Infected emails automatically sending

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by pseudosoldier, Dec 29, 2005.

  1. pseudosoldier

    pseudosoldier Private E-2

    I 'acquired' SpySherrif which seems to have brought some friends with it. I believe I have gotten rid of SpySherrif, but Norton AntiVirus is catching a lot of outbound emails from me that are timing out or rejected by the host servers as spam. I'm not sending anything, so I have to assume this is malware...

    I have looked at the FAQ, and attempted to run the recommended procedures.

    I booted into safe mode.
    CCleaner found nothing.
    S+D found registry keys for smitfraud.c and activedesktop, and removed them.
    MS Antispyware found a powerreg scheduler and quarantined it.
    The computer reccomended a reboot after this, so I did, remaining in safe mode.
    CWShredder found cws.msconfig, but said that none were infected.
    kill2me did its thing, but didn't tell me if there were results.

    I rebooted into safe mode with networking available.

    BitDefender ran the online scan with no viruses found. But it became stuck checkin 42370 out of 42349 (more than I had, apparently), with a runtime remaining of 28:09:23 that did not increment. It did not finish, and I had to end it with Task Manager, so I don't have a log file.

    Panda ActiveScan detected viruses, spyware and a dialer. The log should be attached.

    Any help would be greatly appreciated.
     

    Attached Files:

  2. pseudosoldier

    pseudosoldier Private E-2

    Hijackthis log attached.

    This was actually the second run-through of the procedures that I had done. I didn't follow the steps very closely the first time through and had not taken notes. Trying to make up for it now...
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You forgot to attach the HJT log. Make sure you follow step 7 of the READ ME properly.

    Also you should run the below and attach the log:

    Running Ewido Security Suite

    While in safe mode you should use Windows Explorer to locate and delete any of the below that still remain:
    C:\WINDOWS\SYSTEM32\search.html
    C:\WINDOWS\help_dcc.dll
    C:\WINDOWS\launcher.exe
    C:\WINDOWS\SYSTEM32\SBUtils
    C:\WINDOWS\system32\drivers\i386p.sys
    C:\WINDOWS\system32\msctl32.dll
    C:\WINDOWS\system32\msupdate32.dll
     
  4. pseudosoldier

    pseudosoldier Private E-2

    I didn't forget, but I ran into some problems uploading the file. Let's see if this works now...

    I removed the files you said, except

    C:\WINDOWS\system32\msctl32.dll
    C:\WINDOWS\system32\msupdate32.dll

    which I was told were write protected or in use. I think ewido got them when I ran it later.

    Logs for ewido and hijackthis (ran after the other steps) included.
     

    Attached Files:

  5. pseudosoldier

    pseudosoldier Private E-2

    I'm still having problems attaching the hijackthis log. I'm unsure why.

    I'll try again later.

    (I don't seem to be experiencing the problem with the emailing any more; I reenabled Norton's automatic checks of outgoing email, and haven't gotten any more warnings since the other steps you reccomended.)
     
  6. pseudosoldier

    pseudosoldier Private E-2

    I was mistaken about the emails, they are still being sent out.

    I keep timing out while trying to upload the hijackthis log. I'm not sure why.

    Out of desperation, I'm posting it inline:

    Edit by chaslang: Inline log attached.
     

    Attached Files:

    Last edited by a moderator: Dec 30, 2005
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I attached your log for you. The problem was that you had this process running:

    C:\WINDOWS\system32\cmd.exe

    This is for a command prompt windows. vB has a problem with files containing this sometimes. Why was this running anyway? Note in the procedures we do request that ALL unnecessary processes be closed.

    The directions in the link that step 7 of the READ ME points to requests that you do not use msconfig to control startups as you are doing:

    O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto

    Please follow the directions in the link to select Normal Startup and post a new log attachment. DO NOT have any command prompt windows open. If you see that line in you HJT log just edit it to say c:\windows\system32\ <-- edited: command prompt

    Do not post a new HJT log though until you finish the below.

    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O18 - Filter: text/html - (no CLSID) - (no file)
    O18 - Filter: text/plain - (no CLSID) - (no file)
    O20 - Winlogon Notify: msctl32.dll - C:\WINDOWS\System32\msctl32.dll (file missing)
    O20 - Winlogon Notify: msupdate - C:\WINDOWS\SYSTEM32\msupdate32.dll
    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete the below:
    C:\WINDOWS\System32\msctl32.dll
    C:\WINDOWS\SYSTEM32\msupdate32.dll
    Let me know which you find and delete or do not find or cannot delete.
    Now if running Win XP goto c:\windows\Prefetch and delete all files in this folder.
    Now run Ccleaner (installed while running the READ ME FIRST).

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.

    Reminder Note: Once we have determine you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  8. pseudosoldier

    pseudosoldier Private E-2

    I don't know why cmd.exe was running. I didn't see any command prompts open on my desktop.
    I'm not sure how to fix it so msconfig isn't running start ups. I'm using msconfig to restart the computer in Safe and Normal mode, but when I click "Normal Startup" under the General tab of the System Configuration Utility, it automatically selects "/SAFEBOOT" under BOOT.INI and will reboot me into Safe mode. When I unselect "/SAFEBOOT", it automatically changes my selection under the General Tab to "Selective Startup".
    Ran hijackthis and fixed the four items. When I rebooted into Safe Mode, I could not find msctl32.dll, but was able to find and delete msupdate32.dll
    I deleted all files in the Prefetch folder (I am running XP).
    I ran Ccleaner.
    I selected Normal, unselected /SAFEBOOT (which switched it to Selective Startup) and rebooted.

