Persistant Trojan - Any help appreciated!

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by moonpenny, Sep 28, 2008.

  1. moonpenny

    moonpenny Private E-2

    I've been trying to get a particularly persistant trijan off my PC for weeks. Symantec AV classifies it as a "Trojan.Dropper", and shows up in:

    C:\Documents and Settings\<user1>\Local Settings\Temporary Internet Files\Content.IE5\P9E7SDM3\update[1].gif

    C:\DOCUME~1\<user>\LOCALS~1\Temp\QQ_Update.cab

    C:\WINDOWS\TEMP\QQ_Update.cab

    Where <user1> is either a user on the PC, or "Network Service"
    and <user> is a user on the PC.

    I've tried HikackThis, Trend Micro online scanner, Symantec (in safe mode), regfix, and a few others.... no luck. In fact, downloading one of the tools (Spyware Doctor) actually seemed to introduce the QQ_UPDate.cab problem!




    Any ideas?

    Thanks!!!

    Dave
     
    Last edited by a moderator: Sep 30, 2008
  2. moonpenny

    moonpenny Private E-2

    My profuse apologies for being a N00b on this forum and not reading the readme first. I throw myself on the mercy of the forum...

    And I followed the procedures and still have the problem. I am attaching the requested log files here....

    Ooops..

    Dave
     

    Attached Files:

  3. moonpenny

    moonpenny Private E-2

    Here is the final zip file from MGTools...
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    The scans took care of most of it, just a few things to clean up:

    Use windows explorer to find and delete:
    C:\WINDOWS\system32\DRIVERS\eyr96uotc0.sys

    Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    As a precaution I would suggest that you run both the SAS and MWB's scans on each user profile and let me know if they find additional problems ( attach those and name them so we know which profile it is).
     
  5. moonpenny

    moonpenny Private E-2

    I could not find the .sys file in the named location. I was able to run the regsitry script, and did get a success message. I'll reboot and see if I find anything in the other profiles...hopefully this seals it! Thanks so much for your help!!

    Dave
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let me know...in the meantime:

    If you are not having any other malware problems, it is time to do our final steps:
     
  7. moonpenny

    moonpenny Private E-2

    Well,

    Bad news. We continue to get the same exact messages from Symantec. Any other ideas? Should I run the entire set of initial procedures again? I did run SAS and MWB on all users - it only found one instance of wmsetup.exe on one of the users - no others. Even after cleanup, I still get the initial error messages...
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Ok...Now go to Bitscan link: agree to the license and then select Scan. DO NOT CHANGE THE OPTIONS TO SHOW ALL FILES SCANNED. That will make your logs huge and we don't need to see clean files. Once Bitdefender completes the scan:

    Click-on the Detected Problems tab. Then select Click here to export the scan report

    When the window comes up to save the report, change the Save as type: box to Text (Tab Delimited) (*.txt) and then in the File name box enter change to bdscan then click save. This will save a file named bdscan.txt in whatever folder you are currently in when you save the file (take notice of where you are at so you can find it later). This bdcan.txt file will actually contain HTML code that we can easily view later while reviewing your log. All we have to do is rename the file to bdscan.html.
     
  9. moonpenny

    moonpenny Private E-2

    Here are the results of the scan. It appears that something keep putting the qq_update and wmsetup.dll files back into these locations. I also noticed, that if I don't run IE, it doesn't occur. Once I open IE (even just to Google), then they start showing up. Could just be a coincidence, but maybe not?
     

    Attached Files:

  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Well, now rude...:)

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    download The Avenger by Swandog469, and save it to your Desktop.

    * Extract avenger.exe from the Zip file and save it to your desktop
    * Run avenger.exe by double-clicking on it.
    * Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the "Input script here:"
    part of the window:

    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Please attach that log.
     
  11. moonpenny

    moonpenny Private E-2

    I ran the attached script - and took the liberty of adding additional delete lines for the other user accounts... Attached are the results..

    I've checked to see if wmsetup.dll is loaded with the Windows Process Explorer - it's clean so far... I'll keep my fingers crossed and see if it reappears!

    Thanks!

    Dave
     

    Attached Files:

  12. moonpenny

    moonpenny Private E-2

    Well, no such luck. I still get the Symantec "Trojan.Dropper" alerts... I noticed that the first alerts are on a profile called "NetworkService"...then they seem to spread to logged in users...

