Any help appeciated - resistant browser hijack + suspicious svchost.exe?

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Zoodles, Apr 21, 2010.

  1. Zoodles

    Zoodles Private E-2

    Hi all, many thanks for the time and effort many of you put into helping us victims out there.

    Three days ago I downloaded an ebook which looked legit, scanned it with Comodo first (was clean) then opened it - it immediately disappeared. Thought that's a bit odd, so did a full (updated) Comodo virus scan which came back clean.

    I used Firefox and noticed Google search results were heading off to sites not listed in the results. The first one or two would work correctly then they would go to completely different places -shopping sites, search providers, exotic_burials?? The icon image before the web address for these places was usually a blue swirl - like the number 2 on its side.

    Sometimes a new tab would open all by itself AND while the internet was turned off.

    Tried using IE8 - had the same problems and also noticed that Windows Update can't connect either.

    I've always been protecting this machine with Comodo Internet Security - Firewall, Anti-virus (on access scanning) and Defence.
    Windows Defender and Firewall are turned OFF


    Programs I've run and tried since this happened:

    Cleaned Temp files with CCleaner
    Malwarebytes - many times
    Superantispyware - many times
    Hitmanpro - three times
    Esset online scanner
    Microsoft Malicious Software Removal Tool - clean
    Unhackme - tells me the system is clean
    Tdsskiller - (renamed) and picked up that the atapi.sys was infected - please reboot. Ran again after reboot and it says the same thing. Tired again and the same message appears.
    Installed and now running Avast Free Antivirus - turned Comodo Anti Virus OFF

    The above found a few odds and ends so I cleaned them but the search results still continue to be messed up.

    I've noticed that using Comodo internet network monitor and watching what is accessing the internet it shows that when the browser is hijacked I see an 'svchost' file which grows in size to around 50-150 connections trying to contact many different IP addresses. I've checked a few of these IPs out and they come up as being in Sweden or Bulgaria.

    As stated in your READ ME FIRST guide I've run Superantispyware and Malwarebytes - both clean (although as I said in previous runs they have found a couple of things)

    When I ran Combofix it got to the Disclaimer dialog - I clicked Yes then nothing happened - waited for a while but still nothing. I rebooted and it got as far as the first small progress bar, filled with green then disappeared - even less than first time.

    So I moved on to Rootrepeal which gave me a decompression error (5) when run. I tried downloading the rar and zip versions and from another machine. Tried the file on my laptop and it ran fine.

    And that's where I am now.


    Spent the last three days reading so many pages of similar problems, it seems this is a very common trojan. I don't have the fake security centre popups like many others are having, just it seems the browser redirect and that suspicious svchost behaviour.

    Any help would really be appreciated.

    Machine is Windows 7 32bit with updated patches.

    Superanti and Malware logs attached
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!
    You did not finish the instructions. You need complete trying all steps. You need to run MGtools and attach the log
     
  3. Zoodles

    Zoodles Private E-2

    Ok thanks - MGlogs.zip attached
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks like you may have the new form of TDSS infection. I see that you have run TDSSkiller at least 7 times and the last time it pointed to atapi.sys and said it would fix it at reboot. It may or may not have fixed it if it is the new form since atapi.sys would not really be the problem.

    Please run the below and attach the log from GMER. If you have any Disk Emulation Software (like Daemon Tools) running, make sure you followed the instructions in step 6 of the READ & RUN ME to disable it with Defogger first.

    GMER - running with a random name


    When you tried to run ComboFix, did you have both Avast and Comodo shutdown as specified? Did you also have UAC disabled??
     
  5. Zoodles

    Zoodles Private E-2

    Thanks chaslang

    Had to run Gmer in safe mode as was getting errors while in normal mode.

    Log is attached.
     

    Attached Files:

  6. Zoodles

    Zoodles Private E-2

    Sorry to 'bump' this but it was at the top anyway and couldn't edit my last post.

    Just tried Combo fix in safe mode, it ran further than before but when it got to ..scanning 'Completed Stage 3' an error popped up with 'Find String (QGREP) Utility has stopped working' A problem caused the program to stop working... Had to click on the 'Close program' button
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your GMER log is clean which would imply that TDSSkiller was able to remove the infection. Are you still having hijack issues?

    You did not answer the below previous questions
     
  8. Zoodles

    Zoodles Private E-2

    Still have issues with Firefox - happened on the 5/6 Google search link. Tried IE8 with Bing and search was hijacked too. Also cannot update with Windows Update - gives error - Code 80072EFE

    When trying Combofix - UAC was off, Avast shields were disabled and Comodo was exited from taskbar although I've noticed even when doing that some remnants of those programs stay in Task Manager and can't be shut down.

    Would it be an idea to uninstall Avast and Comodo then try Combofix again?
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! And if that does not work, see if you can run ComboFix in safe boot mode. Also please run the below online scanner from Kaspersky and attach the log:

    Running Kaspersky Online Scanner
     
  10. Zoodles

    Zoodles Private E-2

    Tried Combofix with Avast + Comodo unistalled - still would not run past first green progress bar.

    Tried in safe mode - it ran, got to around Stage 40 then crashed to blue screen with:

    Windows has been shut down to prevent damage to your computer

    *** STOP: 0x0000008E (0xC0000005, 0x8B1CB1E5, 0x807FDB18, 0X00000000)

    *** rdyboost.sys - Address 8B1CB1E5 base at 8B1C4000, Datestamp 4a5bc19a

    -----------

    Rebooted and had 'Device driver software was not successfully installed:

    Unknown Device X Failed

    --------

    Installed Comodo firewall so I could go online

    Opened Firefox, tried to go to Kaspersky and was sent to dodgy site.

    Quickly looked at Comodo Network monitor and a System32/svchost.exe file was sending out and receiving 66 bytes to about 200+ IP addresses. checked one online and it comes up as known malware IP address.

    Had to type in Kaspersky address to go to site, it took over 1hr to update 30% (only update not even scan) meanwhile I was being flooded on and off by these dodgy Ip addresses. Cancelled Kaspersky.
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Hmmm! Road blocks in all directions!


    Download OTL by Old Timer and save it to your Desktop.
    • Double-click OTL.exe to start the program.
    • Under Output, make sure that Standard Output is selected.
    • Under Extra Registry section, select Use SafeList.
    • Click the Scan All Users checkbox.
    • Click on Run Scan at the top left hand corner.
    • When done, two Notepad files will open.
      • OTL.txt <-- Will be opened
      • Extras.txt <-- Will be minimized
    • Click the OK button.
    • Just close the notepad windows and attach these logs from OTL to your next message.

    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )

    Then attach the below logs:
    • the two logs from OTL
    • C:\avenger.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  12. Zoodles

    Zoodles Private E-2

    Thanks again for your efforts chaslang but still having the same problem...
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's okay! I did not expect the last fix to resolve your redirect problem. It was just miscellaneous cleanup and collection of information from the new scan from OTL. We are trying to locate the system file ( or files ) that have been replaced with fakes and this can be difficult at time when not directly shown by any of the normal scans. The malware is making all of the system files appear to be of normal times, dates, sizes, and to have valid MD5 codes. Currently the only file showing up to be infected is atapi.sys as shown in the the logs from TDSSkiller that you ran. However, sometimes atapi.sys is indicated as the problem when it is not.

    We need to find a backup for atapi.sys that may need to restore from. This may or may not work depending on whether atapi.sys is really the source of the problem of not. The below is just to collect information. It will not fix anything.


    Please download SystemLook from one of the links below and save it to your Desktop.

    Download Mirror #1

    Download Mirror #2
    • Double-click SystemLook.exe to run it. (If you are using Vista, please right-click and select run as
      administartor)
    • A blank Windows shall open with the title "SystemLook v1.0-by Jpshortstuff".
    • Copy and Paste the content of the following quote box into the main textfield under "File":
    • Please Confirm everything is copied and Pasted as I have provided above
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. You can close this notepad window as the log will already
      be saved as SystemLook.txt on your Desktop ( if you downloaded and ran SystemLook to your Desktop as requested ).
    • Please attach this log in your next reply.
    Note: The scan may take a while from several seconds to a minute or more depending on the number of
    files you have and how fast your computer can perform the task.





    Now download DDS and save it to your Desktop
    • Disable any script blockers/protection software
    • Now double click dds.scr to run the tool.
    • When it finishes, DDS will open two (2) logs
      1. DDS.txt
      2. Attach.txt
    • Save both reports to your Desktop.
    • And then attach them to your next message.


    Do you have your Windows 7 boot DVD that could be used to boot to the System Recovery Options if necessary?
     
    Last edited: Apr 26, 2010
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Also please do the below.

    Run OTL
    • Under the Custom Scans/Fixes box at the bottom, paste in the following
    Code:
    :OTL
    O7 - HKU\S-1-5-21-698486764-79579113-2045735674-1001\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    @Alternate Data Stream - 121 bytes -> C:\ProgramData\TEMP:DFC5A2B2
    @Alternate Data Stream - 109 bytes -> C:\ProgramData\TEMP:A8ADE5D8
    
    :Commands
    [emptytemp]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Open OTL again and click the Quick Scan button. Attach the new log it produces in your next reply.
     
  15. Zoodles

    Zoodles Private E-2

    Thanks for your continued efforts chaslang - all logs included below.

    I don't have a Win 7 disk as it came pre-installed but I can access the recovery console from the F8 boot options (I also made a repair DVD when I got the machine a few months ago - not sure if that's the same thing?)
     

    Attached Files:

  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  17. Zoodles

    Zoodles Private E-2

    Yes I have that screen and command prompt option.

    Only difference - it says 'Operating System: Windows 7 on (E:) Local Disk' - I'm guessing E is the partition where Win 7 backup files are kept.
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not sure about that. Your OS was on drive C and you had another disk as drive D
    Code:
    Item Value 
    Drive C: 
    Description Local Fixed Disk 
    Compressed No 
    File System NTFS 
    Size 465.66 GB (500,000,878,592 bytes) 
    Free Space 123.88 GB (133,014,626,304 bytes) 
    Volume Name  
    Volume Serial Number C2B8F6DF 
      
    Drive D: 
    Description Local Fixed Disk 
    Compressed No 
    File System NTFS 
    Size 149.04 GB (160,031,014,912 bytes) 
    Free Space 25.36 GB (27,227,201,536 bytes) 
    Volume Name  
    Volume Serial Number EC48DF37 
    Drive E was your CD ROM.

    What happens if you click the Command Prompt button?
     
  19. Zoodles

    Zoodles Private E-2

    Of course, you are right - E: is my CD/DVD drive.


    Clicking command prompt opens black window titled:

    'Administrator: X:/windows/system32/cmd.exe'

    with cursor flashing at end of line:

    'X:/windows/system32>_'
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay before booting back to this command prompt window, from normal Windows, copy the below file

    C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_x86_neutral_f64b9c35a3a5be81\atapi.sys


    And put the copy at C:\atapi.sys so that it is much easier to get to without alot of typing. If for some reason you cannot copy it to C:\atapi.sys then try copying it to c:\windows\atapi.sys

    Then boot back to that System Recovery, Command Prompt line and at the command prompt, enter the below series of commands that are in bold black each followed by the enter key. The purple and brown text is just informational.

    cd drivers
    • Note the space after the cd. The prompt should change to X:/windows/system32\drivers>
    • If it does not change to this prompt, you must not continue. Just come back and tell me what happened.
    ren atapi.sys atapi.sys.old
    • Note the space before each atapi
    copy x:\atapi.sys atapi.sys
    • Use the above if you had previously copied the file mentioned above to C:\atapi.sys. And then skip the below copy command. Otherwise run the below copy command if you previously copied the file to the Windows folder. You should see a message about 1 file being copied
    copy x:\windows\atapi.sys atapi.sys
    • Use the above if you had previously copied the file mentioned above to C:\windows\atapi.sys. You should see a message about 1 file being copied
    dir atapi.sys
    • Make sure you get a file listing showing the atapi.sys file. If you do not, that means something above did not work. You must not shutdown or reboot until you get this file copied because your PC will not boot up if this file is missing. If it becomes necessary to get the file back, just use ren atapi.sys.old atapi.sys to rename back the original copy.
    Then reboot your PC normally and run TDSSkiller one more time.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!

     
  21. Zoodles

    Zoodles Private E-2

    Ok I did everything down to copying the atapi.sys in DOS because I got a file not found message.

    Did a check for another file on the root of C: which I know is there and also got file not found. I did a dir check on the x:/program files folder and it only came up with 4 folders - my C:/program files must have over 40 folders

    Strangely it seems in DOS my C: drive is the E: drive, my D: drive is my C: - completely different to what Windows 7 sees them as. Doing a dir on the E: showed all the contents of what I know in Windows as my C: drive??! :confused

    So after all that I was able to make a copy of the atapi.sys using your commands but in the E: drive. It confirmed the copy and I could reboot back as normal.

    Ran TDSSKILLER rebooted, ran MGlogs. Out of interest tried TDSSKILLER again and as always it says that atapi.sys is infected and as always it never cures in on next reboot.