    *****

    That was this morning. I've gone further than this, now. I did not have an updated Norton Antivirus, nor was Windows completely updated. I realize that having that done already would probably have alleviated many of the problems I've had. Now, I've done both of those things... Norton found and eradicated a worm, W32.SOBER.X, which seemed to be running my email for me. I rebooted into safe mode and ran a special removal tool to check on the worm: it was no longer present.

    I again looked for those files, and they're still gone. I ran CCleaner. I still can't reboot into Normal mode...
     
  9. pseudosoldier

    pseudosoldier Private E-2

    hijackthis log attached. Command prompt issue is still there, because I'm still booting in Selective Start mode (and can't figure out how to get back to Normal).
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Download the attach GetRunKey117.zip to your PC someplace you can locate it. Then extract the files from the ZIP. Locate the getrunkey.bat file and double click on it to run it. It will create a file named runkeys.txt in the root of drive C: (C:\runkeys.txt) . This log will also popup in a notepad window which your can just close. Upload the runkeys.txt file here are an attachment.
     

    Attached Files:

  11. pseudosoldier

    pseudosoldier Private E-2

    Downloaded, unzipped, and ran getrunkeys.bat

    Log attached.
     

    Attached Files:

  12. pseudosoldier

    pseudosoldier Private E-2

    hijackthis startuplog attached.

    I've picked up some pieces of CoolWeb on my system. I need to redo the cleaning again, I think.
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Copy the contents of the below Quote Box to Notepad. Then click File and then Save As. Change the Save as Type to All Files. Name the file fixme.reg and then click save. (make sure you save it somewhere you can find it. Saving it to your Desktop may make that easy.) Then double-click on the fixme.reg file on your desktop (or locate it with Windows Explorer and double click on it if not saved to the Desktop) and when it prompts to Add in to the registry, say yes.

    Also look for the below files and tell me if youi find them.
    C:/WINDOWS/RMAgentOutput.dll
    C:/WINDOWS/System32/a3wmme.u32
    C:/WINDOWS/System32/asccom2.dll
    C:/WINDOWS/System32/ascutil.dll
    C:/WINDOWS/System32/cloak2.exe
    C:/WINDOWS/System32/listen.exe
    C:/WINDOWS/System32/listen1.exe

    I would like to get more info on these by using a procedure like below on them:

    Locate the files using Windows Explorer and then right click on it and select Properties. Now see if there is a Version tab in the window. If so, select the Version tab and on the next window select each of the listed Item names (one at a time) to get more info about the file. The most important Item is the company name. If there is no Version tab, tell me that too.

    At any rate reboot after applying the registry patch and see if you now can boot into normal mode without selective startup.
     
  14. pseudosoldier

    pseudosoldier Private E-2

    C:/WINDOWS/RMAgentOutput.dll <-- no Version tab
    C:/WINDOWS/System32/a3wmme.u32 <-- no Version tab. Also found in \ASC\ASCOBJECT and \MACROMED\...
    C:/WINDOWS/System32/asccom2.dll <-- not present
    C:/WINDOWS/System32/ascutil.dll <-- not present
    C:/WINDOWS/System32/cloak2.exe <-- no Version tab. Also found in \ASC
    C:/WINDOWS/System32/listen.exe <-- no Version tab. Also found in \ASC
    C:/WINDOWS/System32/listen1.exe <-- no Version tab


    I applied the registry tab, and msconfig looks like it should allow me to start in Normal mode. Normal mode is selected, but /SAFEBOOT is not selected. However, I still wind up starting in Selective Startup. I'm going to try a few things, including going into Safe Mode to clean...
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Boot into safe mode and let's rename some of those file. I don't want to delete them since we do not know what they are for but them seem suspicious.

    What is the full path of \ASC do you mean c:\ASC

    Rename as below:

    C:\WINDOWS\RMAgentOutput.dll to RMAgentOutput.ddd
    C:-WINDOWS/System32/a3wmme.u32 to a3wmme.uuu
    C:/WINDOWS/System32/cloak2.exe to cloak2.xxx
    C:/WINDOWS/System32/listen.exe to listen.xxx
    C:/WINDOWS/System32/listen1.exe to listen1.xxx

    Then reboot and see if you have any problems or receive any error messages. Also get a new log from GetRunKey.Bat
     
  16. pseudosoldier

    pseudosoldier Private E-2

    I ran in safe mode. Did the cleaning... was mostly clean.

    Ccleaner - run
    MS Anti Malware - nothing found
    Ad-Aware - found cookies, removed
    Spybot - found three registration keys, removed
    MS Antispyware - nothing
    Rebooted into safe with networking.
    Bitdefender - nothing
    Panda Activescan - found c:\WINDOWS\help_ecc.dll - AdClicker, maually removed

    I still wind up booting into Selective Start, even though MSCONFIG lists me as Normal without Safe. I'm utterly confused about this... what it's showing me it will do and what it is doing are two different things.

    I'll try renaming those files tonight...
     

    Attached Files:

  17. pseudosoldier

    pseudosoldier Private E-2

    Full path of ASC is:
    C:\WINDOWS\system32\asc

    Since there's an ASC folder in a folder marked Academics, I think these might be from some software that came with the computer. I'll check that out, too.
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I did not need another HJT log. I wanted to see another GetRunKey.bat log to see if msconfig is still doing anything strange in the registry.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Incomplete info does not help me. I have the same question as last time.

    What is the full path of "ASC folder in a folder marked Academics" ? Do you mean in system32 or someplace else?
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds