Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Torjan.FakeMS and others - malwarebytes cleans but destroys OS


  • This topic is locked This topic is locked
16 replies to this topic

#1 AlexanderZ

AlexanderZ

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern California, US
  • Local time:08:21 AM

Posted 23 September 2013 - 07:44 AM

I have followed the steps (Rkill, Tdskiller. Malwarebytes) for cleaning Internet Security 2013 cleaning on Windows 7 and after the last step the OS is getting stuck on "interactive logon process initialization has failed". Tried System Restore from OS CD and SFC fails to do anything. Upgrade Install of OS requires the launch to be done from operational OS - so I am at the dead end there.

 

Tried System Restore to an earlier recovery point - but all of them are infected. I ended up restoring to the earliest and posting here to see if there is a gentler process that does not damage the OS as much.

 

Ran DDS:

 

DDS (Ver_2012-11-20.01) - NTFS_x86 NETWORK
Internet Explorer: 10.0.9200.16660  BrowserJavaVersion: 1.6.0_30
Run by zz_lua_admin at 5:31:15 on 2013-09-23
Microsoft Windows 7 Professional   6.1.7601.1.1252.1.1033.18.1918.1195 [GMT -7:00]
.
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\System32\vds.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\ctfmon.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\conhost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
.
============== Pseudo HJT Report ===============
.
BHO: &Yahoo! Toolbar Helper: {02478D38-C3F9-4efb-9B51-7695ECA05670} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: Yahoo! Toolbar: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [LogMeIn GUI] "c:\program files\logmein\x86\LogMeInSystray.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [VirtualCloneDrive] "c:\program files\elaborate bytes\virtualclonedrive\VCDDaemon.exe" /s
mRun: [wetasf] "c:\windows\system32\rundll32.exe" "c:\users\jennifer\appdata\roaming\wetasf.dll",_Clear
mRun: [kmaprn] "c:\windows\system32\rundll32.exe" "c:\users\jennifer\appdata\roaming\kmaprn.dll",UnicodeFilename
mRun: [dedxy] "c:\windows\system32\rundll32.exe" "c:\users\jennifer\appdata\roaming\dedxy.dll",Int_FromSize_t
mRun: [defthl] rundll32.exe "c:\users\jennifer\appdata\roaming\defthl.dll",vIsModuleLoaded
mRun: [ubastr] "c:\windows\system32\rundll32.exe" "c:\users\jennifer\appdata\roaming\ubastr.dll",LocalsToFast
mRun: [mpert] rundll32.exe "c:\users\jennifer\appdata\roaming\mpert.dll",WithFilenameObjectStr
mRun: [rerop] rundll32.exe "c:\users\jennifer\appdata\roaming\rerop.dll",memcpy_check
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\quickb~1.lnk - c:\program files\common files\intuit\quickbooks\qbupdate\qbupdate.exe
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\wirele~1.lnk - c:\program files\trendnet\tew-624ub\WlanCU.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:145
mPolicies-System: ConsentPromptBehaviorAdmin = dword:0
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableLUA = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
mPolicies-System: PromptOnSecureDesktop = dword:0
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
DPF: {82774781-8F4E-11D1-AB1C-0000F8773BF0} - hxxps://transfers.ds.microsoft.com/FTM/TransferSource/grTransferCtrl.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} - hxxps://secure.logmein.com//activex/ractrl.cab?lmi=972
TCP: NameServer = 192.168.169.11
TCP: Interfaces\{A6276793-AD75-4853-A1EB-35F5AFEF756F} : DHCPNameServer = 192.168.169.11
TCP: Interfaces\{C7C07CD3-C610-4341-8824-986C8409D6C8} : DHCPNameServer = 192.168.168.1
SSODL: WebCheck - <orphaned>
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\28.0.1500.95\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
.
================= FIREFOX ===================
.
FF - ProfilePath - 
.
============= SERVICES / DRIVERS ===============
.
R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 636416]
S2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\logmein\x86\LMIGuardianSvc.exe [2012-1-31 880640]
S2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\logmein\x86\rainfo.sys [2011-9-16 13624]
S2 LMIRfsDriver;LogMeIn Remote File System Driver;c:\windows\system32\drivers\LMIRfsDriver.sys [2012-2-2 47640]
S2 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\sisoftware\sisoftware sandra lite 2012.sp1c\RpcAgentSrv.exe [2012-2-2 605184]
S2 TeamViewer7;TeamViewer 7;c:\program files\teamviewer\version7\TeamViewer_Service.exe [2012-2-2 3533824]
S2 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\wat\WatAdminSvc.exe [2012-2-3 1845760]
S2 WlanWpsSvc;WlanWpsSvc;c:\program files\trendnet\tew-624ub\WlanWpsSvc.exe [2012-2-2 679936]
S3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys [2010-11-20 62464]
S3 RTL8192su;Realtek RTL8192SU Wireless LAN 802.11n USB 2.0 Network Adapter;c:\windows\system32\drivers\RTL8192su.sys [2010-11-25 603240]
