Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Several instances of nasty virus/possible malware or rootkit (Part 2)


  • This topic is locked This topic is locked
4 replies to this topic

#1 jthomp.uscav

jthomp.uscav

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:51 AM

Posted 24 May 2012 - 08:21 AM

Hello all-

I initially posted about having several instances of possible malware/rootkits. (I tried to hyper link the thread but couldn't make it work) Narenxp reached out to me and had me run TDSSKiller and aswMBR, of which I posted the logs in that same thread. They then directed me to run dds and GMER to gather those log files. I do have the GMER log but could not download dds (Recommendations?). Per the instructions here: My link I am posting the GMER log.


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-05-23 16:55:46
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 WDC_WD1600AAJS-75M0A0 rev.02.03E02
Running: iq9n8wok.exe; Driver: C:\DOCUME~1\dback\LOCALS~1\Temp\uxdyipoc.sys


---- System - GMER 1.0.15 ----

SSDT 898E5A00 ZwAlertResumeThread
SSDT 898E5AC0 ZwAlertThread
SSDT 89517368 ZwAllocateVirtualMemory
SSDT 89561C68 ZwConnectPort
SSDT 898E57B0 ZwCreateMutant
SSDT 898B4420 ZwCreateThread
SSDT 89599D80 ZwFreeVirtualMemory
SSDT 898E5880 ZwImpersonateAnonymousToken
SSDT 898E5940 ZwImpersonateThread
SSDT 893F3F70 ZwMapViewOfSection
SSDT 898E56F0 ZwOpenEvent
SSDT 895971D0 ZwOpenProcessToken
SSDT 895D46B0 ZwOpenThreadToken
SSDT \??\C:\WINDOWS\system32\drivers\wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation) ZwProtectVirtualMemory [0xBA18DBA0]
SSDT 895BBD98 ZwResumeThread
SSDT 89543338 ZwSetContextThread
SSDT 895D4780 ZwSetInformationProcess
SSDT 895D4558 ZwSetInformationThread
SSDT 898E5630 ZwSuspendProcess
SSDT 89599D00 ZwSuspendThread
SSDT 895228D0 ZwTerminateProcess
SSDT 89596498 ZwTerminateThread
SSDT 895211D0 ZwUnmapViewOfSection
SSDT 898E9A28 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

? C:\DOCUME~1\dback\LOCALS~1\Temp\aswMBR.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\SearchIndexer.exe[3268] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

Device Ntfs.sys (NT File System Driver/Microsoft Corporation)
Device Fastfat.SYS (Fast FAT File System Driver/Microsoft Corporation)
Device \Driver\Tcpip \Device\Ip wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)

AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\Tcpip \Device\Tcp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)

AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\Tcpip \Device\Udp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)

AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\Tcpip \Device\RawIp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)

AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\Tcpip \Device\IPMULTICAST wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
Device mrxsmb.sys (Windows NT SMB Minirdr/Microsoft Corporation)
Device Cdfs.SYS (CD-ROM File System Driver/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

Thanks in advance.

BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:51 AM

Posted 30 May 2012 - 08:25 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/454732 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows, you should not bother creating a GMER log.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 jthomp.uscav

jthomp.uscav
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:51 AM

Posted 30 May 2012 - 11:58 AM

History of the issue:

PC in questions: Dell Optiplex 380/ Intel Core 2 Duo/ E7500 @ 2.93GHz/ 2GB RAM. Windows XP PRO/Service Pack 3/32bit/Version 2002

History: Several days ago, I was running through uninstalling Microsoft Online Services (MSOL) from a user's PC due to a seemingly unrelated issue. Once I uninstalled the application, I rebooted the machine. There were no issues until it go to the desktop. It loaded the background image and task bar. I tried to re-run the task (Task Manager>New task>explorer.exe) After a couple of attempts, I finally got it to load completely however, I began to get hammered with Symantec Endpoint Protection (SEP) notifications of quarantined infections. it stopped at 37 instances of Trojan.Gen.2, TrojanFakeAV, Bloodhound.MalPE and Trojan.Zeroaccess--80000032.@ filename is mostly linked to the various risks. The SEP client is running intermittently, as in I can open the interface just fine but it will freeze to the point I have to use task manager to close it. I was able to export the SEP report to a .csv file. I can attach that if needed.

I just finished an MBAM scan which yielded nothing. I have SEP running another scan as I type this. When I think it's clean, the infections pop back up. It is my belief (through reading Google) that these are extremely invasive infections that I simply don't have the experience to deal with properly. I look forward to any help that can be offered. If I have missed any relevant information, I apologize. Thank you in advance.
**************************

I have ran TDSSKiller, aswMBR, and GMER. I have re-ran the GMER per request. I have not been able to run DDS as the download link would not work for me. I do have the original Windows installation disc as well.


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-05-30 12:44:35
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 WDC_WD1600AAJS-75M0A0 rev.02.03E02
Running: iq9n8wok.exe; Driver: C:\DOCUME~1\dback\LOCALS~1\Temp\uxdyipoc.sys


---- System - GMER 1.0.15 ----

SSDT 898E5A00 ZwAlertResumeThread
SSDT 898E5AC0 ZwAlertThread
SSDT 89517368 ZwAllocateVirtualMemory
SSDT 89561C68 ZwConnectPort
SSDT 898E57B0 ZwCreateMutant
SSDT 898B4420 ZwCreateThread
SSDT 89599D80 ZwFreeVirtualMemory
SSDT 898E5880 ZwImpersonateAnonymousToken
SSDT 898E5940 ZwImpersonateThread
SSDT 893F3F70 ZwMapViewOfSection
SSDT 898E56F0 ZwOpenEvent
SSDT 895971D0 ZwOpenProcessToken
SSDT 895D46B0 ZwOpenThreadToken
SSDT \??\C:\WINDOWS\system32\drivers\wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation) ZwProtectVirtualMemory [0xBA18DBA0]
SSDT 895BBD98 ZwResumeThread
SSDT 89543338 ZwSetContextThread
SSDT 895D4780 ZwSetInformationProcess
SSDT 895D4558 ZwSetInformationThread
SSDT 898E5630 ZwSuspendProcess
SSDT 89599D00 ZwSuspendThread
SSDT 895228D0 ZwTerminateProcess
SSDT 89596498 ZwTerminateThread
SSDT 895211D0 ZwUnmapViewOfSection
SSDT 898E9A28 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

? C:\DOCUME~1\dback\LOCALS~1\Temp\aswMBR.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\SearchIndexer.exe[3268] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

Device Ntfs.sys (NT File System Driver/Microsoft Corporation)
Device Fastfat.SYS (Fast FAT File System Driver/Microsoft Corporation)
Device \Driver\Tcpip \Device\Ip wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)

AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\Tcpip \Device\Tcp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)

AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\Tcpip \Device\Udp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)

AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\Tcpip \Device\RawIp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)

AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\Tcpip \Device\IPMULTICAST wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
Device mrxsmb.sys (Windows NT SMB Minirdr/Microsoft Corporation)
Device Cdfs.SYS (CD-ROM File System Driver/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

#4 nasdaq

nasdaq

  • Malware Response Team
  • 40,459 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:08:51 AM

Posted 31 May 2012 - 09:50 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.
===

Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your Anti-Virus and Anti-Spyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Close any open browsers, and all other programs working. Make sure you save your file if working on a document.
  • Do not install any other programs until this if fixed.[/b]
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
  • Some Rookit infection may damage your boot sector. The Windows Recovery Console may be needed to restore it. Do not bypass this installation. You may regret it.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Note: If you have difficulty properly disabling your protection programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Do not mouse click ComboFix's window while it's running. That may cause it to stall
===

Third party programs if not up to date can be the cause of infiltration an infection.

Please run this security check for my review.

Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
===

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.

Please post the logs and let me know if the problem persists.

#5 jthomp.uscav

jthomp.uscav
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:51 AM

Posted 31 May 2012 - 01:55 PM

Well, I got the logs, and right after was told to just reformat it and press on by my superior. :killcomp::/ Thanks for everything folks, I was really hoping that we could resolve this and perhaps gain a little knowledge along the way. Anyway, please close this issue.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users