07-24-2007 04:59 AM - edited 03-10-2019 03:43 AM
Does anyone know exactly what this process is doing?
Kernel functionality has been modified by the module C:\WINDOWS\system32\Drivers\uphcleanhlp.sys. The module 'C:\WINDOWS\system32\Drivers\uphcleanhlp.sys' is used by entries in the System syscall table. The specified action was taken to set detected rootkit as Untrusted.
It has triggered other rules that appear to fall into the Rootkit policy and not sure why this looks as a rootkit when its part of the profile cleanup.
Thanks!
07-24-2007 10:15 AM
Well, basically any piece of software that uses is put in the syscall table in windows, will be caught by the rootkit rule. You just need to do an exception for it. I must admit that i haven't seen this before, is it windows xp machines this is happening on ?
07-24-2007 10:27 AM
Yes, it is a Windows XP SP2 machine. I thought that it was weird too but i dont have much experience with the root-kit proctection module either.
Thanks,
07-24-2007 11:01 AM
I have seen this quite often and seems legit. Here is the details on the service.
Just add it to your Kernel Protection Set-Rootkit-Trusted rule with the hash **\*\uphcleanhlp.sys at the simplest level.
07-24-2007 11:44 AM
what is the best way to add this to the Kernal Protection Set Root-Kit-Trusted rule?
I do not like to modify the rules that cisco provides because it makes upgrading challenging.
I originally created a new Rule Module for this root-kit exception but it does not show up for me to use. I can only use previous rule modules or the default one "Operating System - Base Protection - Windows V 5.2.r203'
07-24-2007 11:53 AM
You should just be able to add a new kernel protection rule to the module you have then.
It is just a kernel protetion rule you need to add. Options are SET, ROOTKIT, TRUSTED and in the Modules modify Kernel Functionality" add the hash to the "Included module hashes:" section.
Do this manually and do not use the wizard.
07-24-2007 12:39 PM
within the kernel protection rule I do not see Options SET, ROOKIT or Trusted, but I do see Kernel Functionality and such.
Any additional help would be appreciated.
Thanks
07-24-2007 12:47 PM
07-25-2007 05:04 AM
Bradley thanks for the screen shot. I will monitor this rule and see where it gets me but I appreciate your efforts.
07-25-2007 05:51 AM
when I click on the "system state" caption under the rule in my event logs i get the message pop up. What does this mean and how do I fix?
The rule that generated this event only triggers under the system state "rootkit=untrusted".
07-25-2007 09:29 AM
It is just saying that you need to look at the system states as that rule is only enforced for a certain system state. With the rootkit module a system is placed in that state after it fires the rootkit rule. By using the rule I put up previously it will not be tagged as a rootkit untrusted and therefore the rule module for rootkit detected will not be enforced.
After you put the rule in you will want to reset the agent on the system that had the rootkit. And you can log the new rule to make sure it is working correctly.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: