Jump to content

Malwarebytes Reports Exploit


Wererommel

Recommended Posts

I have been using Vortex on the PC for years. Today, when I attempted to boot it up, Malwarebytes shut it down and gave me this report:

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 5/5/21
Protection Event Time: 5:15 PM
Log File: 1fd4ab38-ae00-11eb-af45-b06ebf84830d.json

-Software Information-
Version: 4.3.0.98
Components Version: 1.0.1273
Update Package Version: 1.0.40149
License: Premium

-System Information-
OS: Windows 10 (Build 19042.928)
CPU: x64
File System: NTFS
User: System

-Exploit Details-
File: 0
(No malicious items detected)

Exploit: 1
Malware.Exploit.Agent.Generic, C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -NonInteractive -InputFormat None -Command Get-AuthenticodeSignature 'C:\Users\[Name]\AppData\Local\Vortex\pending\temp-vortex-setup-1.4.12.exe' | ConvertTo-Json -Compress | ForEach-Object { [Convert]::ToBase64String([system.Text.Encoding]::UTF8.GetBytes($_)) }, Blocked, 0, 392684, 0.0.0, ,

-Exploit Data-
Affected Application: Vortex
Protection Layer: Application Behavior Protection
Protection Technique: Exploit payload process blocked
File Name: C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -NonInteractive -InputFormat None -Command Get-AuthenticodeSignature 'C:\Users\[name]\AppData\Local\Vortex\pending\temp-vortex-setup-1.4.12.exe' | ConvertTo-Json -Compress | ForEach-Object { [Convert]::ToBase64String([system.Text.Encoding]::UTF8.GetBytes($_)) }
URL:



(end)

 

 

Apparently, it thinks the start-up program in the Pending folder is some kind of exploit. I had this problem before, but wrote an exclusion for the virus checker. This time, there was a different startup program in the folder, and it was detected as malware. I then attempted to write an exclusion for the entire folder, but no luck. Whatever is generated there gets detected as malware.

 

 

Link to comment
Share on other sites

Some more information:

 

The boot file: temp-vortex-setup-1.4.12.exe is marked Run As Administrator. I had actually started Vortex as Administrator some months ago, but quickly realized my mistake and removed the Administrator flag. However, I cannot remove it from the boot file. There is nothing to uncheck in Properties, it was never checked. I have tried checking and unchecking it but nothing works. Deleting the boot file doesn't help, Vortex just generates a new file, also marked Administrator.

 

Just today, I tried running it in Test mode under the Compatibility tab in Properties. That worked. I saved the settings and ran it again, and it still worked, even though the Administrator icon is still there.

Link to comment
Share on other sites

The Vortex *installer* is run as admin because it installs into the write-protected c:\program files. That is expected. Vortex itself doesn't need to run as admin because for the most part it only reads from write-protected directories.

 

The installer has been virus checked by over 60 virus scanners (through virustotal.com) and none found a problem.

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...