Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

UGBWIG Mass Mailer


  • This topic is locked This topic is locked
2 replies to this topic

#1 cmpucom

cmpucom

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:04:22 PM

Posted 07 January 2010 - 08:16 PM

Fought with this all day today - not a bit of info on web about it. Is this new? Showed up as hidden device driver. An employee picked up last night in an unknown way along with vundo. RootkitRevealer found it. ComboFix found and removed it and several other related files (see log).

bwsb.gio
funeroga.dll
ugbwig.sys
lopuheso.dll
lesuzeka.dll

Some of the above are related to vundo. We were also lucky enough to be infected with one of those "you've been infected, pay us to clean up what we put on your computer". Its symptoms were not being able to run any programs, but ugbwig persisted after this was removed.

ugbwig.sys seems to be a very nasty mass mailer. It kept Windows Malicious from running. I believe it (or vundo) kept adding an entry into the appint_dlls registry key. Was installed into c:\windows\system32\drivers as a device driver and was not visible as a service or in task manager.



ComboFix 10-01-04.01 - UCOM 01/07/2010 18:08:27.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.511.28 [GMT -5:00]
Running from: c:\documents and settings\UCOM\Desktop\repair\AntiVirus\Combofix\ComboFix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\docume~1\UCOM\LOCALS~1\Temp\hjvdht.exe
c:\docume~1\UCOM\LOCALS~1\Temp\QT.exe
c:\documents and settings\All Users\Start Menu\Programs\Internet Explorer.lnk
c:\documents and settings\UCOM\Local Settings\Temp\hjvdht.exe
c:\documents and settings\UCOM\Local Settings\Temp\QT.exe
c:\recycler\NPROTECT
c:\windows\AUTOLNCH.REG
c:\windows\i386\csrss.exe
c:\windows\system32\6to4v32.dll
c:\windows\system32\config.dat
c:\windows\system32\drivers\ugbwig.sys
c:\windows\system32\kbdsock.dll
c:\windows\system32\lesuzeka.dll
c:\windows\system32\mshlps.dll
c:\windows\system32\Thumbs.db
c:\windows\system32\winsts.sys

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_6TO4
-------\Legacy_WINSTS
-------\Service_6to4
-------\Service_winsts
-------\Legacy_ugbwig
-------\Service_ugbwig


((((((((((((((((((((((((( Files Created from 2009-12-07 to 2010-01-07 )))))))))))))))))))))))))))))))
.

2010-01-07 23:09 . 2010-01-07 23:09 -------- d-----w- c:\program files\Sophos
2010-01-07 23:03 . 1999-12-17 15:13 49664 ----a-w- c:\windows\unvise32.exe
2010-01-07 22:24 . 2010-01-07 22:24 -------- d-----w- c:\documents and settings\UCOM\Application Data\Wireshark
2010-01-07 22:10 . 2010-01-07 22:10 -------- d-----w- c:\temp\hsperfdata_SYSTEM
2010-01-07 22:08 . 2010-01-07 22:08 -------- d-----w- c:\program files\AdventNet
2010-01-07 20:32 . 2010-01-07 20:32 -------- d-----w- c:\program files\WinPcap
2010-01-07 20:29 . 2010-01-07 20:32 -------- d-----w- c:\program files\Wireshark
2010-01-07 17:17 . 2010-01-07 23:26 -------- d-----w- c:\temp\tmp0000022a
2010-01-07 17:14 . 2010-01-07 18:35 -------- d-----w- c:\program files\Common Files\Softwin
2010-01-07 00:42 . 2010-01-07 14:11 -------- d-----w- c:\temp\Cookies
2010-01-07 00:42 . 2010-01-07 00:42 -------- d-----w- c:\temp\History
2010-01-06 23:39 . 2010-01-07 13:25 -------- d-----w- c:\documents and settings\UCOM\Local Settings\Application Data\q
2010-01-06 23:36 . 2010-01-06 23:37 199680 ----a-w- C:\qfhtgw.exe
2010-01-06 23:36 . 2010-01-06 23:36 52224 ----a-w- C:\eujbmv.exe
2010-01-06 23:36 . 2010-01-06 23:36 29695 ----a-w- C:\khkil.exe
2009-12-28 13:38 . 2009-12-28 13:38 -------- d-----w- c:\documents and settings\UCOM\Local Settings\Application Data\TomTom
2009-12-28 13:38 . 2009-12-28 13:38 -------- d-----w- c:\documents and settings\UCOM\Application Data\TomTom
2009-12-28 13:37 . 2009-12-28 13:37 -------- d-----w- c:\program files\TomTom International B.V
2009-12-28 13:37 . 2009-12-28 13:37 -------- d-----w- c:\program files\TomTom HOME 2

