Process Explorer is provided for free with a capacity of 1.47 MB. It can run on Windows XP and newer versions. The current version of this tool is 14.1 and you can download it here, or you can also run from this link.
As you can see in Figure 4, this tool will provide more detailed information about processes than what is received from Task Manager.
You will see in Process Explorer, the progress tree in the left column shows the parent-child relationship. If a process is suspected, related processes are also suspicious. Another interesting feature is the ability to right click on a process and select 'Search online' to find more information about the process.
However, one thing to keep in mind is that some malware can use randomly generated process names for the purpose of distracting you in identity.
As mentioned above, malware that is often packaged and purple in Process Explorer is a sign that files are packaged; Process Explorer looks for signatures of packages and uses a number of techniques to mark these processes.
Some familiar processes make us mistakenly think of them as malware, such as svchost.exe, rundll32, taskhost.exe, etc. However, some people who create malware know this and often hide malware under processes and run as the system process.
Process Explorer's bottom panel is opened from the View menu. When you open this panel you can specify whether to display DLL files. In the DLL view, we can see what is inside the process, can view data or images. This view displays the loaded drivers and can check the string as well as the digital signature.
If it detects that some process claims to be Microsoft but not digitally signed, this is a suspect process. We can selectively check digital signatures with the Verify button on the Image tab in Properties (accessed by double-clicking the process name). You can see the Properties dialog box with the Verify button as shown in Figure 6.
When verifying a process, the tool will connect to the Internet to check the Certificate Revocation List (CRL). You can add ' Verified Signers ' column to Process Explorer' s display by selecting View | Select Columns and check ' Verified Signer '.
In the following, you can see the newly added columns and digital signatures that have been verified.
If you want to verify all digital signatures, click the Options menu and select ' Verify image signatures '.
Another Sysinternals tool you can use for digital signature verification is Sigcheck, a tool that runs on Windows XP and recent versions. Its current version is 1.71 and can be downloaded here.
Sigcheck is a command line tool that can be used to scan the system. It includes many parameters. By using the -u switch, you will get a list of unsigned files. In addition, you can find hash values (used to check malicious files), and check if the file name in the list is valid for the internal file name.
However, it should be noted that malware creators can also create digital certificates for their software, so the existence of a valid certificate does not guarantee that the process is not malicious.
Conclude
In Part 1 of this series, I showed you how to use Process Explorer to find suspicious processes that are malware. In Part 2 of this series, I will show you how to use Autoruns to find the malware that boots at startup, as well as how to use Process Monitor to track malware actions and how to remove malware from the system. .