Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Suspected rootkit - persisting after HDD wipe?


  • This topic is locked This topic is locked
3 replies to this topic

#1 donteversleep

donteversleep

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:10 PM

Posted 01 August 2012 - 02:14 PM

Hi folks,

I'm not sure if I'm totally paranoid here, but I'd like some peace of mind that my system is 100% clean.

I'm running Windows 7 Home Premium - 64 bit. I'm on a Dell Studio XPS laptop.

For the past few weeks some extremely fishy stuff has been going on with my computer and I've been suspicious about a rootkit.

Symptoms:

Unnerving remote access connections.
-Caught a port open that is utilized for DDOS attacks.
-Established IP connection to the linode domain, known for involvment with bitcoins.
-Using TCPView, I've seen about 10 "System Process" connections to remote IPs pop up.
-Svchost connecting to remote, unrecognized IPs.

Hardware
-Unable to connect to wireless connection. (I can access the net through bypassing my router via ethernet).
-New "hidden" devices showing up under network devices I do not recognize. About 8 WAN Miniports, Teredo Tunnelling devices, 3 ISATAP devices.
-After windows loading screen, about 15 seconds of black screen with the "loading cursor."
-CPU usage would spike throughout the day, but this stopped about two weeks ago.

Software
-EXE files popping up and software has been installed on my system.
-Windows Sidebar installed, which I have recently learned has security vulnerabilites.
-When attempting to run an elevated command prompt, the default path would be something like: C:\Program Files\Common Files\Adobe\Adobe Version Cue CS4\
-Corrupt Winsock (made attempts to reset with netsh command) with 3rd party additions.
-Loads of folders in "shared" state
-Account privilege changes, weird unknown accounts with "full control" permissions.

Virus Scan finds:
-One month ago, Malware bytes found Trojan.Agent.CK and Trojan.Agent.Cn. Both were quarantined.
-A week later, Malware bytes found the SAME TWO exe files it had quarantined from the last scan.
-Microsoft Security Essentials found a malicious java application and deleted it.
-ADSSpy found ~15 ADS's attached to a bizarre file path that looked like "c:\Users\Default\Application Data\Common\Appdata\Common\Appdata(this repeated about ten times) - some gibberish ADS like D5F459

Unfortunately, I have no backups of these logs. I recently wiped my HDD with diskpart /cleanall from the boot command prompt. I did not want to connect my external drive to a compromised computer.

During a reinstall of windows, my system crashed during the install and I had to manually reboot. The installation completed after this.

Since clean install
- When reinstalling drivers, my wireless card was not found.
- Under device Manager "Unknown Devices" showed 3 "Base System Devices" and an "Unknown devices" with error symbols
- Event manager showed about 80 Logons during the install process (this occurred before I set my system time). No network connection.
- About 40 Firewall rules/exemptions made during the install process.
- Network devices added after each boot. After first login - only my ethernet device. Next login - 8 Wan Miniports. Current login - 6to4 adapter, two ISATAP adapters, Teredo Tunnel Interface.
- Closed my laptop lid the other night and it entered "sleep mode" My system time was changed during sleep mode. WinHTTP Web Proxy Auto-Discovery Service and DNS Client service started, computer resumed sleep and system time was normal at login.
- On most recent login, C:\ and many other folders are now in the "shared" state.
- Still experiencing 10-15 second black screen before login window. Login takes ~15 seconds even with clean install.


Weird findings in event manager since install:

Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.
DETAIL -
1 user registry handles leaked from \Registry\User\S-1-5-21-2870307713-1228017732-154039020-1000:
Process 444 (\Device\HarddiskVolume2\Windows\System32\winlogon.exe) has opened key \REGISTRY\USER\S-1-5-21-2870307713-1228017732-154039020-1000


Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware.
Old value:HKLM\SOFTWARE\Microsoft\Windows Defender\.\DisableRoutinelyTakingAction = 1
New value:HKLM\SOFTWARE\Microsoft\Windows Defender\.\DisableRoutinelyTakingAction = 0
Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware.
Old value:HKLM\SOFTWARE\Microsoft\Windows Defender\Scan\CheckForSignaturesBeforeRunningScan = 0
New value:HKLM\SOFTWARE\Microsoft\Windows Defender\Scan\CheckForSignaturesBeforeRunningScan = 1
Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware.
Old value:HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet\SpyNetReporting = 0
New value:HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet\SpyNetReporting = 1

About 1000 Security Audit events.

DCOM errors - Event ID 10005 "DCOM got error "#" attempting to start service "servicename" in order to run server {#######}


Sorry for the HUGE wall of text. I'm just not sure if some of this is actually malicious or typical system activity. I don't think there's a keylogger involved - none of my passwords have been changed. I think it's more likely a zombie/botnet rootkit. No scans have picked up a "rootkit." However - I have no idea how some of these issues are persisting after a total HDD wipe.

The actions I've taken so far are:
Malware Bytes Scan (Clean)
Microsoft Security Essentials scan (Clean)
TDSS Killer (Clean)
Windows Defender Offline (Clean)
aswMBR (Clean)
ADSSpy (One entry)

I can attach txt files of event logs for firewall changes and events during the system time change.
Thanks!

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:10 PM

Posted 01 August 2012 - 10:48 PM

Hello, I feel it is best to repost this with a DDS log.

Please go here....Preparation Guide ,do steps 6-9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If GMER won't run (it may not on a 64 bit system) skip it and move on.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 donteversleep

donteversleep
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:10 PM

Posted 02 August 2012 - 10:23 AM

Thanks for the response, boopme. I've created a new thread in the removal logs forum: http://www.bleepingcomputer.com/forums/topic463553.html

Should I be checking that post for now instead of this one?

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:10 PM

Posted 02 August 2012 - 10:41 PM

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.

The current wait time is 1 - 3 days and ALL logs are answered.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users