    There appears to some some "NetworkService" profile that I can't clean out... (I tried using "C:\Documents and Settings\NetworkService\Local Settings\temp\wmsetup.dll in the Avenger script - but the file wasn't found). I can't see the "NetworkService" folder at all, even with all of the "show file" options enabled in "folder options"...

    When I use the windows process explorer tool, SVCHOST has an open handle to wmsetup.dll (in c:\windows\temp). See the attached screen shot for the services that are running in that process... Shortly after that shows up, the alerts start... Maybe one of them is the culprit?
     

    Attached Files:

    Last edited: Oct 2, 2008
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Uninstall the below software:
    Java(TM) SE Runtime Environment 6
    Viewpoint Manager (Remove Only) <-- should have been uninstalled in step 1 of the READ ME


    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop (yes overwrite the previous file of the same name if it still exists). Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.

    Now run this Running GMER to detect rootkits I will ask for the log below.
    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\ComboFix.txt
    • Gmer log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  14. moonpenny

    moonpenny Private E-2

    OK, I've done all the steps below. Still getting the issue. The wmsetup.dll re-appears consistently...

    here are the logs:
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Now download HostsXpert and then follow the below steps.
    • Unzip HostsXpert.zip
    • It will create a folder named HostsXpert in whatever folder you extract it to.
    • Run HostsXpert.exe by double clicking on it.
    • Click the Make Writeable? button. (if you only see a Make Read-Only selection, it is already writeable so skip this button).
    • Click Restore Microsoft's Hosts File and then click OK.
    • Click the X to exit the program
    Now we are going to run a couple new scans with Malwarebytes (aka MBAM)
    1. Make sure your PC is in normal mode.
    2. Run MBAM and make sure you update it first
    3. Select Quick Scan
    4. When it finishes the scan make sure you select everything it finds and have it remove the selected items.
    5. If MBAM says anything about needing to reboot, make sure that you allow it to reboot your PC immediately. Your computer must get to the Windows is shutting down screen.
    6. After reboot, attach the above scan results.
    7. Now can your PC again with MBAM and attach this log too.
    Now go here and download SysClean:

    http://www.trendmicro.com/download/dcs.asp

    You will need to download two additional files, one for viruses and the other for spyware. Instructions for which ones to download are found here:

    http://www.trendmicro.com/ftp/products/tsc/readme.txt

    After running SysClean, attch the log from it.



    Now please look at the ComboFIx log you attach and see if you can explain why all of those TCP ports have been opened up. See the below registry key with the list of ports under it:

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

    Did you open up all of this ports to support your game playing?
     
  16. moonpenny

    moonpenny Private E-2

    OK - Here are the logs from the latest round of scans... Not sure why all those ports are open - I did not explicitly open them - There are some internet-based games on the system, but I doubt there are that many! Is this something to worry about, or more of a nuisance?

    Thanks!

    Dave
     

    Attached Files:

  17. moonpenny

    moonpenny Private E-2

    OK - some more data... After following the last set of procedures, everything was fine...for a few hours. I went to post the logs, and the custom control used by this forum wouldn't work. I'd get a "no such interface supported" error. Got the same answer on another page that uses (what I guess is) an ActiveX control...

    Based on a MS support artice (http://support.microsoft.com/kb/281679/EN-US/ I re-registered Actxprxy.dll and Shdocvw.dll. Poof - the controls now work, and within a few minutes, the infestation returned.

    So, it defintely appears to be IE related (or at least IE is activating it)... I'm using IE6, patched to current level...

    Any other thoughts or ideas? Any and all help greatly appreciated!!

    Thanks,

    Dave
     
    Last edited: Oct 4, 2008
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes because your copy actxprxy.dll (and maybe the other file) are infected and need to be replaced by valid copies.

    You can see in the below thread where actxprxy.dll needed to be replace by uninfected copies to resolve problems.

    http://forums.majorgeeks.com/showthread.php?t=166170&highlight=actxprxy.dll

    You will need to get an uninfected copy of the file off of your CD to fix this. You would have to run the same fixes as previously down in this thread to remove all the problems and then you would have to manually replace the actxprxy.dll file with the clean copy.
     
  19. moonpenny

    moonpenny Private E-2

    Replacing actxprxy.dll finally did it! Thanks to all for your help!!!! I will follow the final cleanup procedures below...
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Just to make sure we are referring to the samething, I will post them.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommed you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
      • Delete the C:\combofix folder from combofix (if it exists)
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds