VES 2 - Trend Micro



System Information Collector Release Readme

SIC 5.5 Build 1031

Trend Micro Incorporated, 2010. All Rights Reserved.

System Information Collector (SIC Tool) tool is a stand-alone utility that gathers detailed computer configuration run on possibly infected computers and same time collect suspicious files that will aid malware analysis.

Index

1. Product Version Information

2. SIC Components

3. SIC Features

4. System Requirements and Compatible List

5. Change logs

6. Known Issues

7. About Trend Micro Inc.

8. Contact Information

1. Product Version Information

Build Version: 5.5.0.1031

Language: English

Release Platforms:

Windows 2000 Professional and Advance Server

Windows XP Home and Professional

Windows Server 2003 Standard and Enterprise

Windows Vista (all editions) 32-bit platform

Windows 7 (all editions) 32-bit platform

Windows Server 2008 and R2 32-bit platform

2. SIC Components

a. SIC Log Reader (SLR)

Build Version: 6.0.0.9

b. SLR Rules

3. SIC Features

a. Gathered system information

b. Add SIC component integrity check (use two-pass CRC check)

c. Re-arrange system information log for better readability

d. Gathered system security information

e. Logs Trend product and pattern versions

f. Enumerate and log Temporary Internet files

g. Log LSP chain and gather files

h. Log active auto-execute registry entries

i. Log scheduled tasks

j. Log auto-execute INI entries

k. Log services in the system

l. Log hidden files hidden by rootkits

m. Archived suspected files

n. Graphical User Interface (GUI)

o. Silent console mode for logon script incorporation

p. Integrates SIC Log Reader(SLR) to help identify suspected malwares programs and reduce the size of SUSPECT.ZIP

q. Additional filtering of normal files using Trend NFC

r. Support Trend Micro Internet Security Pro 2009 product logging

4. System Requirements and Compatibility List

❑ This tool is designed to run under Microsoft Windows 2000/XP/2003/Vista/7/2008 platform but only in 32-bit system.

5. New Features in SIC 5.5.1031

❑ Integrate with (tmcomm.sys、tmcomeng.dll、TmEngDrv.dll) 2.80.0.1078

❑ Integrate with tmufeng.dll 3.0.0.1029

❑ Add a new command mode parameter -NOPOPUP for not prompting user for restarting computer if new driver is installed

❑ List services which have the ImagePath and ServiceDll registry values

❑ Fix hanging when exiting on Windows 7

❑ Add a new section in SIC's log for logging hidden files (e.g. TDSS rootkit)

+-----------------------------------------------

|Logging Hidden Files

+-----------------------------------------------

❑ Added feature to collect the following additional registry information from the system.

o HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

NoDriveTypeAutoRun

o HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

NoDriveAutoRun

o HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto

UpdateAUOptions

o HKCU\Software\Microsoft\Internet Explorer\Main

Default_Page_URL

o HKLM\Software\Microsoft\Internet Explorer\Main

Default_Page_URL

o HKCU\Software\Microsoft\Internet Explorer\Main

Default_Search_URL

o HKLM\Software\Microsoft\Internet Explorer\Main

Default_Search_URL

o HKCU\Software\Microsoft\Internet Explorer\Main

Local Page

o HKLM\Software\Microsoft\Internet Explorer\Main

Local Page

o HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System

EnableLUA

o HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System

EnableLUA=

o HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System

NoDispBackgroundPage

o HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System

NoDispBackgroundPage

o HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System

NoDispScrSavPage

o HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System

NoDispScrSavPage

o HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run

o HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run

❑ Added feature to collect the following information from the OSCE installation on the system.

o WRS Active

o Smart Scan iCRC Enabled

o iCRC OTH Pattern Version

o ENT95 Pattern Version

o OSCE Product Version

o AEGIS Enabled

o AEGIS Service Active

o DAC Policy Enabled

o DAC Pop-up Enabled

o Behavioral Monitoring Enabled

o Behavioral Monitoring Pattern Version

o Threat Detection Enabled

o Threat Detection Pattern Version

o Network Virus Wall Enabled

o Network Virus Wall Pattern Version

o GUID

o SPN Data Feedback Enabled

o SPN File Feedback Enabled

o Conficker Patch

o Parent or Server GUID

6. Known Issues

a. SIC is unable to log rootkit (UseTrueApi) when the user in Windows Vista/7 is not login as administrator. (This is possible operating system limitation)

b. SIC is able to log and archive the file executed under reserve folder name (e.g. COM1), however the archive produced cannot be extracted. (This is an operating system limitation)

c. SIC is unable to log Layered Service Provider (LogLSP=1) when the user in Windows Vista/7 is not login as administrator. (This is possible operating system limitation)

d. SIC is unable to log Master Boot Record (LogBootRecords=1) when the user in Windows Vista/7 is not login as administrator. (This is possible operating system limitation)

e. SIC takes a long time to finish logging host machine’s network connections if there are too many connections with a TIME_WAIT state. TIME_WAIT state happens when an application opens a network connection but failed to disconnect it.

f. SIC currently does not implement auto-clean up on files that are copied in SICLOG folder.

7. About Trend Micro Incorporated

Trend Micro Incorporated provides centrally controlled server-based virus protection and content filtering products and services. By protecting information that flows through Internet gateways, email servers, and file servers, Trend Micro allows companies worldwide to stop viruses and other malicious code from a central point before they can reach the desktop.

Copyright 2010, Trend Micro Incorporated.

8. Contact Information

Email: support@support.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download