Possible malware/rootkit; also possible fp's from cleanup scans

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by CharlesG, Jul 26, 2008.

  1. CharlesG

    CharlesG Private E-2

    Hello,

    I hope you can help me with a possible malware/rootkit infection. Also, when running your XP cleaning programs, two infections were reported that I believe are false positives, and I would like to report them to the appropriate vendors. I submitted them to VirusTotal.com and both scored 0/35.

    The computer is a Thinkpad T60p with XP SP2. In early June (I think June 2), Comodo Firewall reported dangerous behavior from a new program. I shut the program down, but I believe it may have partially (or completely) planted an infection before I did. However, I have not noticed any obvious malware-induced behavior, such as browser hijacking or loss of network connectivity.

    I've run the MG cleanup procedure for XP and attached two zip files with all the logs. I also ran Gmer and included its log as well.

    Thanks for your help,

    Charles
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Which two? I only saw one false positive from Malwarebytes which was the below:

    I do not see any obvious infections on your system. I do question what the below two files are:
    Code:
    "C:\WINDOWS\"
    zork.dll      Jul  7 2008      300544  "zork.dll"
     
    C:\Documents and Settings\Linda\Local Settings\temp\
    zsrch.$$$     Jul 25 2008         148  "zsrch.$$$"
    
    The zsrch.$$$ file should just be deleted since it is in a temp folder anyway. Do you know what the zork.dll file is from?
     
  3. CharlesG

    CharlesG Private E-2

    Thanks. It's an awesome site! I really appreciate your clear instructions for cleaning my machine.

    ComboFix quarantined a weirdly-named file, but VirusTotal gave it 0/35. The CF log said:

    Code:
    (((((((((((((((((((((((((((((((((((((((   Other Deletions   )
    
    C:\WINDOWS\system32\fddeabd0_r.dll
    No, and I can't find it in the registry (except for an MRU entry, which I deleted). VirusTotal gave it 4/35. I've attached the report and would appreciate your advice.

    Also, is there a way to eliminate the kernel code references to ComboFix that GMER found (after I did the ComboFix uninstall):

    Code:
    ---- Kernel code sections - GMER 1.0.14 ----
    
    ?    Combo-Fix.sys The system cannot find the file specified. !
    ?    C:\CFcf89\catchme.sys  The system cannot find the path specified. !
    ?    C:\WINDOWS\system32\Drivers\PROCEXP90.SYS     The system cannot find the file specified. ! 
    
    Thanks for your help!
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes but VirusTotal is far from perfect (they even say so on there web page) as are all scanners. Files with names like the above are most likely to be non-valid and unnecessary.

    They don't need to appear in your registry and again VirusTotal is not necessarily correct. Right click on zork.dll and select Properties and then click the Version tab (if there is one) and check who it belongs to.

    You can just delete the Temp file as it is not needed if it is in a Temp folder.

    How did you perform the Combo-Fix uninstall? These should be gone if uninstalled and they are not problems anyway.
     
  5. CharlesG

    CharlesG Private E-2

    The version number is 1.0.14.14536 and the language is Polish ... just like Gmer.:) (Although it isn't listed in Gmer's uninstall script -- gmer_uninstall.cmd -- and it is dated one day after the Gmer files.)

    I did. I also examined its contents and it is clear it was created by ZTree, my indispensable file manager (http://www.ztree.com). <testimonial-aside>I've used it for about 10 years and without it I feel like I'm flying blind. I was surprised not to find it in the MG software library.</testimonial-aside>

    I used the /u parameter (after first making a copy of the quarantine folder and log).
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I'll see what I can come up with to remove the drivers that were left behind by ComboFix.

    Put a copy of this DLL into a ZIP file and attach it here.

    Is there any chance that it is related to ZTree?

    What about a game named Zork?
     
  7. CharlesG

    CharlesG Private E-2

    Thanks. I'd like to avoid fp's in the future, and I have no idea where the leftover "kernel" references to the drivers are located, or how to delete them. The drivers themselves were deleted in the uninstall.
    Done.
    No. ZTree keeps everything in its own folder ... and the only DLLs it uses are unrar and unzip32.
    I haven't played it for years (decades?). It's never been installed on this machine.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No real conclusive info on the zork.dll file. I suggest that you rename it to zork.ddd and see how your PC runs without over some period of time. If no problems occur and nothing complains about the file being missing, I would then just delete it.

    It is not really pointing out false positives or malware. It is just saying drivers being referenced do not exist. Let's try the below.

    Copy the bold text below to notepad. Save it as fixCF.reg to your desktop. Be sure the "Save as" type is set to "all files"

    Now to add the above patch to the registry, do the below.