S3 StorSvc;Storage Service;c:\windows\system32\svchost.exe -k LocalSystemNetworkRestricted [2009-7-13 20992]
S3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\TsUsbFlt.sys [2010-11-20 52224]
S3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-20 27264]
.
=============== Created Last 30 ================
.
2013-09-23 04:43:59 -------- d-sh--w- C:\$$PendingFiles
2013-09-20 16:47:54 2748256 ----a-w- c:\program files\windows defender\en-us\systemprofile\appdata\local\temp\5AC147D1-E42F-42CD-914D-9AF7D24F8E25.exe
2013-09-20 16:47:48 -------- d-----w- C:\TDSSKiller_Quarantine
2013-09-20 16:29:57 2748256 ----a-w- c:\program files\windows defender\en-us\systemprofile\desktop\abc123.com
.
==================== Find3M  ====================
.
2013-09-23 06:49:46 707584 ----a-w- c:\windows\system32\WUDFHost.exe
2013-09-23 06:49:17 590336 ----a-w- c:\windows\system32\wbem\WinMgmt.exe
2013-09-23 06:48:38 561152 ----a-w- c:\windows\system32\taskhost.exe
2013-09-23 06:47:23 588800 ----a-w- c:\windows\system32\newdev.exe
2013-09-23 06:47:18 587264 ----a-w- c:\windows\system32\ndadmin.exe
2013-09-23 06:46:29 554496 ----a-w- c:\windows\system32\lodctr.exe
2013-09-23 06:46:09 576512 ----a-w- c:\windows\system32\hdwwiz.exe
2013-09-23 06:46:00 1198080 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-09-23 06:45:33 604672 ----a-w- c:\windows\system32\dwm.exe
2013-09-23 06:35:23 6688768 ----a-w- c:\windows\RtHDVCpl.exe
2013-09-23 05:14:32 829440 ----a-w- c:\windows\system32\spoolsv.exe
2013-09-23 05:14:29 1245184 ----a-w- c:\windows\system32\Ati2evxx.exe
2013-09-23 05:08:14 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-08-16 17:24:43 583680 ----a-w- c:\windows\system32\RegisterIEPKEYs.exe
2013-07-26 03:13:24 1767936 ----a-w- c:\windows\system32\wininet.dll
2013-07-26 03:12:04 2877440 ----a-w- c:\windows\system32\jscript9.dll
2013-07-26 03:12:00 61440 ----a-w- c:\windows\system32\iesetup.dll
2013-07-26 03:12:00 109056 ----a-w- c:\windows\system32\iesysprep.dll
2013-07-26 02:49:14 2706432 ----a-w- c:\windows\system32\mshtml.tlb
2013-07-25 08:57:27 1620992 ----a-w- c:\windows\system32\WMVDECOD.DLL
2013-07-19 01:41:01 2048 ----a-w- c:\windows\system32\tzres.dll
2013-07-10 12:06:20 3128320 ----a-w- c:\windows\explorer.exe
2013-07-09 04:52:10 175104 ----a-w- c:\windows\system32\wintrust.dll
2013-07-09 04:50:42 652800 ----a-w- c:\windows\system32\rpcrt4.dll
2013-07-09 04:46:31 140288 ----a-w- c:\windows\system32\cryptsvc.dll
2013-07-09 04:46:31 1166848 ----a-w- c:\windows\system32\crypt32.dll
2013-07-09 04:46:31 103936 ----a-w- c:\windows\system32\cryptnet.dll
2013-07-08 22:44:16 939520 ----a-w- c:\windows\system32\SearchIndexer.exe
2013-07-08 22:43:37 547840 ----a-w- c:\windows\system32\UI0Detect.exe
2013-07-08 22:42:42 646144 ----a-w- c:\windows\system32\msdtc.exe
2013-07-08 18:26:59 650752 ----a-w- c:\windows\system32\wextract.exe
2013-07-08 18:25:47 637952 ----a-w- c:\windows\system32\SoundRecorder.exe
2013-07-08 18:24:59 588800 ----a-w- c:\windows\system32\newdev(266).exe
2013-07-08 18:23:53 662528 ----a-w- c:\windows\system32\iexpress.exe
2013-07-08 18:19:36 578048 ----a-w- c:\windows\system32\driverquery.exe
2013-07-08 18:18:59 534528 ----a-w- c:\windows\system32\chgport.exe
2013-07-08 18:17:47 1708032 ----a-w- c:\windows\RtlUpd.exe
2013-07-08 18:17:42 910336 ----a-w- c:\windows\regedit.exe
2013-07-08 18:12:44 827392 ----a-w- c:\windows\HideWin.exe
2013-07-08 18:12:43 1009152 ----a-w- c:\windows\HelpPane.exe
2013-07-08 18:12:32 525824 ----a-w- c:\windows\fveupdate.exe
2013-07-08 18:11:45 577024 ----a-w- c:\windows\bfsvc.exe
2013-07-08 18:00:59 625152 ----a-w- c:\windows\system32\control.exe
2013-07-08 17:50:54 598016 ----a-w- c:\windows\system32\odbcad32.exe
2013-07-08 17:50:54 527360 ----a-w- c:\windows\hh.exe
2013-07-08 17:17:13 691712 ----a-w- c:\windows\system32\notepad.exe
2013-07-08 17:17:13 691712 ----a-w- c:\windows\notepad.exe
2013-07-08 17:17:13 613376 ----a-w- c:\windows\system32\mobsync.exe
2013-07-08 17:17:12 814592 ----a-w- c:\windows\system32\cmd.exe
2013-07-08 17:17:12 1909248 ----a-w- c:\windows\system32\Utilman.exe
2013-07-08 17:17:12 1158144 ----a-w- c:\windows\system32\osk.exe
2013-07-08 17:17:12 1141760 ----a-w- c:\windows\system32\Magnify.exe
2013-07-08 17:13:36 648192 ----a-w- c:\windows\system32\wbem\WmiApSrv.exe
2013-07-08 17:13:35 965632 ----a-w- c:\windows\system32\vds.exe
2013-07-08 17:13:35 1537536 ----a-w- c:\windows\system32\VSSVC.exe
2013-07-08 17:13:34 524800 ----a-w- c:\windows\system32\snmptrap.exe
2013-07-08 17:13:34 3691520 ----a-w- c:\windows\system32\sppsvc.exe
2013-07-08 17:13:33 585216 ----a-w- c:\windows\system32\msiexec.exe
2013-07-08 17:13:26 571392 ----a-w- c:\windows\system32\alg.exe
2013-07-06 05:05:35 1293760 ----a-w- c:\windows\system32\drivers\tcpip.sys
.
============= FINISH:  5:32:12.61 ===============
 

