Preliminary note: This process will normally remove Poweliks from a system. However, Poweliks is merely a tiny fraction of what is usually also alongside it on an infected system; after all, it is a downloader. So if you’re trying DIY disinfection, just be advised that there is a very good chance that your system is still infected even after this process by multiple other malware families. I would advise hiring a professional in your local area to assist with the job instead of risking your personal information and data!
I’ve long been preaching that scanners just don’t do the trick as a universal, one-size-fits-all solution to malware, and that’s precisely because they can’t possibly catch everything. The latest zero-day threats will always find a way to evade even the best antimalware tools in some capacity, and because of that, a complete reliance on scanners for either proactive blocking of threats or removal of existing embedded threats is misguided and will always run into trouble.
This latest threat, which has now been circulating for a few months, is a perfect example of this. It’s called Poweliks, and it’s unique for one very specific reason: it infects the system without the use of a filesystem component at all. Now, it’s not like this is the first threat to accomplish such things; before it, we had such interesting specimens as the TDL4 rootkit, which created a hidden, encrypted partition at the end of the drive containing the rootkit’s code, which was loaded at each boot before the Windows partition. Eventually, however, this rootkit was identifiable (at least, somewhat) via the presence of a conspicuous (and suspicious) 10 MB or so empty space (RAW) at the end of a drive. And it was easy to kill: simply delete that partition from offline and set the proper Windows partition as active.
Poweliks uses a totally different approach: it embeds itself in the system’s registry in an encrypted key that actually contains the body of the malware as opposed to mere settings and program data (as is intended for the Windows registry to contain). The identity of the key has changed across variants, but the most recent one I’ve seen is:
What about symptoms? Well, they’re not all that clear-cut. The machine will certainly be slower than normal. Apart from that, it may simply be generally infected, as that’s what Poweliks is all about: downloading other infections. The problem is that you cannot search for a particular process in memory or even a file on the hard drive, as no file exists and the process is always a completely legitimate one.
However, at least as of currently, it is not random. The most recent process which has been associated with Poweliks infections is dllhost.exe. It’s a totally normal process, so seeing it running by no means indicates infection. However, seeing it running persistently and for long periods of time is a bit more suspicious if you’re having other symptoms. And if you close dllhost.exe using Task Manager and it repeatedly reappears in multiple instances, it’s a really suspicious scenario. You’ll also likely see tons of other random (normally legitimate) processes running which should not need to be running. These can’t be specified here as they are random.
For further diagnosis, however, you can download Process Explorer to inspect the genealogy of the processes that are currently running. It’s a dead giveaway: if dllhost.exe is launching dozens of other processes, you know it’s Poweliks.
This isn’t so bad at all if you know how to tackle it!
The easiest way to handle it is to prepare with a tool that can handle removal first. In this case, I recommend RogueKiller.
NOTE: This tool isn’t to be used lightly, especially by those who aren’t thoroughly familiar with computer repair. By design, it is heavy on false positives, so take care when agreeing to remove what it flags as suspicious.
Try the following approach:
- Open RogueKiller; allow the prescan to finish. Run a scan.
- Once the scan completes, look for its detection of Poweliks on the Registry tab. Be sure it is selected for removal.
- Open Process Explorer. Pause all dllhost.exe processes. Kill all processes below any dllhost.exe process once the processes have been paused.
- Click Delete on the RogueKiller window and immediately reboot the system.
With any luck, upon reboot, the malware will be gone. By pausing the process with Process Explorer, you essentially negate the malware’s ability to detect its neutralization via watchdog processes that relaunch the dllhost parent process after it’s killed. That enables disinfection to take place before the malware is relaunched and the registry key is reinfected.
Of course, to repeat myself, keep in mind that Poweliks is merely a tiny fraction of what is usually also alongside it on an infected system; after all, it is a downloader. So if you’re trying DIY disinfection, just be advised that there is a very good chance that your system is still infected even after this process by multiple other malware families. I would advise hiring a professional in your local area to assist with the job instead of risking your personal information and data!