    • Please go to this link: http://live.sysinternals.com/
    • find the psexec.exe file listed in the list and click on it and download and save it to your Desktop. Doing this properly is critical for other steps below.
    • Now click Start, Run, and enter cmd and click OK. This will open a command prompt window with a prompt that shows the current folder you are in.
    • For you the prompt should show C:\Documents and Settings\Linda>
    • Now type cd Desktop and hit the enter key. There is a space after the cd. If you do this properly, your prompt will change to C:\Documents and Settings\Linda\Desktop>
    • Type the below bold text and hit the enter key. This will open the Window Registry Editor. You will have to agree to the SysInternals License Agreement first that pops up.
      • psexec -s -i regedit
    • In the Registry Editor click File, Import and then navigate to the fixCF.reg file on your Desktop and double click on it to import it into your registry. If it works properly you should get a success message.
    • If you get a success message continue on with the below, otherwise stop and explain to me any problems you had.
    Do you still have any problems?
     
  9. CharlesG

    CharlesG Private E-2

    I'll do that. I've also sent zork.dll in an email to Gmer, asking if it is his. I'll post his reply here if he answers.
    Before trying the registry fix, I rebooted a few times, then ran Gmer again. This time the offending messages did not occur (with or without zork.dll;)). I therefore searched the registry for catchme and PROCEXP90 and found the following:
    Code:
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_CATCHME
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_CATCHME
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PROCEXP90\0000, Service, PROCEXP90
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PROCEXP90\0000, DeviceDesc, PROCEXP90
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_PROCEXP90\0000, Service, PROCEXP90
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_PROCEXP90\0000, DeviceDesc, PROCEXP90
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PROCEXP90\0000, Service, PROCEXP90
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PROCEXP90\0000, DeviceDesc, PROCEXP90
    
    There was nothing more in your posting, so I couldn't "continue on with the below". Is there something more I should do? Should I apply your registry fix even though the problem appears to have been solved?
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It's up to you whether you want to remove the drivers or not. They are not problems but you don't need them. If you run ComboFix again, both the CATCHME & PROCEXP90 entries will be added to the registry again. If run GMER it will add the CATCHME entries.
     
  11. CharlesG

    CharlesG Private E-2

    The drivers and the references to them both seem to be gone now, so all is well, for which I thank you.:-D As a last check, I ran the new 3.8 Rootkit Unhooker, and the only thing it found that I don't understand is this:
    Code:
    Rootkit Unhooker kernel version: 3.8.340.550
    ==============================================
    >Hooks
    ntkrnlpa.exe+0x0002CB40, Type: Inline - RelativeJump at address 0x80503B40 hook handler located in [ntkrnlpa.exe]
    ntkrnlpa.exe+0x0006DFFE, Type: Inline - RelativeJump at address 0x80544FFE hook handler located in [ntkrnlpa.exe]
    
    This didn't show up on any of the other logs. Is it a problem?
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It's not a problem.


    Now we need to cleanup some items from running ComboFix.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.

    If you are not having any other malware problems, it is time to do our final steps:
    1. You can uninstall SUPERAntiSpyware now.
    2. We recommed you keep Malwarebytes Anti-Malware as a scanner. It uses no resources except a little disk space until you run a scan.
    3. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop & renamed it like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combo-fix" /u
        • Notes: The space between the combo-fix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
      • Delete the C:\combo-fix folder from combofix.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  13. CharlesG

    CharlesG Private E-2

    The registry cleanup worked fine. The keys (if they ever existed) are gone and the values are gone as well.:)

    I did have some questions about the prevention recommendations with regard to my setup and habits. Here is the security strategy I came away with; I'd appreciate your comments:

    1. Firewalls:

    Router with SPI and NAT. Wireless restricted to specific MAC addresses.

    Comodo Personal Firewall

    2. Real-time Protection:

    Comodo Defense+ HIPS.
    Avira Antivir Personal with Guard enabled.

    3. Scheduled nightly scans:

    Avira Antivir
    SpybotSD

    4. Occasional rootkit scans:

    Gmer
    Rootkit Unhooker

    5. Occasional anti-malware scans:

    Super AntiSpyware
    Dr.Web Cureit
    MalwareBytes

    6. System Restore

    Not active. Instead there is a scheduled nightly backup of all disks using Image for Windows (which allows individual files to be restored, as well as full partitions). I keep two to four weeks of backups on a NAS. Also, I save the registry with ERUNT before program installs.

    7. Browsing

    Internet Explorer is used only for Windows Update, and for rarely used things like online virus scanners that require ActiveX. Nevertheless, I immunized it with Spybot.

    Firefox 3 with phishing and attack site blacklists enabled. Also NoScript and AdBlockPlus. In addition to ABPs usual blocklist, it also blocks all sites on the MVPS list of 40K malware sites.