Attached File  attach.txt.zip   5.92KB   1 downloads



BC AdBot (Login to Remove)

 


#2 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:21 PM

Posted 23 September 2013 - 08:10 AM

Hi there,
my name is Marius and I will assist you with your malware related problems.

Before we move on, please read the following points carefully.

  • First, read my instructions completely. If there is anything that you do not understand kindly ask before proceeding.
  • Perform everything in the correct order. Sometimes one step requires the previous one.
  • If you have any problems while following my instructions, Stop there and tell me the exact nature of your problem.
  • Do not run any other scans without instruction or add/remove software unless I tell you to do so. This would change the output of our tools and could be confusing for me.
  • Post all logfiles as a reply rather than as an attachment unless I specifically ask you. If you can not post all logfiles in one reply, feel free to use more posts.
  • If I don't hear from you within 3 days from this initial or any subsequent post, then this thread will be closed.
  • Stay with me. I will give you some advice about prevention after the cleanup process. Absence of symptoms does not always mean the computer is clean.
  • My first language is not english. So please do not use slang or idioms. It could be hard for me to read. Thanks for your understanding.

 

 

 

 

Scan with Gmer rootkit scanner

Please download Gmer from here by clicking on the "Download EXE" Button.

  • Double click on the randomly named GMER.exe. If asked to allow gmer.sys driver to load, please consent.
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO.
  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • Sections
    • IAT/EAT
    • Show All ( should be unchecked by default )
  • Leave everything else as it is.
  • Close all other running programs as well as your Browser.
  • Click the Scan button & wait for it to finish.
  • Once done click on the Save.. button, and in the File name area, type in "ark.txt" or it will save as a .log file which cannot be uploaded to your post.
  • Save it where you can easily find it, such as your desktop.
  • Please post the content of the ark.txt here.

