Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Probable rootkit, logon problem


  • This topic is locked This topic is locked
2 replies to this topic

#1 Gordon H

Gordon H

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:25 PM

Posted 08 March 2010 - 02:55 AM

This started happening a couple of days ago. When booting XP and selecting a user account, it says loading user settings as usual, but does not get as far as displaying icons on the desktop. Instead, a small dialog box appears with no text in it, although it does have the icon of the red X and an "OK" button. Upon clicking OK I am logged out and go back to the user account selection screen.

I can boot into safe mode with networking and was able to download, install and run Malwarebytes. The quick scan did not reveal any infections. I also ran Dr Web cure-it, which also found nothing

I also have a CD with various tools on it such as GMER and SuperAntiSpyware. I was able to run GMER, but attempt to run SuperAntiSpyware gave a message "The system administrator has set policies to prevent this installation". Some of my other tools gave the same message, but others did run OK. GMER only showed McAfee processes in the rootkit section, and no processes or services were highlighted in red.

Here is the RootRepeal log, I had GMER running at the time and it appears as pwtdapod.sys

ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2010/03/08 11:52
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF6EC7000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B3C000 Size: 8192 File Visible: No Signed: -
Status: -

Name: pwtdapod.sys
Image Path: C:\DOCUME~1\Keith\LOCALS~1\Temp\pwtdapod.sys
Address: 0xF6509000 Size: 93056 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF77D2000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\6B1RKTQS\calendar[1]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\6B1RKTQS\rstrui[2]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\6B1RKTQS\watermark[1]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\74WJHEPB\help[1]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\74WJHEPB\RestoreUI[1]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\74WJHEPB\srui-main[1]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\EKHUQ3JL\SRUI-Pick[1]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\EKHUQ3JL\SR_Grad[1]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\EKHUQ3JL\start[1]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\Q6OIT32W\calendar[2]
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Keith\Local Settings\Temporary Internet Files\Content.IE5\Q6OIT32W\rstrui[1]
Status: Visible to the Windows API, but not on disk.

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71eb7a6

#: 047 Function Name: NtCreateProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71e8794

#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71e8f1e

#: 063 Function Name: NtDeleteKey
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71ec1f0

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71ec42a

#: 192 Function Name: NtRenameKey
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71ed12a

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71ec83c

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71e7d0a

#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "C:\WINDOWS\system32\drivers\iksysflt.sys" at address 0xf71e7384

==EOF==

Edited by Orange Blossom, 09 March 2010 - 11:26 PM.
Move to log forum. ~ OB


BC AdBot (Login to Remove)

 


#2 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:08:25 PM

Posted 10 March 2010 - 07:19 PM

Hello and and Welcome to Bleepingcomputer

Please note we are very busy, so if I don't hear from you within 5 days the topic will be closed, If you have since resolved your issues I
would appreciate if you would let me no so I can close this topic.

  • Download random's system information tool (RSIT) by random/random from here and save it to your desktop.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open. Please post the contents of both log.txt (<<will be maximized) and info.txt (<<will be minimized)


  1. Please download GMER from one of the following locations, and save it to your desktop:
    • Main Mirror
      This version will download a randomly named file (Recommended)
    • Zip Mirror
      This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  2. Disconnect from the Internet and close all running programs, as this process may crash your computer.
  3. Temporarily disable any real-time active protection so your security program drivers will not conflict with gmer's driver.
  4. Double click on Gmer to run it.
  5. Allow the gmer.sys driver to load if asked.
  6. You may see a rootkit warning window, If you do, click No.
  7. Untick the following boxes on the right side of the Gmer screen.
    Sections
    IAT/EAT
    Files
    Show All
  8. Click on and wait for the scan to finish.
  9. If you see a rootkit warning window, click OK.
  10. Push and save the logfile to your desktop.
  11. Copy and Paste the contents of that file in your next post.



Then please post back here with the following:
  • log.txt
  • info.txt
  • Gmer log

Thanks

unite.jpg


#3 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:08:25 PM

Posted 15 March 2010 - 08:50 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending me a PM
with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.

unite.jpg





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users