    Tried Google and it redirected on fourth search link...
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's because the atapi.sys file must not be the source of the infection since we have replaced it. TDSSkiller is incorrectly seeing it to be the problem when there is another driver that is actually the problem. We will have to use a different method to find the real problem file. Please read ALL of the below and print it to refer to while trying to follow the instructions while offline. Make sure you understand all of it and ask any questions you have before starting.
    • Please download maxlook and save it to your Desktop.
    • Right click maxlook.exe and select Run As Administrator to run it.
      • Note - you must run it only once!
    • As instructed when the tool runs, restart the computer and logon to the System Recovery Environment.
      • Select Command Prompt like you did the previous time
      • Once you get to the System Recovery Options screen, we will have to change directories and drive to the E drive which you have now determined to be your operating system drive. The instructions are below.
    • Type the following bolded command at the x:\sources> prompt (or x:\windows\system32>) then hit Enter.
      • cd /d e:\windows <--- the red e represents your operating system drive letter, as shown in the image below which happens to show drive C rather than E. So where you see C: in the below, you should have drive E. Also note that this picture shows Vista but you will have Windows 7. NOTE: there is a space ater the cd and before the e:
    [​IMG]
    • At the C:\Windows> prompt type the following look.bat command then hit Enter (You can see how it looks in the above image).
      • look.bat
    • You will see many files copied then return to the e:\windows> prompt.
    • Type Exit then restart your computer and logon in normal mode.
    • Please click Start > Run and type
      • maxlook -sig
    • Then hit enter. A logfile will open, please attach this logfile.
     
  23. Zoodles

    Zoodles Private E-2

    Thanks chaslang

    Log attached
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay that appears to indicate another driver as suspected. Are you still unable to run ComboFix? Can you run it in safe boot mode with Avast disabled? The next step could be possibly be easier if we could run ComboFix since it may be able to correct the problem file. Otherwise would have to replace the file manually from the system recovery console.
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    In the meantime, let's also get a copy of the file we will need.

    In a normal Windows boot environment ( that is, NOT from the System Recovery Console), use Windows Explorer to copy the c:\windows\system32\drivers\vdrvroot.sys and put the copy into the C:\windows folder so that you have c:\windows\vdrvroot.sys

    Then right click on the file c:\windows\vdrvroot.sys and right click it and select Properties. Then click the Details tab and make sure that it shows the below:
    File description: Virtual Drive Root Enumerator
    Product name: Microsoft Windows Operating System
    There will be more info than the above but those two lines are a sufficient check.
     
  26. Zoodles

    Zoodles Private E-2

    Still can't run combofix successfully. Ran it again and it got as far as the disclaimer screen yes/no option - I clicked Yes and it just stopped working (gave it ten minutes still nothing)


    Ok I've copied the vdrvroot.sys file to the Windows folder. File properties were as you stated.
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then boot back to that System Recovery, Command Prompt line and at the command prompt, enter the below series of commands that are in bold black each followed by the enter key. The purple and brown text is just informational.

    cd drivers
    • Note the space after the cd. The prompt should change to e:/windows/system32\drivers>
    • If it does not change to this prompt, you must not continue. Just come back and tell me what happened.
    ren vdrvroot.sys vdrvroot.sys.old
    • Note the space before each vdrvroot
    copy E:\windows\vdrvroot.sys vdrvroot.sys
    • The above should make a copy of the file you copied into your Windows folder while normal Windows was running and put it into the drivers folder. You should see a message about 1 file being copied
    dir vdrvroot.sys
    • Make sure you get a file listing showing the vdrvroot.sys file. If you do not, that means something above did not work. You must not shutdown or reboot until you get this file copied because your PC may not boot up if this file is missing. If it becomes necessary to get the file back, just use ren vdrvroot.sys .old vdrvroot.sys to rename back the original copy.
    Then reboot your PC normally and run TDSSkiller one more time.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  28. Zoodles

    Zoodles Private E-2

    Ok did all that successfully and for the first time tdsskiller said no infection.

    Used Google/Yahoo for about ten minutes, must have clicked on over 50 links and NO redirections! Windows update now works too. Comodo internet monitor also seems to show much less random outbound svchost activity.

    Can't quite believe it may be gone. Thank you so much chaslang, I bet you must have thought this thing would never be removed, so thanks for sticking with me and my computer.

    It still amazes me how easily a small file can infect a system and completely evade all leading malware/antivirus programs - if it wasn't for people like you giving advice I'm sure we'd all have to reinstall.


    Mglogs attached...
     

    Attached Files:

  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Your logs are clean now.

    On the contrary! I knew we could get it fixed. It was just a matter of isolating the problem file. As I said back in message # 4 that I did not believe atapi.sys was the source of the problem even though TDSSkiller implied it was. These infections are evolving all the time to make it more difficult to find and remove. When the malware creators learn the steps we take to find and remove the infection, the will try to adapt the infection to defeat the detection and removal procedures.



    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds