rootkit.zeroaccess is fustrating me - please help =(

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by realized, Feb 12, 2012.

  1. realized

    realized Private E-2

    have tried everything i could think of from kaspersky rescue disk to tdsskiller and everything inbetween..

    currently im on the computer in question (need to run combofix to get online), once i reboot, will loose internet till i run combofix again =(

    logs below...

    also, i have virus.win32.zacces.c (not sure if its the same thing)
    please help =(
     

    Attached Files:

  2. realized

    realized Private E-2

    More logs
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Why are you running your PC with no protection software?

    Did you put in the below very poor choice of name for a startup procedure?
    O4 - Startup: PRINTER.lnk = C:\map****er.bat



    Now download The Avenger by Swandog46, and save it to your Desktop.

    See the download links under this icon [​IMG]
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now please download Farbar Service Scanner and run it on the computer with the issue.
    • Put a check mark in each option box on the left side.
    • Click "Scan".
    • It will create a log (FSS.txt) in the same directory the tool is run.
    • Please attach this log to your next reply.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\avenger.txt
    • the FSS.txt log
    • C:\MGlogs.zip
     
  4. realized

    realized Private E-2

    new logs. thanks for all your help!
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please answer my questions from my previous message.

    Also copy the below file:
    C:\WINDOWS\system32\dllcache\netbt.sys

    To the below folder:
    C:\WINDOWS\system32\drivers

    Then reboot your PC. After reboot, make sure the C:\WINDOWS\system32\drivers\netbt.sys file still exists. Also tell me if you are still having any problems.
     
  6. realized

    realized Private E-2

    the bat file is legitimate, maps over a printer.

    copied netbt.sys over, on reboot file is still in c:\windows\system32\drivers
    still no access to internet, still have zeroacecss =(

     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I strongly suggest that you change the name to avoid having it deleted by scanning programs.

    But you missed my question about no protection.

    Let's get a new log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).



    Then attach the below logs:
    • C:\MGlogs.zip
     
  8. realized

    realized Private E-2

    New logs.

    this computer had officescan (i think ver 10?) before this, its since been removed

    screenshot: webroot's zeroaccess remover finds it.. before i posted on here this program along with others would "fix" the problems it finds, only to reappear on reboot.

    Also i maybe should note that the "infected" files would jump around after webroot's remover would "fix the problem" for example one min it was afd.sys , on reboot, it would be cdrom.sys, etc
     

    Attached Files:

    Last edited: Feb 12, 2012
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That looks incorrect since Farbar Service Scanner showed the afd.sys file to be valid but we will copy one from dllcache anyway.

    What I saw was that your netbt.sys file was missing. Now I see the registry entry for it is also missing.


    Let's use ComboFix to add back in your netbt service key
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it has expired or need to be updated to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up because you recieve the following error: Illegal operation attempted on a registry key that has been marked for deletion then you will need to reboot your computer which will normally fix this problem.

    Now rerun Farbar's Service Scanner tool to create a new FSS.tx log.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\ComboFix.txt
    • the new FSS.txt log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  10. realized

    realized Private E-2

    combofix started up, detected rootkit.zeroaccess, and something about hidden in the tcp stack, then it errored:

    rmbr.3xe has encountered a problem in modname ntdll.dll.

    then combofix said it needed to reboot and it might take some time.. its rebooting now and combofix is doing its thing.. stages..
     
  11. realized

    realized Private E-2

    still can't get online. when i goto command prompt and "ipconfig" i get an 'internal error request not supported"
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    1. Go to Start ==> Run (or Windows key+R)
      • Type the following in the run box and click OK: notepad c:\windows\inf\nettcpip.inf
        (note that there is space after notepad)
      • The above file will open in the notepad.
      • Under TCP/IP Primary Install section find the following: Characteristics = 0xA0
      • Edit 0xA0 and replace it with 0x80 (replace A with 8)
      • Under File menu click Save and close the notepad.
    2. Go to Start ==> Control Panel. Double-click Network Connections. Right-click Local Area Connection, and select Properties.
      • On the General tab, click Install a popup window opens.
      • Select Protocol from the list and then click Add.
      • A new window opens, click Have Disk....
      • In the browse... box type c:\windows\inf
      • Click OK.
      • Select Internet Protocol (TCP/IP), and then click OK.
      • On the Local Area Connection Properties screen select Internet Protocol (TCP/IP) and click Uninstall, and then click Yes.
      • Wait until it asks to restart, and then restart as requested. Continue with the below after restarting.
    3. Go to Start ==> Run (or Windows key+R)
      • Type the following in the run box and click OK: notepad c:\windows\inf\nettcpip.inf
        (note that there is space after notepad)
      • A file opens in the notepad. Under TCP/IP Primary Install section find the following: Characteristics = 0x80
      • Edit 0x80 and replace it with 0xA0 (replace 8 with A)
      • Under File menu click Save and close the notepad.
    4. Go to Start ==> Control Panel. Double-click Network Connections. Right-click Local Area Connection, and select Properties.
      • On the General tab, click Install
      • A popup window opens. Select Protocol.
      • A new popup window opens. Select Internet Protocol (TCP/IP), and then click OK.
      • Wait until it asks to restart, and then restart as requested. Continue with the below after restarting.
    5. After restart please run Farbar Service Scanner again and save the fss.txt log to attach below.
    6. Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

      Then attach the below logs:
      • the new fss.txt log from Farbar's Service Scanner
      • C:\MGlogs.zip
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Oh and one more question. Why does MBRcheck show the below for your MBR

    Code:
     
        232 GB  [URL="file://\\.\PhysicalDrive0"]\\.\PhysicalDrive0[/URL]   Windows 2008 MBR code detected
    
    rather than a Windows XP MBR
     
  14. realized

    realized Private E-2

    that i have no idea, this computer is a DELL, installed by them and came with windows XP SP3

    when the logs were being created, nslookup caused an error:

    the ordinal 1108 could not be located in the dynamic link library wsock32.dll

    right now im on the machine, its online.. though i dont have access to network resources (mapped folders etc) can't access network shares by \\network\name\path either

    update: tdsskiller finds win32.zaccess.c in afd.sys
     

    Attached Files:

    Last edited: Feb 12, 2012
  15. realized

    realized Private E-2

    I think i know what your next response is going to be (fdisk/mbr? or something like it?).. backing up all documents/important stuff on an external hd

    if the MBR is the problem that would explain why every program i run detects it and 'fixes' but on reboot it comes back?
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Nope! Because it does not appear to be infected. It is just not a Windows XP MBR which is probably due to some tool you ran on your own.

    You need to stop doing things on your own and only do what we ask you to do. When you posted your first logs, only a few files in your system32\drivers folder had been touched and changed to new dates and possibly this was due to the ZA infection. Now every single driver file in this folder as been modified to today's date. What are you doing when not here????? If all of these files wind up being infected now, you will have to reinstall from scratch to fix.

    No it just means what all malware removal experts know, and that is that NO scanner / tool and fully detect and fix Zero Access. They never have. It always required manual intervention. The best tool thus far has been ComboFix but even it is very incomplete and there is always residual damage ( like no internet access or more ) due to the infection even after it has been removed. Your damage seems to be significant. You have many required system services that are no longer running which is the reason you have network resource issues you mentioned. We will try to manual start a few down below.



    Now download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now open Repair_Windows.exe
    • Go to Start Repairs tab.
    • Choose "Custom Mode" and press "Start".
    • Create a System Restore point if prompted.
    • In the Custom Mode window, select the following repair options:
      • Repair Windows Firewall
      • Repair Internet Explorer
      • Repair Hosts File
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Windows Updates
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • If asked to reboot the computer for the changes to take affect, make sure other tasks in the program are not still running before accepting to restart.
    Reboot after running Windows Repair.

    Now please download MiniToolBox and save it to your desktop and run it by right clicking and selecting Run As Administrator.


    Checkmark following checkboxes:
    • Flush DNS
    • Report IE Proxy Settings
    • Reset IE Proxy Settings
    • Report FF Proxy Settings
    • Reset FF Proxy Settings
    • List IP configuration
    • List Winsock Entries
    • List Devices -> All
    • List last 10 Event Viewer log
    Press Go and attach the result (Result.txt) that pops up. A copy of Result.txt will be saved in the same directory the tool is run from.

    Now, please download SystemLook from one of the links below and save it to your Desktop.
    Download Mirror #1

    Download Mirror #2
    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :filefind
      afd.sys
      cdrom.sys
      dhcp.sys
      ipsec.sys
      netbt.sys
      tcpip.sys
      
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. You can just close this notepad window since the log is already saved on your Desktop. Be patient! It may look like it is not doing anything, but it takes awhile for this to scan thru your whole system look for matches.
    • Please attach the SystemLook.txt log found on your Desktop to next reply.

    Now please click Start, Run and type services.msc into the Run box and click OK. This will open up the Services form. Scroll down to the Application Layer Gateway Service service and double click on it. If the Service status: shows Stopped or Disabled, click the Start button. Does it Start? Make sure that the Startup type is set to Manual.

    Now locate the IPSEC Services service and Start it and set the Startup type to Automatic, Did this Start?

    Now locate the Windows Firewall/Internet Connection Sharing (ICS) service and Start it and set the Startup type to automatic, Did this Start?

    Now locate the Workstation service and Start it and set the Startup type to Automatic, Did this Start?

    Now locate the Computer Browser service and Start it and set the Startup type to Automatic, Did this Start?

    Now locate the Security Center service and Start it and set the Startup type to Automatic, Did this Start?

    Now close the above services forms and reboot your PC. After reboot, get a new log from MGtools and attach it here along with your answers to what happened while trying to start all the above services. Also remember to attach the Results.txt log from MiniRegTool
     
  17. realized

    realized Private E-2

    app layer gateway = started
    ipsec started

    windows firewall didn't start: error 10047: an address incompatible with the requested protocol was used

    workstation didn't start: error code 2250 "windows could not start the workstation on local computer"

    computer browser didnt start error 1068 failed dependency

    i dont have a security center service?


    during the new log creation, got the "ordinal 1108 could not be located in the dll wsock32.dll" message again (i think while it was doing a nslookup or something?
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The services you said started appear to have stopped again based on your logs. Seem you have some major issues within Windows itself.


    Click Start, Run, and enter sfc /scannow and click OK. There is a space after the sfc. This runs System File Checker which looks for missing or corrupted system files and attempts to replace/repair them from files on your hard disk or from the CD if necessary. So it will ask for the Windows CD if it needs it.



    Now download SubInACL.msi from Microsoft.
    • Now double click on SubInACL.msi to run the installer. Accept any prompts you get about installing this.
    • Now download the below file and save it to your Desktop:
    • Now double click on resetperm.cmd to run this script. Be patient as this may take awhile to run. Also it is imperative that you Run As Administrator. This is not the same thing as your user account having administrator priviledges.
      [*]Once it finishes, reboot your PC.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    C:\MGlogs.zip
     
  19. realized

    realized Private E-2

    ran all as requested, rebooted..

    no cdrom still (not sure if i mentioned this earlier) - though this is trivial compared to other stuff going on

    but this time, no internet.. "limited no no connectivity" - tried to "repair" and said unable to obtain ip address.

    logs below
     

    Attached Files:

  20. realized

    realized Private E-2

    Oh, also sfc /scannow took a while to scan (5-10min?), it was doing something (just progress bar), but then went away.. didn't ask me for anything didn't prompt anything. Im assuming if it needed files it would have grabbed it from the \i386 but not sure if it really did anything.
     
