Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Rootkit.0Access.H and IE closes immediately when opened


  • This topic is locked This topic is locked
5 replies to this topic

#1 Y475

Y475

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:11:56 AM

Posted 04 April 2012 - 12:07 AM

Hello Forummates,

Im glad I googled and found this forum. Please pardon me for any mistake I make, I am a newbie and am trying to post in this forum precisely as per your guidelines. I apoligise if I inadvertantly make any mistakes. I need help :(

Initial symptoms - It started around March 29th. PC kept restarting. It restarted about 3-4 times in 1 day.
Further symptom - IE would not open, Computer got really sluggish. Opening a folder would take about 15-20 seconds!!
Then I Ran Malwarebytes - It found the following viruses. After running Mbytes, IE does open the homepage, but when typed any URL it immediately closes.

Malwarebytes Files Detected: 7
C:\Documents and Settings\2ndPC\Local Settings\Temp\Addons\00C94A8D\zugo.exe (PUP.Zugo) -> No action taken.
C:\WINDOWS\system32\beatjamupnpmusicserver.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\NEUSBw32.dll (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\NetworkService\Application Data\Microsoft\sp.DLL (TrojanProxy.Agent) -> Delete on reboot.
C:\WINDOWS\system32\PID_PEPI.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TdmService.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\0.8594643604432864h7i.exe (Backdoor.IRCBot) -> Quarantined and deleted successfully.


DDS
I tried to Run DDS, but instead of the normal 3 minutes, did not see the text window popup even after 1 hour of scanning. The black DOS window has ####### and a blinking cursor.

So I moved on to GMER. I was not able to save the file in GMER (no dialog box popped up), so instead I copied it using the COPY button and am pasting it below

GMER LOG

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-04-04 00:01:48
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort2 ST380815AS rev.4.ADA
Running: lmw6k30t.exe; Driver: C:\DOCUME~1\2ndPC\LOCALS~1\Temp\pxtdypog.sys


---- Kernel code sections - GMER 1.0.15 ----

init C:\WINDOWS\system32\drivers\Senfilt.sys entry point in "init" section [0xA2C5CA00]

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 00C3E5E8 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB14 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!GetClipboardData 7E430DBA 5 Bytes JMP 00C3E432 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E53AF C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52E1 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E534C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E51B2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E5214 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E5412 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E5276 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] ole32.dll!OleLoadFromStream 7752983B 5 Bytes JMP 3E3E5717 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] WININET.dll!InternetCloseHandle 3D949098 5 Bytes JMP 00C38B07 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] WININET.dll!InternetSetStatusCallback 3D95DCF0 5 Bytes JMP 00C37FDF C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] WININET.dll!InternetWriteFile 3D9A610E 5 Bytes JMP 00C38E98 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[2940] WININET.dll!HttpSendRequestExW 3D9BA72B 5 Bytes JMP 00C38DB9 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 00A3E5E8 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB14 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!GetClipboardData 7E430DBA 5 Bytes JMP 00A3E432 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E53AF C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52E1 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E534C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E51B2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E5214 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E5412 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E5276 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] ole32.dll!OleLoadFromStream 7752983B 5 Bytes JMP 3E3E5717 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] WININET.dll!InternetCloseHandle 3D949098 5 Bytes JMP 00A38B07 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] WININET.dll!InternetSetStatusCallback 3D95DCF0 5 Bytes JMP 00A37FDF C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] WININET.dll!InternetWriteFile 3D9A610E 5 Bytes JMP 00A38E98 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[3520] WININET.dll!HttpSendRequestExW 3D9BA72B 5 Bytes JMP 00A38DB9 C:\Documents and Settings\2ndPC\Application Data\Remote\dllx4.dll

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:56 PM

Posted 10 April 2012 - 12:10 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/448786 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows, you should not bother creating a GMER log.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 nasdaq

nasdaq

  • Malware Response Team
  • 38,746 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:12:56 PM

Posted 10 April 2012 - 08:40 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.
===

Please Download
TDSSKiller.zip

>>> Double-click on TDSSKiller.exe to run the application.
  • Click on the Start Scan button and wait for the scan and disinfection process to be over.
  • If an infected file is detected, the default action will be Cure, click on Continue
    Posted Image
  • If a suspicious file is detected, the default action will be Skip, click on Continue
    Posted Image
  • If you are asked to reboot the computer to complete the process, click on the Reboot Now button. A report will be automatically saved at the root of the System drive ((usually C:\) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt" (for example, C:\TDSSKiller.2.2.0_20.12.2009_15.31.43_log.txt). Please copy and paste the contents of that file here.
  • If no reboot is required, click on Report. A log file will appear. Please copy and paste the contents of that file in your next reply.

Download http://public.avast.com/~gmerek/aswMBR.exe (aswMBR.exe) to your desktop. Double click the aswMBR.exe to run it

  • Click the "Scan" button to start scan.
  • Upon completion of the scan, click Save log, and save it to your desktop. (Note - do not select any Fix at this time) <- IMPORTANT
  • Please post the contents of that log in your next reply.
There shall also be a file on your desktop named MBR.dat. Right click that file and select Send To>Compressed (zipped) folder. Please attach that zipped file in your next reply.

===

Please post the logs for my review.

#4 Y475

Y475
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:11:56 AM

Posted 13 April 2012 - 08:58 PM

Thanks Nasdaq, as per your instructions I downloaded the utility aswmbr on a different pc and copying it on a usb drive. (since I cannot access internet from my home pc). My reply to your instructions will be little slow because I have to go back and forth between my pc and friends pc. will post the results tonight.

#5 nasdaq

nasdaq

  • Malware Response Team
  • 38,746 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:12:56 PM

Posted 14 April 2012 - 07:45 AM

USB drives can be infected. If you can transfer files using a CD which is more secure.

#6 nasdaq

nasdaq

  • Malware Response Team
  • 38,746 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:12:56 PM

Posted 20 April 2012 - 09:30 AM

Are you still with me?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users