    Firefox asks permission before allowing any cookies. I allow them only for the session, unless they are from trusted sites and have long-term value (such as to keep me logged in, or remember preferences).

    I didn't install SpywareBlaster, or let Spybot immunize Firefox or create a Hosts file, because I believe they would just duplicate the above protections.

    Did I get any of this wrong? Is there anything else I should -- or shouldn't -- be doing?
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Running an antivirus and Spybot scan each night may be overkill. Do you leave your PC running all the time to allow this to be done when sleeping? Do no run both scans at the same time to avoid potential conflicts.

    Do you know how to read the logs from the rootkit scanners? If not, what are you going to do with them?


    This does use lots of bandwidth and has an impact on performance. Also I'm not sure it blocks the sites. It may only block iframes and flash objects from those sites if you go to them. You may still need the hosts file protection from Spybot or similar. See the below page and also tead the reply to user comment number 6.

    http://adblockplus.org/blog/blocking-malicious-sites-with-adblock-plus
     
  15. CharlesG

    CharlesG Private E-2

    Yes, they run at night and at different times. The image backup also runs at night, and at a different time.
    I can read them a bit, enough to ignore hooks caused by Comodo or Antivir or ATI. Also, I can compare logs to see if anything has changed. If there are hidden registry entries or files, I can research them to see if they are harmful. If I ever do get hit with something, an expert (from Major Geeks? :major) might be able to tell from the logs when it happened, and I might have a backup image from before that date to use if the system can't be cleaned.

    But I would like to learn how to read them. Can you point me to a source?
    Actually, I had read that article and comments beforehand. I've noticed the 4-second delay he mentions in loading Firefox, but (as he said) there is no perceptible delay when browsing. I have a fast cable connection so the bandwidth for maintaining the list isn't really an issue for me. (Doesn't it use the same bandwidth for ABP as it would if I used the same MVPS list as a host file?)

    I realize that ABP doesn't block access to the sites, but Firefox 3 has a new built-in service that does that job (on the Security tab). It uses a Google service and the StopBadware.org database. I prefer it to a hosts file because it is restricted to genuine attack sites and phishing sites, and it allows me to override a block if I think their database is wrong.

    Please know that I took your comments very seriously, and I researched, downloaded, and examined the content of every hosts file mentioned in the Wikipedia hosts article. With a single exception (Airelle), they all mix genuine threats with ad servers, porn, gambling, and whatever else offends their authors, and lack any method for automatically selecting just the categories one might need. And being hosts files, if you disagree with a block you can't just override it (which is why I prefer FF for access blocking and NoScript and ABP for object blocking).

    While doing the hosts research, I found McAfee SiteAdvisor, and I was impressed with its disciplined methodology for identifying dangerous sites. So I installed the SiteAdvisor Firefox extension.

    I also installed SpywareBlaster's IE protections, in case I ever use IE again. ;)
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There are no real complete tutorials. You can access GMER site ( www.gmer.net ) when they come back up (they are currently down).

    No. The filters are always downloaded from ABP. The hosts file is already on your PC once you put it there.

    Still wastes more bandwidth, time, and resources than a hosts file.

    A simplier solution that I prefer anyway is not to use a hosts file as I find it unnecessary in most cases and it can slow browsing down when the host gets very large. I don't like the work around of modifying DNS setup. ( You can read about this here: http://www.bleepingcomputer.com/tutorials/tutorial51.html ) But as I said I prefer a default hosts file on my PCs, and I just use Spybot to add a load of things to the RZ and then I also use Spyware Blaster. In addition to these I have my firewall, antivirus, and realtime antispyware blocking.
     
  17. CharlesG

    CharlesG Private E-2

    Thanks. I read it and it helped. Now where can I learn how to tell (as you did a few posts ago) whether an inline jump is ok or whether it indicates a possible rootkit?
    You can download the ABP filters just once, same as a hosts file.
    Wouldn't that depend on how often the hosts file is updated? If you choose automatic updating of ABP filter subscriptions, updates are only downloaded when the filter set changes. To get equivalent protection from a hosts file, you'd have to download hosts file updates when they occur.
    I've taken your advice on all of those, including Spyware Blaster, for all of which I thank you. The only difference is that since FF is my only browser, and since I have no practical bandwidth limitations, I've also opted to use automatically updated FF and ABP blocklists.
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Then you should be good to go. Obviously you will still need IE on occasions where certain websites (including Microsoft) require it, which is why proper protection for IE is still important. Also some software may default to using IE for background or forground updates. Thus your still need to worry about proper protection for IE.
     
  19. CharlesG

    CharlesG Private E-2

    I understand. Like you, I'm using Spybot and SpywareBlaster for IE protection.

    Charles, thanks so much for your advice and assistance. It was a pleasure to work with a professional of your calibre.
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. And thanks! ;)

    Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds