Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Forced Dial-up Connection, Disabled Lan


  • Please log in to reply
7 replies to this topic

#1 satcomjimmy

satcomjimmy

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:51 AM

Posted 28 February 2007 - 11:47 AM

A friend dropped his box off with me for help, saying he can't get online. It looks like he had been infected with various crap and he cleaned it up for the most part. When trying to go online it pulled up the home page (Google) but when you try to search or navigate elsewhere it brought up a dial-up connection box. I did a registry IE fix I had downloaded a while back and I was able to get right on over my LAN. I started trying to do online scans at F-secure and Housecall and they got hungup when updating defenitions, I saw ipconfig.exe pop up momentarily in Process Explorer and then it started back with the Dial-up box saying i was not connected.

I ran Rootkit Revealer and it came up with HKLM\Software\Microsoft\Crypto\RNG\Seed, saying there was a mismatch between Windows API and raw hive data.

GMER found a ton of stuff, too much to document, I chose to "Restore Code" in GMER and it got me back online until I tried the online scans again.

This looks like Rootkit activity but I have no idea how to procede from here.

Any help is appreciated.

BC AdBot (Login to Remove)

 


m

#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,607 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:51 AM

Posted 28 February 2007 - 12:28 PM

It is normal for a Firewall, some Anti-virus and Anti-malware software (ProcessGuard, Prevx1, Ewido), sandboxes, virtual machines and Host based Intrusion Prevention Systems (HIPS) to hook into the OS kernal/SSDT in order to protect your system. You should not be alarmed if you see any hidden entries created by these software programs in GMER or other ARK tools.

HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed - Data mismatch between Windows API and raw hive data is due to something still running in the background that is accessing the Windows Cryptographic service and Windows locks that key while whatever that is running is using the service. Basically, A known false positive.

What cleaning steps did your friend take? What type of anti-virus is he using? Has he performed any anti-spyware scans or tried doing the scans in "SAFE MODE"?

You can do other scans for hidden items that will be easier to use. Download AVG Anti-Rootkit Beta and save to your desktop
  • Double click avgarkt-beta-1.1.0.29.exe to install. By default it will install to "C:\Program Files\GRISOFT\AVG Anti-Rootkit Beta".
  • Accept the licence and follow the prompts to install.
  • You will be asked to reboot to finish the installation so click "Finish".
  • After rebooting, double-click the icon for AVG Anti-Rootkit Beta on your desktop.
  • You will see a window with four buttons at the bottom.
  • Click "Search For Rootkits" and the scan will begin.
  • You will see the progress bar moving from left to right. The scan will take some so be patient and let it finish.
  • When the scan has finished, a small window will open so you can view the results.
  • Click "Save Result To File".
  • If anything was found, click "Remove selected items"
  • If nothing was found, please click the "Perform in-depth Search" saving anything found to file as before.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 satcomjimmy

satcomjimmy
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:51 AM

Posted 28 February 2007 - 02:48 PM

He was completely unaware of any cleaning prior to bringing it to me, so I guess it was only automated cleanup by Mcafee. Mcafee was installed when he bought it from Dell. He does use dial-up but it still shouldn't automatically change connection settings for the LAN. I will try some scans in safe mode when I get home and post any results.

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,607 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:51 AM

Posted 28 February 2007 - 03:01 PM

Ok. Let us know how it goes.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 satcomjimmy

satcomjimmy
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:51 AM

Posted 03 March 2007 - 11:59 AM

Alright, AVG anti-rootkit didn't find anything nor did rootkit revealer, I tried RKUnhooker and it's a bit over my head. When I run GMER it finds alternate data streams on some .jpg files that I don't understand. I found the system was opening connections to amsterdam so I used tcpview to kill them and I have been able to run some online scans, cleaned a few things on the main login and am now repeating the process on the secondary login.

Is there any legitimate reason for an ads on a picture file?

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,607 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:51 AM

Posted 03 March 2007 - 02:43 PM

Windows XP and earlier OS versions with NTFS supports Alternate Data Streams. Using ADS allows hiding data behind various file types to include text, graphics (image thumbnails) and executables. The hidden stream is used to tell the system how to use the data contained in the file.

Indexing service adds data streams to image files
Windows Alternate Data Streams
Fork (filesystem)
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 satcomjimmy

satcomjimmy
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:51 AM

Posted 03 March 2007 - 10:28 PM

I guess I crippled the thing and believe I found the base of the issues, Panda showed:

Dialer:dialer.xd - c:\windows\switchagreement.txt (I deleted this)
Adware:adware/mirar - Windows Registry
Adware:adware/mediatickets - Windows Registry
Dialer:Dialer.ABR - C:\WINDOWS\Downloaded Program Files\startbf2.inf (this one is not visible in the folder nor can I find it in spybot's active x list, I do have it set to see hidden files, etc.)

Housecall found some stuff earlier but locked up cleaning it, one was TSPY_Beastdoor and it had HKCR\.bst and HKLM\Software\Classes\.bst entries that I've deleted. It also found mirarsetup.inf in windows\downloaded program files (couldn't see it) and panda found registry entries so I believe that is still there but hidden. It also found something it labeled trojan-downloader.win32.mediket.br but I didn't get the location before it locked up.
Long story short, I am slowly crippling it but not killing the root and it seems it is somewhere in the downloaded program files folder.

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,607 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:51 AM

Posted 04 March 2007 - 08:18 AM

Please read and follow all instructions in the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". You may have performed some of these steps already. In step #9 there are instructions for downloading HijackThis and creating a log. (This is a self-extracting version which will automatically install HJT in the proper location.)

When you have done that, post your log in the HijackThis Logs and Analysis Forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. Please include the top portion of the HijackThis log that lists version information. An expert will analyze your log and reply with instructions advising you what to fix.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

If after 5 days you still have received no response, then post a link to your HJT log in the thread titled "Haven't Had A Reply In Five Days?".

After posting a log you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc.) unless advised by a HJT Team member. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make may cause confusion for the member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users