**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#3 AlexanderZ

AlexanderZ
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern California, US
  • Local time:08:21 AM

Posted 23 September 2013 - 08:49 AM

ARK.TXT

 

 

GMER 2.1.19163 - http://www.gmer.net
Rootkit scan 2013-09-23 06:39:56
Windows 6.1.7601 Service Pack 1 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 ST3750640NS rev.3.AEH 698.64GB
Running: urdh8ugs.exe; Driver: C:\Users\ZZ_LUA~1\AppData\Local\Temp\pwddrkog.sys
 
 
---- Devices - GMER 2.1 ----
 
AttachedDevice  \FileSystem\fastfat \Fat  fltmgr.sys
 
---- EOF - GMER 2.1 ----


#4 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:21 PM

Posted 23 September 2013 - 09:11 AM

Combofix

Combofix should only be run when adviced by a team member!

Link


Important - Save the file to your desktop!


  • Deactivate any and all of your antivirus programs /spyware scanners - they can prevent CF from doing its work.
  • Run Combofix.exe


When finished, Combofix creates a log file named C:\Combofix.txt. Please post its content in your next reply.

Note: When receiving an error message containing ""Illegal operation attempted on a registry key that has been marked for deletion" simply restart your computer to fix this.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#5 AlexanderZ

AlexanderZ
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern California, US
  • Local time:08:21 AM

Posted 23 September 2013 - 09:53 AM

I downloaded the ComboFix and copied it via USB drive and when ran, it said

 

"ALERT! It is NOT SAFE to continue! The contents of the ComboFix package has been compromised. Please download a fresh copy from ... Note: you may be infected with a file patching virus "Virut".

 

Should I download directly from the affected PC and try re-running or is there a different route to take?

 

Thanks



#6 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:21 PM

Posted 23 September 2013 - 10:02 AM

UUUURGGG!!! :wacko:

 

 

Virut would be the worst case!!!

Let´s see:

 

 

Create/Scan with Kaspersky Rescue Disk

Follow the instructions on this page for downloading the kav_rescue_10.iso (200 mb) file and creating the Kaspersky Rescue Disk.

Make sure you set to boot the machine from the CDRom drive first. Then save and exit the BIOS. The computer will begin to boot. Insert the disc in the CDrom drive, then restart the machine. It should then boot from that CD.

It's best if you refer to the instructions and images at Kaspersky How to record Kaspersky Rescue Disk 10 to a CD/DVD and boot my computer from the disk?

Once it boots from CD, press a key so it continues to boot from that CD.

Select the language, then be sure to select Kaspersky Rescue Disk Graphic Mode.

Kaspersky should begin scanning your machine. If it finds infection, look carefully at the files it lists. If any of them seem to be legit files, do not allow it to clean/quarantine/delete them. Rather, save the log and post the results for me to look over.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#7 AlexanderZ

AlexanderZ
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern California, US
  • Local time:08:21 AM

Posted 23 September 2013 - 10:34 AM

ISO burnt, scan started. I started the default scan with only two options checked.

 

Kaspersky Rescue Disk is allowing to select the following options:

 

 - Disk Boot Sectors (checked)

 - Hidden Startup objects (checked)

 - C: (NOT checked)

 - sda1 (NOT checked)

 

 

Should I check the "C:" and/or "sda1"?



#8 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:21 PM

Posted 23 September 2013 - 10:39 AM

check all options and proceed


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#9 AlexanderZ

AlexanderZ
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern California, US
  • Local time:08:21 AM

Posted 23 September 2013 - 05:00 PM

Here is the log from Kaspersky Rescue Disk 10...

 

I tried cutting the file up and post in parts, but so far I tried 4 different sizes and it's not small enough... If I cut any smaller - it would be over 50 posts. I am attaching it zipped. If that does not work - I will try and do a multi-part post with smaller chunks, but it will take a while...

 

If it's possible - can I post large logs like this on gist.github.com? it is very fast and it can be accessed by URL?

 

Thanks

Attached Files


Edited by AlexanderZ, 23 September 2013 - 05:06 PM.


#10 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:21 PM

Posted 24 September 2013 - 04:42 AM

I'm afraid I have very bad news. Your system is infected with a nasty variant of Virut, a dangerous polymorphic file infector with IRCBot functionality which infects .exe, .scr files, and opens a back door that compromises your computer. Using this backdoor, a remote attacker can access and instruct the infected computer to download and execute more malicious files. -- Note: As with most malware infections, the threat name may be different depending on the anti-virus or anti-malware program which detected it. Each security vendor uses their own naming conventions to identify various types of malware.

