I've been reading about the ZeroAccess and looking into some bot's code source* and I found this piece of code which checks if filemon is running in the infected computer before running the bot.
int pmain3()
{
std::vector<DWORD> SetOfPID;
GetProcessID("filemon",SetOfPID);
if (SetOfPID.empty())
{
// Nothing found running, Safe to execute bot.
}
else
{
// One of the process was found running, Exit install.
ExitProcess(0);
}
return 0;
}
It's not the only one. There are others checking for Wireshark, tcpview, procmon, VM, VirtualBox, sandBox ...
In this case how can I analyze an infected computer? and how could I find the infected process?
PS: [*] taken from the IMbotMod V4.1 botnet