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-07 23:33 . 2008-02-28 23:35 -------- d-----w- c:\program files\Symantec AntiVirus
2010-01-07 23:15 . 2008-12-09 14:00 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-07 22:58 . 2003-01-25 16:31 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-01-07 21:07 . 2008-12-09 14:00 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-07 21:07 . 2008-12-09 14:01 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-07 17:42 . 2006-01-17 15:22 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-01-07 15:49 . 2010-01-07 15:46 19577 ----a-w- c:\windows\system32\drivers\tmp.txt
2009-12-30 15:05 . 2007-10-25 17:43 -------- d-----w- c:\program files\Google
2009-12-30 15:04 . 2009-10-28 14:28 -------- d-----w- c:\documents and settings\UCOM\Application Data\Canon
2009-12-08 14:17 . 2009-10-20 18:19 42512 ----a-w- c:\windows\system32\drivers\npf.sys
2009-10-30 21:56 . 2009-02-27 18:44 4045528 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-10-20 18:19 . 2009-10-20 18:19 281104 ----a-w- c:\windows\system32\wpcap.dll
2009-10-20 18:19 . 2009-10-20 18:19 100880 ----a-w- c:\windows\system32\Packet.dll
2009-10-20 18:19 . 2009-10-20 18:19 53299 ----a-w- c:\windows\system32\pthreadVC.dll
2007-11-01 17:53 . 2007-11-01 17:53 31032 ----a-w- c:\program files\antenna.zip
2007-10-25 17:42 . 2007-10-25 17:42 13411824 ----a-w- c:\program files\Google_Earth_BZXD.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"updateMgr"="c:\program files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" [2006-03-30 313472]
"TomTomHOME.exe"="c:\program files\TomTom HOME 2\TomTomHOMERunner.exe" [2009-11-13 247144]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Logitech Utility"="Logi_MwX.Exe" [2002-11-08 19968]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2003-01-25 77824]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2007-05-29 52840]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2007-10-08 125368]
"OpwareSE2"="c:\program files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe" [2003-05-08 49152]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoRecentDocsNetHood"= 01000000

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{0cab0400-7395-11d0-a5e5-0020afe2fdd9}"= "qvphook.dll" [2002-04-10 45056]

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\OrCAD\\OrCAD_10.0\\tools\\bin\\cdsMsgServer.exe"=
"c:\\OrCAD\\OrCAD_10.0\\tools\\bin\\cdsNameServer.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=

R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/31/2009 11:40 AM 102448]
R3 NmPar;Unusable Parallel Port;c:\windows\SYSTEM32\DRIVERS\NmPar.sys [4/9/2008 8:28 AM 80512]
R3 nmserial;PCI Serial Port;c:\windows\SYSTEM32\DRIVERS\NmSerial.sys [4/4/2008 6:30 AM 70016]
S2 gupdate1c98603174475da;Google Update Service (gupdate1c98603174475da);c:\program files\Google\Update\GoogleUpdate.exe [2/3/2009 8:26 AM 133104]
S3 airfilt;airfilt;c:\windows\SYSTEM32\DRIVERS\airfilt.sys [7/15/2008 1:58 PM 16384]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\A.tmp --> c:\windows\system32\A.tmp [?]
S3 NPF;NetGroup Packet Filter Driver;c:\windows\SYSTEM32\DRIVERS\npf.sys [10/20/2009 1:19 PM 42512]
S3 QT;QT;c:\docume~1\UCOM\LOCALS~1\Temp\QT.exe --> c:\docume~1\UCOM\LOCALS~1\Temp\QT.exe [?]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [10/7/2007 8:48 PM 116664]
S3 scsiscan;SCSI Scanner Driver;c:\windows\SYSTEM32\DRIVERS\scsiscan.sys [1/25/2003 1:52 PM 11520]
S4 TomTomHOMEService;TomTomHOMEService;c:\program files\TomTom HOME 2\TomTomHOMEService.exe [11/13/2009 6:31 AM 92008]
.
Contents of the 'Scheduled Tasks' folder

2010-01-07 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-03 13:26]

2010-01-07 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-03 13:26]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyServer = http=127.0.0.1:5555
uInternet Settings,ProxyOverride = <local>
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
TCP: {102ECC8D-90DB-457C-BF24-197B54E19E1D} = 68.87.73.242
DPF: DirectAnimation Java Classes
DPF: Microsoft XML Parser for Java
DPF: {12545791-AC9A-44B2-8964-0DA216C4A4E5} - hxxp://www.partserver.com/partserver/viewer/cnsweb3d/cnsweb3d.cab
.
- - - - ORPHANS REMOVED - - - -

BHO-{a189bcfa-1a59-43a3-9f18-3a558b00e06b} - funeroga.dll
HKLM-Run-simururapi - lesuzeka.dll
Notify-AtiExtEvent - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-07 18:32
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\A.tmp"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-406986663-371636064-2198174967-1005\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2116)
c:\windows\system32\WININET.dll
c:\program files\ScanSoft\OmniPageSE2.0\ophookSE2.dll
c:\program files\Logitech\MouseWare\System\LgWndHk.dll
c:\progra~1\WINDOW~2\wmpband.dll
c:\program files\Common Files\Logitech\Scrolling\LgMsgHk.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\wscntfy.exe
c:\program files\Logitech\MouseWare\system\em_exec.exe
c:\program files\Symantec AntiVirus\DoScan.exe
.
**************************************************************************
.
Completion time: 2010-01-07 18:44:32 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-07 23:44

Pre-Run: 20,132,843,520 bytes free
Post-Run: 20,325,908,480 bytes free

- - End Of File - - 2504621C200D4DF1AECD97DF571CB1FC

Edited by Orange Blossom, 07 January 2010 - 10:15 PM.
Move to HJT forum. ~ OB


BC AdBot (Login to Remove)

 


#2 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:11:22 PM

Posted 14 January 2010 - 02:55 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

Please include a clear description of the problems you're having, along with any steps you may have performed so far.

Please refrain from running tools or applying updates other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.

Even if you have already provided information about your PC, we need a new log to see what has changed since you originally posted your problem.
  1. Please download OTL from following mirror:
  2. Save it to your desktop.
  3. Double click on the icon on your desktop.
  4. Click the "Scan All Users" checkbox.
  5. Push the button.
  6. Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. I suggest you do this and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#3 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:11:22 PM

Posted 19 January 2010 - 01:19 PM

Due to lack of feedback, this topic is now Closed

If you need this topic reopened, please send me a PM.
Please include the address of this thread in your request.
This applies only to the original topic starter.

Everyone else please start a new topic.

With Regards,
myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users