Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus/malware reappears at bootup


  • Please log in to reply
2 replies to this topic

#1 dongna

dongna

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:26 AM

Posted 11 August 2009 - 04:21 PM

My PC is infected with something nasty...

Symptoms:

1. Changed .htm files on my hard drive.

2. install.exe running automatically at bootup

3. 9129837.exe, msword98.exe, ntfs.sys appearing in Task Manager


What I have done:

I have AVG (Free), Malwarebytes, and Spybot S & D all installed on my PC. I can run any of the three and it will detect something. After the infections have been supposedly cleaned, when I reboot the infections return. Just today, an error message started popping up during bootup saying that install.exe can't access a file (that's how I know that is being run during bootup).

I have also tried booting into Safe Mode and running these programs there. I can sometimes run them to clean things, re-boot into Safe Mode, and when I re-run them they will come back clean. But as soon as I re-boot into regular mode they return.


Some of the bad things that appear when running AVG, Malwarebytes, or Spybot:

1. c:\Documents & Settings\JR\Local Settings\Temp\RarSFX2\install.exe

2. c:\WINDOWS\9129837.exe

3. c:\Documents & Settings\Local Service\oashdihasidhasui... (long string of jibberish continues)

4. c:\WINDOWS\system32\drivers\ntfs.sys


I'm basically at the end of my rope. I have strong reason to suspect that there is something in my Registry that is auto-installing or auto-running something on bootup that re-establishes these infections each time I boot. That is about the point where my knowledge ends and where I'm hoping someone here can help.

BC AdBot (Login to Remove)

 


#2 dongna

dongna
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:26 AM

Posted 12 August 2009 - 08:31 AM

Uh-oh... 35 views and no replies... this must be serious. :thumbsup:

An update from this morning... during on of my reboots, Windows would not boot, instead giving me the message "system32\drivers\ntfs.sys file missing or corrupted". I had to boot from my Windows CD and copy this file back to my hard drive (I hope that was the right thing to do). After doing that, my PC booted, but the same problems from before occured. My latest Mbam scan produced 7 infections (all of which it cleaned). I also still had msword98.exe running in my processes menu (I killed it).

I figured I would post this before I reboot yet again...

Forgot to add... AVG Redident Shield keeps identifying system32\drivers\ntfs.sys as having been infected, but if I have it move the file to the virus vault, won't that prevent my PC from booting again?

Edited by dongna, 12 August 2009 - 08:33 AM.


#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:26 AM

Posted 12 August 2009 - 11:59 AM

I'm afraid I have very bad news.

According to Threat Expert, 9129837.exe is another name (used by Symantec & McAfee) for the Win32:Virut family of malware. According to VirScan.org, msword98.exe6 is identified as a variant of the Win32:Virut family of malware. If system files and .html files are infected, that's a sign of confirmation for this infection.

Virut is a polymorphic file infector with IRCBot functionality which infects .exe, .scr files, downloads more malicious files to your system, and opens a back door that compromises your computer. According to this Norman White Paper Assessment of W32/Virut, some variants can infect the HOSTS file and block access to security related web sites. Other variants of virut can even penetrate and infect .exe files within compressed files (.zip, .cab, rar). Virux is an even more complex file infector which can embed an iframe into the body of web-related files and infect script files (.php, .asp, .htm, .html, .xml ). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair and in some instances can disable Windows File Protection. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable. The longer virut remains on a computer, the more critical system files will become infected and corrupt so the degree of infection can vary.

The virus disables Windows File Protection by injecting code into the "winlogon.exe" process that patches system code in memory.

CA Virus detail of W32/Virut

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.

McAfee Risk Assessment and Overview of W32/Virut

There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus...Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.

AVG Overview of W32/VirutThis kind of infection is often contracted and spread by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and a major source of system infection.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

However, the CA Security Advisor Research Blog have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:There is no guarantee this infection can be completely removed. In some instances it may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users