Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

They too have this insidious virus


  • This topic is locked This topic is locked
8 replies to this topic

#1 NapalmDawn

NapalmDawn

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:09:20 AM

Posted 11 September 2011 - 12:19 AM

I had my parents ship me their netbook. They too have this insidious virus on it also. It originally manifested itself as one of those fake security center viruses. I've killed that. However, there is an ADS file in the windows directory that keeps running a service that I can't touch. If you look at the running processes, there's one called 3416somethingsomething:something.exe Any attempt made by a program to fix that server (Housecall, Hijackthis, MBM, etc etc) won't work. The program gets terminated and then gives the above error listed by jmh. The file CAN be access if you share the hard drive and execute it from another PC. I ran a scan against the netbook from another PC and it showed clean. The problem is this ADS file can't get removed. I used hijack this' ADS remover and when I clicked to remove, I got a question box with blank options. I hit what I thought was "yes", rebooted but the process is back. I keep killing any reference to it in the registry but nothing works. If I reinstall Hijack this, it will work again up until the point where you have it "touch" this ADS file.

The service will even run in safe mode (this is an XP home netbook). End process/end process tree do nothing. If you try to set the priority level, you get access denied.

Also, something similar to this thread http://www.bleepingcomputer.com/forums/topic418311.html is occurring. If you run a search in IE or FF on google, most links, when clicked on, give an error that the URL can't be loaded. If you right click the link and pick open in a new tab, it works. The hosts file had a ton of weird misdirects to a 69. IP address but I have changed it back to a normal hosts file.

Edited by NapalmDawn, 11 September 2011 - 12:25 AM.


BC AdBot (Login to Remove)

 


#2 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:09:20 AM

Posted 11 September 2011 - 04:20 PM

Okay since this got split out, it needs more background info.
Parents managed to get a fake security center virus on their netbook. I removed the very visible layer of the infection but there is still something left behind. There is an ADS file at the root of c:\windows called 3416137550:2984272180.exe that keeps getting launched. It can't be killed, it pops in safe mode, it can't be told to not launch during a diagnostic boot. It also kills any program that discovers it like Hijack this, MBAM, Kaspersky, GMER, Rkill, etc. Once the program is killed, it can't be launched again until reinstalled. If I were to remote the netbook's hard drive from another PC, I *can* run those programs. It seems like this ADS file corrupts the logged in account. I created a new admin account and that one suffers the same issues as the existing admin account. Scanning the registry for 3416137550 yielded some results that I have removed but this file is thoroughly stuck and resistant to being killed. Anybody have any ideas how I might isolate this file and kill it?

#3 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:09:20 AM

Posted 11 September 2011 - 10:00 PM

ADSSpy.exe will run and scan all directories until it hits this file. Once it hits it, much like any other anti-virus I've tried to run, it gets killed. After that, it can't be launched again. It seems as if any program that finds this file gets blacklisted. It allows me to delete the 3416137550 file and the 2984272180.exe file but the service relaunches on the next reboot. What can I do to delete this file or run a successful anti-virus if they keep getting killed?

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,403 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:20 AM

Posted 13 September 2011 - 09:40 PM

Hello, it is definitely a rogue. Lets do this ,, First in Normal then if needed repeat in Safe Mode.

>>>> Download this file and doubleclick on it to run it. Allow the information to be merged with the registry.

RKill....

Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.


If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running no
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:09:20 AM

Posted 17 September 2011 - 04:22 PM

As of now, Combofix was able to clean off what was a Rootkit.win32.zaccess.e Nothing else was able to remove it and it kept replicating itself back any time anything came remotely close to fixing it. My only issue now is that it will not pull down an IP address from my router. It essentially can't get past the point where it makes a full connection. One of the affected files that got hit by this rootkit was ipsec.sys I've run sfc /scannow a few times and it says everything is legit. I placed a copy of ipsec.sys from another XP computer in there and it still won't grab an IP. I reinstalled all of the NP netbook wireless/networking utilities. Any ideas?

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,403 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:20 AM

Posted 17 September 2011 - 09:25 PM

For the connection try these...

Please click Start > Run, type inetcpl.cpl in the runbox and press enter.
Click the Connections tab and click the LAN settings option.
Verify if "Use a proxy..." is checked, if so, UNcheck it and click OK/OK to exit.
Now check if the internet is working again.

OR

Go to Start ... Run and type in cmd
A dos Window will appear.
Type in the dos window: netsh winsock reset
Click on the enter key.

Reboot your system to complete the process.


Having run ComboFix we need to see that and a DDS log.

Please go here....
Preparation Guide ,do steps 6 - 9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
Skip the GMER step and instead post the ComboFix log you posted earlier.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:09:20 AM

Posted 18 September 2011 - 04:58 AM

Proxy never got touched and is still set to not use a proxy. Winsock reset and reboot unfortunately hasn't helped. I'll post the combofix log in the other area as soon as I pull it down from the netbook.

#8 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:09:20 AM

Posted 20 September 2011 - 02:54 PM

New thread created here - http://www.bleepingcomputer.com/forums/topic419764.html Thanks for the direction.

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,403 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:20 AM

Posted 20 September 2011 - 07:40 PM

You're welcome!!

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users