Jump to content

Malwarebytes Reports Exploit


Wererommel

Recommended Posts

Posted

I have been using Vortex on the PC for years. Today, when I attempted to boot it up, Malwarebytes shut it down and gave me this report:

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 5/5/21
Protection Event Time: 5:15 PM
Log File: 1fd4ab38-ae00-11eb-af45-b06ebf84830d.json

-Software Information-
Version: 4.3.0.98
Components Version: 1.0.1273
Update Package Version: 1.0.40149
License: Premium

-System Information-
OS: Windows 10 (Build 19042.928)
CPU: x64
File System: NTFS
User: System

-Exploit Details-
File: 0
(No malicious items detected)

Exploit: 1
Malware.Exploit.Agent.Generic, C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -NonInteractive -InputFormat None -Command Get-AuthenticodeSignature 'C:\Users\[Name]\AppData\Local\Vortex\pending\temp-vortex-setup-1.4.12.exe' | ConvertTo-Json -Compress | ForEach-Object { [Convert]::ToBase64String([system.Text.Encoding]::UTF8.GetBytes($_)) }, Blocked, 0, 392684, 0.0.0, ,

-Exploit Data-
Affected Application: Vortex
Protection Layer: Application Behavior Protection
Protection Technique: Exploit payload process blocked
File Name: C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -NonInteractive -InputFormat None -Command Get-AuthenticodeSignature 'C:\Users\[name]\AppData\Local\Vortex\pending\temp-vortex-setup-1.4.12.exe' | ConvertTo-Json -Compress | ForEach-Object { [Convert]::ToBase64String([system.Text.Encoding]::UTF8.GetBytes($_)) }
URL:



(end)

 

 

Apparently, it thinks the start-up program in the Pending folder is some kind of exploit. I had this problem before, but wrote an exclusion for the virus checker. This time, there was a different startup program in the folder, and it was detected as malware. I then attempted to write an exclusion for the entire folder, but no luck. Whatever is generated there gets detected as malware.

 

 

Posted

Some more information:

 

The boot file: temp-vortex-setup-1.4.12.exe is marked Run As Administrator. I had actually started Vortex as Administrator some months ago, but quickly realized my mistake and removed the Administrator flag. However, I cannot remove it from the boot file. There is nothing to uncheck in Properties, it was never checked. I have tried checking and unchecking it but nothing works. Deleting the boot file doesn't help, Vortex just generates a new file, also marked Administrator.

 

Just today, I tried running it in Test mode under the Compatibility tab in Properties. That worked. I saved the settings and ran it again, and it still worked, even though the Administrator icon is still there.

Posted

The Vortex *installer* is run as admin because it installs into the write-protected c:\program files. That is expected. Vortex itself doesn't need to run as admin because for the most part it only reads from write-protected directories.

 

The installer has been virus checked by over 60 virus scanners (through virustotal.com) and none found a problem.

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...