Infected Files Regenerating Folders

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by barnstormer, Mar 26, 2016.

  1. barnstormer

    barnstormer Private E-2

    I realize this is an old thread, but I'm fighting the same battle with the exception of how easily the OP was able to remove it. It has even survived reimaging of the machine making me wonder if the BIOS has been infected.

    While the computer is idle, Avast will alert, "Threat detected," and two files will have been moved to the Virus Chest. Once will be a png, jpg, gif, or other graphic file and in my case will be named mqxrv[1].png, gif, jpg, bmp, etc. It will be in a randomly named folder in the following path:

    C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content IE5\ and then a folder with a name such as 7F55NDP8

    The second file will be named x, and Avast will have removed it from C:\Windows\system32

    I have run Malwarebytes, Kespersky Virus Removal Tool, Stinger, Hitman Pro Sidekick, Spybot, CCleaner, ATF Cleaner, Avast, Combo Fix, and a few others before finally reimaging the machine to factory ship state.

    It should be noted that Avast finds nothing when it scans, but every few hours will randomly report that a threat has been detected when these files appear and they're immediately moved to the Virus Chest.

    Avast reports it as Win32: Dropper-MCQ [Drp]

    The machine is a Lenovo T61p Thinkpad running XP Professional SP3.

    Any help would be greatly appreciated.
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    What thread is an old thread? This is a new thread you just started today as a new member!!

    Again I have to ask what thread you are referring to.

    I doubt it. I have not seen a true BIOS infection in close to 10 yrs.

    It just sounds to me like Avast is cleaning up the junk that is getting put on your PC during surfing sessions. However if you want to full check your PC for malware you need to follow the instructions in the below:

    READ & RUN ME FIRST Malware Removal Guide (incl. spyware, virus, trojan, hijacker)

    But it is very likely that nothing will be found since you just formatted Are certain that you did not reinstall the problem yourself from some infected back files or you did not keep surfing the same old questionable websites ( that is assuming you are taking risks with where you surf )?
     
  3. barnstormer

    barnstormer Private E-2

    Than you for the reply.

    I apologize. I posted in an old thread, but apparently that is frowned upon here. An admin must have split this from the original thread and didn't leave a URL for you to refer to. The original thread is here:

    http://forums.majorgeeks.com/index....les-and-system32-folders.211553/#post-1947409

    As for Avast, I just reimaged from the hidden partition yesterday. It was a clean install and I haven't moved any back up files yet, nor surfed anywhere short of downloading Mozilla and upgrading IE.

    Then today it started finding the same two files. Avast isn't doing a scan at the time. You'll just be sitting in the room and hear the audio say, "Threat detected." Then when I go over there it will have found the same two files and moved them to the virus chest. Then a couple of hours later, it'll happen again, and again, and again all day and all night. It'll find "x" in C:\Windows\System32, and it'll find mqxrv[1].gif, png, jpg, bmp, etc. in
    C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content IE5\ and then a folder with a name such as 7F55NDP8

    What I find most odd is nothing finds a problem during a scan.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It is most likely just junkware that is getting into the system folders and perhaps Avast really cannot cleanup the NetworkService ( and likely the LocalService ) folders automatically. Even disk cleaning tools do not cleanup these folders automatically in most cases. CCleaner has an Addon called Winapp2.ini that adds these to the Applications tab part of CCleaner to allow cleaning the junk in them. See: http://www.winapp2.com/howto.html
     
  5. barnstormer

    barnstormer Private E-2

    It would appear you're on the right track. I haven't done anything so far other than running Ccleaner from Step 5 in the above assigned instructions, and I think yesterday I ran ATF Cleaner since it had proved successful in the first thread on this malware. Today it doesn't appear there have been any more incidents. I suppose I have either discounted Ccleaner's abilities or greatly over estimated the other utilities I have used. I still find it very bizarre that whatever this is/was survived everything from Kaspersky, Stinger, Hitman, Malwarebytes to Combo Fix and was taken out by Ccleaner. The fact that it survived reimaging has me very baffled.

    Something seems to have been damaged though as I'm getting some lock ups, and svchost errors. If this thing is really gone I might should go ahead and reimage again before loading software just to be sure Windows isn't missing anything.

    I'll keep you posted.
     
  6. barnstormer

    barnstormer Private E-2

    Well it just happened again. "Threat detected," and the files were moved to the vault. I have added Winapp2.ini to Ccleaner. I added the ini file to Ccleaner and checked the boxes for the three NetworkService options; Cookies, History, & Temporary Internet Files.
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    And did you run the cleaner? And has it happened again since cleaning?
     
  8. barnstormer

    barnstormer Private E-2

    Yes, I have run the cleaner and the add- on ini to clean the NetworkServices directory, and yes it has happened again since running those.

    Thanks for the follow up.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you also clean the LocalServices folders?

    Okay the see my first response with a link to the READ & RUN ME if you wish to properly check your PC for malware. I expect that Avast is just finding general junk and that there is no real malware; however, the only real way to know is to run the complete process and attach the logs we ask for.
     
  10. barnstormer

    barnstormer Private E-2

    No, I only cleaned the NetworkServices Folder. Would you like for me to rerun it on LocalServices?

    All scans have been completed and logs are attached. tdsskiller found nothing.

    Perhaps, but something isn't right. After Avast finds the files either a lockup will occur or a svchost error and a lockout or sluggish issue.

    Sorry for the delay, but it's been a crazy week here.

    Thanks again.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes repeat again for both NetworkServices and LocalServices.

    I not really thinking this is a real problem, but let's also run a couple other tools.

    Please download the latest version of FRST the below link.

    Farbar Recovery Scan Tool and save it to your Desktop.

    Note: Make sure you download the proper version ( 32 bit or 64 bit ) for your PC. Only one will run, the correct one. So it you make a mistake and download the wrong one, go back and get the other.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

    Make sure that your antivirus is disabled. See the below link for help on disabling it.

    How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs
    • Please download ZOEK and save it to your desktop (preferred version is the *.exe one - upper left corner).
    http://hijackthis.nl/smeenk/

    • Attached to the bottom of this message you will find a file called zoekscript.txt
    • Download it too and save to your desktop - _it needs to be in the same location as the ZOEK tool
    • Drag zoekscript file and drop it onto ZOEK icon - this should launch the program:
    • The scan may take a while and may need a reboot.
    • Upon completion a file zoek-results should appear.
    • Attach it to your next reply.
     

    Attached Files:

  12. barnstormer

    barnstormer Private E-2

    Sorry for the delay in responding, but I've been buried. I have done some research, however, and am afraid this is more malicious than I thought. I found a few cases that were exactly on point with what I'm fighting and it seems that another reimage is the only way to go; especially since the file corruptions have made the system so unstable. I'm not sure how it survived the last reimage, but instead of reimaging from the hidden partition, I think I'll try making a set of recovery disks, deleting the partition, reformatting and reinstall.

    This first link is right on point. The second one is very, very close with a different variant I assume:

    http://www.bleepingcomputer.com/forums/t/340048/infected-with-wormconficker/

    http://www.bleepingcomputer.com/forums/t/304752/help-with-xexe/page-2
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I haven't seen any real cases of Confiker for a very long time. It's not impossible that this is Confiker but hard to tell from logs posted thus far. Your MGlogs.zip file from MGtools was very incomplete and if complete may have provided some important information. If you have not performed the reinstall yet I would like to see you run MGtools.exe again ( make sure you use Run As Administrator and that you let it run to completion ) and then attach a new MGlogs.zip file. Also the FRST log would have been real helpful. We have fixed many cases of Confiker in the past when it was prevalent.

    However ever if you have a Virut type infection then this is a clear case where a reinstall is best. The important thing with Virut infections is that you cannot keep any of your old files and you cannot reinstall/reuse any of them from backups unless you are 100% certain that the backups came from a time when you had not been infected. Reusing just one single file that is infected will spread this infection all over again. And also if you had network drives ( shared drives/PCs ) they could also be infected.
     
  14. barnstormer

    barnstormer Private E-2

    Sorry for the delay in replying. I missed this notification coming into my email box. I still haven't had time to reimage, but came back here to see what the infection was because of something that happened yesterday. While doing some network tests I realized my IP was blacklisted in CBL. When I went to investigate, this is what I found:


    IP Address xx.xx.xx.xx is listed in the CBL. It shows signs of being infected with a spam sending trojan, malicious link or some other form of botnet.


    It was last detected at 2016-05-17 12:00 GMT (+/- 30 minutes), approximately 6 hours ago.


    This IP is infected (or NATting for a computer that is infected) with the Conficker botnet.

    So it appears that is the likely culprit. My worry now is that computer hasn't been on the network since my last post, so if CBL is correct the infection must be elsewhere on this LAN as well, but I can't seem to find it. What tool is best?
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    A fully updated Windows PC really should not get a Confiker infection. Your PC is on Windows XP SP3, but I cannot tell if you had all patches installed. It is however an insecure and unsupported operating system. If you have more PCs like this on your network then they can also be infected and problematic.

    Please run the below anti-rootkit tool from Malwarebytes.
    • Download Malwarebytes Anti-Rootkit
    • If you happened to get a ZIP file version instead of an EXE file then unzip the contents to a folder in a convenient location.
    • Open the folder where you saved Malwarebytes Anti-Rootkit to. Now run mbar-1.07.0.1009.exe ( If running Vista, Win7 or Win 8, use right click and Select Run As Administrator )
      • Note: This filename will change as new versions are released, so this is just an example ).
    • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
    • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
    • Wait while the system shuts down and the cleanup process is performed.
    • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
    • If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
      • Internet access
      • Windows Update
      • Windows Firewall
    • If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
    • Verify that your system is now functioning normally.

    Please do the below so that we can boot to System Recovery Options to run a scan.

    For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.


    Plug the flashdrive into the infected PC.

    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)

    Now please run the below so we can attempt to get a complete log from MGtools.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7, Win8 or Win10, don't double click, use right click and select Run As Administrator).
    Then attach the below logs:
    • the Malwarebytes Anti-Rootkitlog
    • the FRST.txt log
    • C:\MGlogs.zip
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds