Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Security Tool regenerates


  • This topic is locked This topic is locked
2 replies to this topic

#1 nopx

nopx

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:51 PM

Posted 23 October 2009 - 08:22 AM

Hey everyone, first off thank you for the help. When I got to the office yesterday, I was told about a shared computer that is infected. The dominant malware was SecurityTool. I used process explorer to kill it and installed/updated mbam. I had to quick copy the mbam.exe over to a flash drive after install as SecurityTool tries to delete it, then I renamed it go.exe and placed it back in its program folder and it runs fine.

After a quick scan, the pc was usable again, but I came in today and it was back. I repeated my process, and then ran combofix, which said a system file was infected and it restarted but as soon as I logged in SecurityTool was back.

I have isolated that PC from being used by anyone but me, and here are my logs per the preparation guide, I'll wait on your instructions and will not make any changes to the PC unless instructed to.

Once again, thanks everyone.

I am currently running RootRepeal, I will attach 'ark.txt' as soon as it is ready.



DDS (Ver_09-10-13.01) - NTFSx86
Run by jadams at 8:10:52.22 on Fri 10/23/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_15
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1535.904 [GMT -4:00]

AV: Trend Micro OfficeScan Antivirus *On-access scanning disabled* (Outdated) {2A07C760-BAFB-473C-9D41-82B17699517D}
FW: Trend Micro Personal Firewall *disabled* {3E790E9E-6A5D-4303-A7F9-185EC20F3EB6}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\jadams\My Documents\ssh_tunnel\myentunnel\myentunnel.exe
C:\Documents and Settings\jadams\My Documents\ff\firefox.exe
C:\Documents and Settings\jadams\My Documents\ssh_tunnel\myentunnel\plink.exe
C:\Program Files\Trend Micro\OfficeScan Client\Misc\xpupg.exe
C:\Program Files\Trend Micro\OfficeScan Client\pccntupd.exe
C:\Documents and Settings\jadams\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.ask.com/?o=13920&l=dis
mDefault_Search_URL = hxxp://www.google.com/ie
mSearch Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
mSearchAssistant = hxxp://www.google.com
BHO: {8d8444a2-2b26-497b-b3f7-6d6be90c620e} - kedohugu.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [OfficeScanNT Monitor] "c:\program files\trend micro\officescan client\pccntmon.exe" -HideWindow
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\go.exe" /runcleanupscript
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [muzinisap] Rundll32.exe "c:\windows\system32\wisegava.dll",a
dRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
StartupFolder: c:\docume~1\jadams\startm~1\programs\startup\shortc~1.lnk - c:\documents and settings\jadams\my documents\ssh_tunnel\myentunnel\myentunnel.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: hws-info.com
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1207158659846
DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} - hxxp://zone.msn.com/bingame/chnz/default/mjolauncher.cab
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {B80CD4E6-5B02-4B6C-99BE-68F1511E9549} - hxxp://betaimg.sling.com/sli/sling_player_ax/WebSlingPlayer.cab?1.2.0.60
DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} - hxxp://office.microsoft.com/officeupdate/content/opuc4.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - hxxp://zone.msn.com/bingame/popcaploader_v10.cab
Notify: PCANotify - PCANotify.dll
AppInit_DLLs: vopepimi.dll c:\windows\system32\wisegava.dll
SSODL: bedufinek - {5721c485-b357-47b9-a681-49a091f2bba6} - c:\windows\system32\wisegava.dll
STS: mujuzedij: {5721c485-b357-47b9-a681-49a091f2bba6} - c:\windows\system32\wisegava.dll
LSA: Notification Packages = scecli vopepimi.dll bigehisa.dll

============= SERVICES / DRIVERS ===============

R2 Nero BackItUp Scheduler 4.0;Nero BackItUp Scheduler 4.0;c:\program files\common files\nero\nero backitup 4\NBService.exe [2009-5-15 935208]
R2 TmPreFilter;Trend Micro PreFilter;c:\program files\trend micro\officescan client\tmpreflt.sys [2006-9-27 32528]
R3 tmcfw;Trend Micro Common Firewall Service;c:\windows\system32\drivers\TM_CFW.sys [2007-4-20 307984]
S2 TmFilter;Trend Micro Filter;c:\program files\trend micro\officescan client\tmxpflt.sys [2006-9-27 199440]
S3 npf;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2008-6-1 34064]
S3 TmPfw;OfficeScan NT Firewall;c:\program files\trend micro\officescan client\TmPfw.exe [2007-4-4 943696]
S3 TmProxy;OfficeScan NT Proxy Service;c:\program files\trend micro\officescan client\TmProxy.exe [2007-4-27 575064]

=============== Created Last 30 ================

2009-10-22 18:26 38,912 ---sh--- c:\windows\system32\nunuluna.dll
2009-10-22 06:38 <DIR> --ds---- C:\ComboFix
2009-10-21 13:10 25,600 a------- C:\FirmataVB.dll
2009-10-21 12:57 19 a------- c:\windows\info023
2009-10-21 12:57 19 a------- c:\windows\info022
2009-10-21 12:57 <DIR> --d----- c:\program files\common files\ActiveXperts
2009-10-21 07:27 <DIR> --d----- c:\docume~1\jadams\applic~1\Arduino
2009-10-21 07:17 <DIR> --d----- C:\arduino
2009-10-21 06:38 38,224 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-21 06:38 19,160 a------- c:\windows\system32\drivers\mbam.sys
2009-10-21 06:36 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-10-21 06:28 59,664 a------- C:\mbam-clean.exe
2009-10-21 06:16 4,045,544 a------- C:\mbam-setup.exe
2009-10-21 05:59 389,120 a------- c:\windows\system32\CF25407.exe
2009-10-14 10:34 88,696 a------- c:\windows\system32\_packet.dlluninstall
2009-10-14 10:34 <DIR> --d----- c:\program files\Cain
2009-10-05 11:38 <DIR> --d----- c:\program files\Linksys
2009-10-05 06:14 <DIR> --d----- C:\bbie10
2009-09-29 13:20 <DIR> --d----- c:\docume~1\jadams\applic~1\Wireshark
2009-09-29 08:38 <DIR> --d----- C:\msf3
2009-09-28 16:04 <DIR> --d----- c:\docume~1\alluse~1\applic~1\InterVations
2009-09-28 08:28 <DIR> --d----- c:\docume~1\jadams\applic~1\.msf3
2009-09-28 08:26 <DIR> --d----- c:\docume~1\jadams\applic~1\msf32
2009-09-28 08:25 <DIR> --d----- c:\program files\Metasploit
2009-09-28 08:03 561 a------- c:\windows\system32\olly.lnk
2009-09-28 08:01 <DIR> --d----- C:\Savant
2009-09-28 08:00 303,616 a------- c:\windows\IsUninst.exe
2009-09-28 07:51 34 a------- c:\windows\system32\ollydbg.ini
2009-09-27 07:29 <DIR> --d----- C:\Dev-Cpp

==================== Find3M ====================

2009-10-21 07:17 188,416 a------- c:\windows\system32\ftdiunin.exe
2009-10-21 07:17 102,400 a------- c:\windows\system32\FTLang.dll
2009-10-21 07:17 61,067 a------- c:\windows\system32\drivers\ftser2k.sys
2009-10-21 07:17 33,360 a------- c:\windows\system32\ftserui2.dll
2009-10-21 07:17 176,128 a------- c:\windows\system32\ftd2xx.dll
2009-10-21 07:17 106,496 a------- c:\windows\system32\ftbusui.dll
2009-10-21 07:17 47,249 a------- c:\windows\system32\drivers\ftdibus.sys
2009-09-15 07:54 622,707,717 a------- C:\XP.zip
2009-09-10 16:16 18,226 a------- c:\windows\system32\qke3kixfeflkszi4a.dll
2009-09-10 16:16 15,619 a------- c:\windows\system32\lap20nh3l4dkszi4a.dll
2009-09-10 16:16 15,093 a------- c:\windows\system32\xkh1udoe84fkszi4a.dll
2009-08-18 10:10 389,120 a------- c:\windows\system32\CF7120.exe
2009-08-18 09:27 389,120 a------- c:\windows\system32\CF31528.exe
2009-08-18 09:22 389,120 a------- c:\windows\system32\CF30568.exe
2009-08-18 09:18 389,120 a------- c:\windows\system32\CF29836.exe
2009-08-18 09:03 389,120 a------- c:\windows\system32\CF26789.exe
2009-08-18 08:58 389,120 a------- c:\windows\system32\CF25921.exe
2009-08-18 08:57 389,120 a------- c:\windows\system32\CF25555.exe
2009-08-18 08:48 389,120 a------- c:\windows\system32\CF23961.exe
2009-08-18 08:40 389,120 a------- c:\windows\system32\CF22289.exe
2009-08-07 02:14 19,331 a------- c:\windows\xoma.sys
2009-08-07 02:14 16,583 a------- c:\windows\epetyjifac.bin
2009-08-07 02:14 16,407 a------- c:\windows\system32\olyvem.sys
2009-08-07 02:14 14,008 a------- c:\program files\common files\ohiv.vbs
2009-08-07 02:14 10,613 a------- c:\program files\common files\akagucop.inf
2009-08-07 02:14 10,504 a------- c:\docume~1\alluse~1\applic~1\jimivolar.pif
2009-07-21 18:26 51,200 a--sh--- c:\windows\system32\bigehisa.dll
2009-07-23 06:26 37,888 a--sh--- c:\windows\system32\dapavama.dll
2009-07-22 06:26 38,912 a--sh--- c:\windows\system32\jifojuse.dll
2009-07-20 06:25 52,224 a--sh--- c:\windows\system32\lewovasi.dll
2009-04-30 10:29 60,416 a--sh--- c:\windows\system32\nukabodo.exe
2009-07-20 06:25 39,424 a--sh--- c:\windows\system32\tugekedi.dll
2009-07-21 06:25 38,400 a--sh--- c:\windows\system32\vapofemu.dll
2009-03-28 00:20 89,088 a--sh--- c:\windows\system32\wegupamu.dll
2009-07-21 18:26 38,912 a--sh--- c:\windows\system32\zobejivo.dll
2008-09-21 19:05 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008092120080922\index.dat

============= FINISH: 8:11:34.07 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:51 PM

Posted 31 October 2009 - 05:46 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.

    First Location
    Second Location
    Third Location

  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Posted Image
m0le is a proud member of UNITE

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:51 PM

Posted 03 November 2009 - 09:50 AM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. :(

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users