Extended Copy Protection (XCP) is a CD/DVD copy protection technology created by First 4 Internet Ltd.
Uninstallation of the DRM software can currently only be done by sending an uninstallation request to Sony through their customer support.
The form can be found here:
Sony has also released an update the disabes he hiding features. The updates can be found here:
Please note that the uninstallation of the software will require using Internet Explorer and accepting an ActiveX component that might pose additional security problems. The uncloaking update is also available as a standalone executable.
This update will not uninstall the whole DRM software but the software will no longer be hidden.
XCP first came to prominence when it was used to protect audio CDs released by Sony BMG Music Entertainment. The XCP protected disks contain digital rights management (DRM) software that allow the user to make a limited number of copies of the disk and also rip the music into a digital format to be used on a computer or portable music player.
Once installed, the DRM software will hide:
No means of uninstalling the DRM software is given. The software supports Windows 98SE, Windows ME, Windows 2000 SP4 and Windows XP. This analysis was conducted on Windows XP in October 2005. The music CD that contained the DRM software was Van Zant: Get Right with the Man (Sony BMG Music Entertainment).
The DRM software requires administrative privileges to be installed successfully. When a user inserts an XCP protected CD into a computer that has the Windows Autoplay feature enabled, an EULA is automatically presented and if the user accepts it, the DRM software is installed. The software installs two services that will start automatically during system startup:
The first one is named 'XCP CD Proxy' and the latter one is named 'Plug and Play Device Manager'. Both services are listed and can be seen by the service control manager. In addition, it installs five drivers:
The first driver hides the presence of the DRM software and the latter drivers act as filter drivers and apparently monitor the CD drives in order to enforce any digital rights.
The files for the software will be installed into the directory 'C:\Windows\System32\$sys$filesystem' that will be hidden but still accessible (a directory listing does not show it, but you can access it if you know the name).
This directory contains all the files:
Additional installed files are stated below:
Microsoft C/C++ runtime and XML libraries are also updated, if they have not already been installed by some other application.
It should be noted that if the DRM software is active, the registry keys that start with the string '$sys$' will not be shown by most of the available registry editing tools. Also all files and directories that start with the string '$sys$' will not be visible. In Safe Mode, these hiding techniques are not active and all the entries are visible.
The DRM software hides its information by modifying the execution path of several Native API functions. Specifically, the aries.sys driver hooks the System Service Table (SST). The following API functions are hooked:
These hooks are generally used to hide files, folders, registry keys, registry values and processes.
The DRM software does not self-replicate and does not contain malicious features and thus should not be considered a virus. According to current guidelines, the software can still be considered malware since it hides from the user and does not offer a way to uninstall itself.
Although the software is not directly malicious, the techniques used to hide the software are exactly the same used by malicious software to hide themselves. The DRM software will cause many similar false alarms with all AV software that detect rootkits. The hiding techniques used by the DRM software can be abused by less technical malware authors to hide their backdoors and other tools.
If a malware names its files beginning with the prefix "$sys$", the files will also be hidden by the DRM software. Thus, it is very inappropriate for commercial software to use these techniques.
Date Created: 2006-01-01 09:30:02.0
Date Last Modified: 2006-01-01 00:00:00.0