With this particular infection, the safest solution and only sure way to remove it effectively is to reformat and reinstall the OS. Why? According to this Norman White Paper Assessment of W32/Virut, some variants can infect the HOSTS file and block access to security related web sites. Other variants of virut can even penetrate and infect .exe files within compressed files (.zip, .cab, rar). The Virux and Win32/Virut.17408 variants are an even more complex file infectors which can embed an iframe into the body of web-related files and infect script files (.php, .asp, .htm, .html, .xml). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair and in some instances can disable Windows File Protection. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable. The longer virut remains on a computer, the more critical system files will become infected and corrupt so the degree of damage can vary.

The virus disables Windows File Protection by injecting code into the "winlogon.exe" process that patches system code in memory.
CA Virus detail of W32/Virut

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.
McAfee Risk Assessment and Overview of W32/Virut

There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus...Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.
AVG Overview of W32/Virut Virut is commonly spread via a flash drive (usb, pen, thumb, jump) infection using RUNDLL32.EXE and other malicious files. It is often contracted by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and a major source of system infection.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...
Keygen and Crack Sites Distribute VIRUX and FakeAV However, the CA Security Advisor Research Blog have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS. Since virut is not effectively disinfectable, your best option is to perform a full reformat as there is no guarantee this infection can be completely removed. In most instances it may have caused so much damage to your system files that it cannot be completely cleaned or repaired. In many cases the infected files (which could number in the thousands) cannot be deleted and anti-malware scanners cannot disinfect them properly. Security vendors that claim to be able to remove file infectors cannot guarantee that all traces of it will be removed as they may not find all the remnants. If something goes awry during the malware removal process there is always a risk the computer may become unstable or unbootable and you could loose access to all your data. Further, your machine has likely been compromised by the backdoor Trojan and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:

Whenever a system has been compromised by a backdoor payload, it is impossible to know if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include: • Reimaging the system • Restoring the entire system using a full system backup from before the backdoor infection • Reformatting and reinstalling the system
Backdoors and What They Mean to You This is what security expert miekiemoes has to say: Virut and other File infectors - Throwing in the Towel?

If I guide someone with Virut (or any other File Infector) present and their Antivirus cannot properly disinfect it, then I recommend a format and reinstall...dealing with such infections is a waste of time and that's why I prefer the fastest and safest solution - which is a format and reinstall...After all, I think it would be irresponsible to let the malware "stew" (download/spread/run more malware) for another couple of days/weeks if you already know it's a lost case.
This is what Jesper M. Johansson at Microsoft TechNet has to say: Help: I Got Hacked. Now What Do I Do?.

The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications).

Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#11 AlexanderZ

AlexanderZ
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern California, US
  • Local time:08:21 AM

Posted 24 September 2013 - 07:12 AM

Thank you very much for your time! While the message is rather grim, the information you provided here is very thorough. 

 

I am going to reformat the system, however, I will need to preserve some data files. What is the best and safest way to make sure I do not transfer the infection with the files? Should I copy the files on to a clean harddrive and then attach it to a well-protected PC or the one booted with Kaspersky CD and run scan and fix the infections?

 

Thanks again



#12 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:21 PM

Posted 24 September 2013 - 07:26 AM

Don´t use portable devices.

 

As posted above, Virut spreads via usb devices. Your only way to backup is to burn the files to a CD or DVD.

Attention: Don´t backup any .exe, .scr, .php, .asp, .htm, .html or .xml files as they may be infected with the malicious code.

 

To get 100% safe, scan the created CD/DVD via a Kaspersky rescue disk booted system before restoring the data to any other system.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#13 AlexanderZ

AlexanderZ
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern California, US
  • Local time:08:21 AM

Posted 24 September 2013 - 07:38 AM

Do you think it is safe to boot into Kaspersky and then plug in portable USB drive and copy while in the Kaspersky shell? and then scan it? Or I can connect another drive to same system via IDE/SATA...


Edited by AlexanderZ, 24 September 2013 - 07:39 AM.


#14 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:21 PM

Posted 24 September 2013 - 08:06 AM

This file infector is very dangerous.

 

I won´t play on risk with this crap and back up to CD/DVD only - sorry.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#15 AlexanderZ

AlexanderZ
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern California, US
  • Local time:08:21 AM

Posted 24 September 2013 - 08:10 AM

Fair enough, will do DVD... Thanks for your time!






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users