Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rustock.j on Vista [Moved]


  • Please log in to reply
15 replies to this topic

#1 dan_l

dan_l

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 01 August 2009 - 12:13 AM

I'm not entirely sure where it came from.

------
The list of symptoms:

1. After log on, no wallpaper, desktop icons, start menu. Instead, just a copy of windows explorer open to My Documents.
2. For the first few minutes, any attempt to run an application is met with a pair of command prompt looking outputs indicating that "there is not enough memory to run this program". They flash very briefly, but I managed to screen shot one of the files as being named "desot.exe" (I think NTVDM.exe is the other one) Interestingly enough, that file can't be found with a dir in a command prompt.
3. Extraordinary amount of instability when in non-safe mode.
4. A copy of of Win Antivirus Pro on my computer
5. Win Defender identifies this as "Rustock.j".
6. I try to run Malwarbytes, Spybot, Adaware---it would appear that the program briefly shows up in the task manager before being killed by something
-----

-----
Other notes:

Good news-
1. I can still run some programs if I use the explorer screen to navigate the files and do "run as administrator"
2. I've got another Ubuntu partition here, so I can mount the windows file system. I *think* I could probably get away with deleting or editing some files. I don't think that it's a great idea, but if it works.....

Bad news-
1. I tried to run the DDS thing as described in the preparation screen. Windows throws an error message:

The blue box on top says "16 bit MS-DOS Subsystem"
Rest of the message:
C:\Windows\system32\desot.exe
The NTVDM CPU has encountered an illegal instruction CS:0000 IP:0117 OP:f0 25 24 00 f0 Choose 'close to terminate the application.


Really bad news:
1. I can't run HJT. I try to run it as Admin, and I get a message indicating that I don't have permissions to run it.

I figure there must be a way to run HJT, but I'm pretty much out of ideas. I'm only bothering you folks with this because I can't seem to find anybody else who's had this problem and I'm totally not getting any traction.


*edit for clarity.

Edited by dan_l, 01 August 2009 - 12:32 AM.


BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,962 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:06:16 AM

Posted 01 August 2009 - 07:26 AM

As no logs have been posted, I am shifting this topic from the specialized HiJack This forum to the Am I Infected forum.

==>PLEASE DO NOT NOW POST LOGS<== unless a log is specifically requested.
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#3 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:16 AM

Posted 01 August 2009 - 08:01 AM

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download Dr.Web CureIt and save it to your desktop. DO NOT perform a scan yet.
alternate download link
Note: The file will be randomly named (i.e. 5mkuvc4z.exe).

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on the randomly named file to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#4 dan_l

dan_l
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 01 August 2009 - 08:59 AM

Ok, I downloaded it. I follow your directions to the letter and at step 3 (The Express scan will automatically begin.) I get this error message:
----
LP45e.exe - Application Error
The instruction at 0xblahblah referenced memory at 0xblahblah. The memory could not be read.
Click OK to terminate the program
----

Think there might be a way around this? Or would you suspect it's time to start on the nuclear option? I don't really 'like' using that route, because if you reinstall the terrorists win. But, if this thing is really that borked......

#5 dan_l

dan_l
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 01 August 2009 - 09:32 AM

Ok slight update, though, I'm not sure I'd call it progress:

Given the brickwall with not being able to scan stuff, I figured I'd try the time honored windows tradition of TEAKS---Throw Everything And the Kitchen Sink. I ran windows defender, which is now showing a total of 3 infections:

Backdoor: WinNT/Rustock.f
Trojan: Win32/FakeScanti
Trojan: HTML/FakeScanti

The only things of note here is that:
-Somehow, Windows Defender actually runs. It would be interesting to find out what-if any- special properties WinDefender has that allows it to run correctly as where other tools won't run.
-It's changed the identification from Rustock.j to Rustock.f.

At any rate, I allowed Windows Defender to clean the problems. Unsurprisingly, it didn't seem to fix anything.

#6 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:16 AM

Posted 01 August 2009 - 11:38 AM

Rustock is a rootkit, so we will attack there...

Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now". Click Yes.
  • Make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#7 dan_l

dan_l
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 02 August 2009 - 12:10 AM

Ok. For a variety of reasons I was unable to disable the anti-malware software. I ran the scan, and it turned up some things which I'm certain are related to the problem, however all of what was found turned up as "not recommended for cleaning", which if I'm reading the documentation correctly doesn't mean that the stuff is legit, but rather is only indicative of sophos not knowing what the stuff is.

Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc

Started logging on 8/1/2009 at 21:27:56 PM

User "Dan" on computer "DAN-PC"

Windows version 6.0 SP 1.0 Service Pack 1 build 6001 SM=0x300 PT=0x1 Win32

Info: Starting process scan.

Info: Starting registry scan.

Hidden: registry item \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Applications\Windows

Hidden: registry item \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\CatalogNames\Windows

Hidden: registry item \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Databases\Windows

Hidden: registry item \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Gather\Windows

Hidden: registry item \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Gathering Manager\Applications\Windows

Hidden: registry item \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\UsnNotifier\Windows

Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\geyekrxprpuprm

Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\geyekrxprpuprm

Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\geyekrxprpuprm

Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\geyekrxprpuprm

Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\geyekrxprpuprm

Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet006\Services\geyekrxprpuprm

Info: Starting disk scan of C: (NTFS).