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    When you ran resetperm.cmd, approximately how long did it seem to run for? Was it very fast or did it run for 10 to 20 minutes?

    Earlier you questioned about the MBR and backing important data up. Have you backed up your data? We are starting to see more strange MBRs like yours that are for a different version of Windows and we are starting to think a new form or infection is around. Hence I will be asking you to fix the MBR soon. Do you have your Windows XP boot CD?
     
  22. realized

    realized Private E-2

    the .cmd file went through a lot of stuff, it almost seemed like it ran through 2-3 sets of tests. the first set i noticed 1 failed, the second like 2? and the third like 1.. but it seemed to do some few hundred thousand things and only a few errored.

    i backed up anything needing backup..

    i dont have the disk but we subscribe to technet, can i use windows xp from there?
     
  23. realized

    realized Private E-2

    sorry, to answer your question.. it ran for sure under 10 minutes,.. maybe 5-7 minutes or so
     
    Last edited: Feb 13, 2012
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just use the below procedure to make a special bootable CD and see if you can follow the instructions to get to the Recovery Console command prompt.

    Using ARCDC to get the Recovery Console Command Prompt

    If you can get to the Recovery Console, type in the below commands. The second one will reboot the PC, just remove the CD and boot normally.

    fixmbr
    exit

    After reboot, run a new MBRcheck scan and attach a new log. Let me know if there is any change in system behavior.
     
  25. realized

    realized Private E-2

    should I make the disk on the infected machine or a clean one? if a clean one, can it be xp sp2?
     
  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It really should not matter which PC you make it on.
     
  27. realized

    realized Private E-2

    Tried with ARCDC (created on another computer) and a windows XP SP3 iso (technet) both errored

    stop 0x0000007b

    combofix installed recovery console and it gave a unable to read error press control+alt+del to reboot

    back in windows now, still no internet (and im sure virus is still there though haven't ran anything since my last instructions)

    update: think i found the problem, the bios was setup from factory as "raid on" though i think it only has one disk in there.. looking into it...

    update: found this ->
    http://support.microsoft.com/kb/324103

    Boot-Sector Viruses
    You may receive a "Stop 0x0000007B" error message if your computer is infected with a boot-sector virus. If the problem is intermittent and you can start Windows, check your computer for viruses. If you find a virus, also check any floppy disks for viruses before you use them again.

    For a list of antivirus software manufacturers, click the following article number to see the article in the Microsoft Knowledge Base:
    49500 List of Antivirus Software Vendors
    Note You may have to use more than one brand of virus-detection software to detect and remove various viruses.
     
    Last edited: Feb 14, 2012
  28. realized

    realized Private E-2

    contacted dell they advised me to change the bios setting to legacy, make changes, and change back...

    did so without problems..

    rebooted, and mbr check looks better?

    still zeroaccess is detected by combobox, internet is back up but services still dead (workstation etc)


    i also re-ran the .cmd file - ran for like 12 minutes..

    services still dont start up.

    The Workstation service terminated with service-specific error 2250 (0x8CA).

    The Network Location Awareness (NLA) service terminated with the following error:
    The specified procedure could not be found.

    and a few other services which cannot start because workstation services isn't loaded


    new logs below

    according to tdskiller it finds a file, fixes, on reboot, finds another.
     

    Attached Files:

  29. realized

    realized Private E-2

    chaslang,

    I'd like to thank you for your time. I think at this point its better for me to replace the HD and start over.
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Yes you had gotten the MBR to be correct.
    Replacing the harddisk is probably not needed, just a reinstall would likely be okay. There just seemed to be too much residual damage to Windows itself.

    Based on your logs, you may have a Factory Image stored on your hard disk which you may be able to use to restore the system to factory ship state...... as long as the malware did not damage this factory image or the ability to use it.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds