are unavailable for some reason, one can replace the files manually
using the list above.

On Windows 7 DISM does not have /RestoreHealth option. Instead you should use /ScanHealth option like this: DISM /Online
/Cleanup-Image /ScanHealth.
Make sure this update is installed before running DISM with /ScanHealth option :
https://support.microsoft.com/en-us/help/2966583/improvements-for-the-system-update-readiness-tool-in-windows-7-and-win

If DISM tool fails to load source files, it might be effective to use a Windows installation media as a repair source. In that case
customer should add /Source: parameter. For example DISM /Online /Cleanup-Image /RestoreHealth
/Source:E:\sources\install.wim where e:\sources is a path to Windows installation media.
Please see relevant Microsoft Docs article for full information on using DISM to repair OS :
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/repair-a-windows-image

You might also like