Hidden: file C:\Windows\Temp\TMP000000225AC1512D42B8B977

Hidden: file C:\Windows\System32\WerFault.exe

Hidden: file C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe

Hidden: file C:\Windows\System32\vhosts.exe

Hidden: file C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe

Hidden: file C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe

Hidden: file C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS00E48.log

Hidden: file C:\Windows\System32\geyekrpdsxtqxj.dat

Hidden: file C:\Windows\System32\drivers\geyekriikumnyq.sys

Hidden: file C:\Windows\System32\geyekrjcdrortf.dll

Hidden: file C:\Windows\System32\bndmss.exe

Hidden: file C:\Windows\System32\netlogon.dll

Hidden: file C:\Windows\System32\sdra64.exe

Hidden: file C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

Hidden: file C:\Windows\System32\geyekrviibrqyi.dat

Hidden: file C:\Windows\System32\geyekrhvonrffp.dll

Hidden: file C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS00E49.log

Hidden: file C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UL6FUWP3\indow%2Bprofessional%2B2000%7Cpos=topleader%7Creqid=-74782c5c-122d39582f2-58c5%7Cpagetype=ambig%7Csem=true%7Ccell=17;ord=-550299775[1].htm

Hidden: file C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UL6FUWP3\window%2Bprofessional%2B2000%7Cpos=rightsky%7Creqid=-74782c5c-122d39582f2-58c5%7Cpagetype=ambig%7Csem=true%7Ccell=17;ord=-550299775[1].htm

Hidden: file C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UL6FUWP3\aasuper2[1].htm

Info: Starting disk scan of D: (NTFS).

Stopped logging on 8/1/2009 at 22:03:45 PM

#8 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:16 AM

Posted 02 August 2009 - 05:04 PM

We found it :thumbsup:

Please rerun Sophos ARK and delete the following files:
  • Hidden: file C:\Windows\System32\geyekrpdsxtqxj.dat
  • Hidden: file C:\Windows\System32\drivers\geyekriikumnyq.sys
  • Hidden: file C:\Windows\System32\geyekrjcdrortf.dll
  • Hidden: file C:\Windows\System32\geyekrviibrqyi.dat
  • Hidden: file C:\Windows\System32\geyekrhvonrffp.dll


Reboot immediately. Upon reboot, update and rerun Malwarebytes. Post a new log.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#9 dan_l

dan_l
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 03 August 2009 - 11:03 AM

I ran ARK and killed the 5 files that you pointed out. I rebooted to the exact same litany of symptoms, including the inability to run malware bytes.

For giggles, I reran ARK to see if I had misclicked and not killed the correct files and if there was still a similar file that I needed to delete. It didn't find any.

#10 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:16 AM

Posted 03 August 2009 - 07:58 PM

Please rerun Dr. WebCureit. It should kill the extras malwarebytes can't at the time.

Lets see if anything is left out there.

Please download ATF Cleaner by Atribune & save it to your desktop.
alternate download link DO NOT use yet.

Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the
    definitions before scanning by selecting "Check for Updates". (If you encounter
    any problems while downloading the updates, manually download them from
    here and
    unzip into the program's folder.
    )
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under
    Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner
    Options
    , make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose:
    Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp"

ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#11 dan_l

dan_l
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 03 August 2009 - 10:59 PM

Finally ran Dr Web found the following:

Trojan.Siggen
Win32.hllw.lime.5 (x2)
Trojan.Download.40103 (couldn't be cured, moved)
Trojan.Iasex (x2)
Trojan.DownLoad.41992
BackDoor.Dax.47

Working on Super Anti-Spyware next.

#12 dan_l

dan_l
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 04 August 2009 - 12:05 AM

Well this is bad:

After killing the above mentioned files with Dr Webcureit, I went ahead and did a reboot. Upon reboot, not much had changed, except the explorer screen that I was relying upon to launch applications from no longer comes up. Now it's just a black "desktop".

So, in order do continue, I have to come up with a way to run the programs. I can still get into the CLI (for whatever good that might do me) ---maybe there's some anti-malware/spyware application I could throw at it from there? I can even drop in whatever files from the other partition if need be.

Or is there some sort of easily editable startup file which would launch the explorer again? I know that most of my start up files aren't currently working, but I'm thinking here.

#13 dan_l

dan_l
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 04 August 2009 - 09:28 AM

I should add:

In addition to having the ability to get into the command line, I can still access the task manager from either safe or normal mode. I'm convinced that there has to be a work around to get something going here, but I don't have the l33t vista skillz to do it.

Even if I could just find a way to get launchy to run, I might be able to get the show back on the road.


Any thoughts?

#14 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:16 AM

Posted 04 August 2009 - 08:06 PM

Can you boot into safe mode?

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#15 dan_l

dan_l
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:05:16 AM

Posted 04 August 2009 - 09:07 PM

Yes. I most definitely can boot into safe mode. Although, it's still the same result.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users