Malware cleaning performed, still have Trojan-Spy.HTML.Fraud.gen

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by ajf10, Sep 18, 2008.

  1. ajf10

    ajf10 Private E-2

    Windows XP SP3 NOD32 AV

    I picked up some malware from the Catalina Yachts website, of all places, which apparently had been compromised, and caused something to auto load onto my machine. After my internet explorer homepage was hijacked to a Chinese Google lookalike site, a bunch of malware programs loaded into memory, and there were multiple malware items listed in the msconfig startup menu.

    I cleaned with NOD 32 and then ran Kaspersky online scanner, which identifed other items. I inspected and removed or renamed these items. Then I found the excellent Majorgeeks malware removal sticky READ and RUN ME FIRST, and followed all of the steps in it.

    All seems well, except that when I run Kaspersky online scanner, it tells me:

    File name / Threat name / Threats count
    C:\Documents and Settings\Johnsmith\Local Settings\Application Data\Microsoft\Outlook\outlook.old Suspicious: Trojan-Spy.HTML.Fraud.gen 2

    I have read some threads saying that this might just mean there are some phishing emails in my outlook inbox. The outlook.old file was originally named Personal Folders.pst, but I renamed it to .old after Kaspersky detected it. The problem is that this file contains a bunch of emails which are important, and I do not want to delete it. I request help on what to do now.

    I did not post all of my cleaning logs at this point because I am not sure if it is necessary or relevant, but I am able to do so.

    Thank you.
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Malware detected in email databases has to be cleaned up by you. You have a few choices:
    1. delete the whole file which is not an option you normally want to use
    2. load the email folder that contains the infection and delete ALL unnecessary emails (hoping to remove the problem email) and then use the Mailbox Cleanup option to delete all old emails. Then compact the Outlook database to permanently remove data. See http://support.microsoft.com/kb/196990 If you do not cleanup and compact the databases, the deleted emails may still be leaving hidden information in the database that you just cannot see but a scanner may still pickup on it.
    3. create a new folder and move only emails you really need into the new folder and then delete the infected folder.
     
  3. ajf10

    ajf10 Private E-2

    Thank you for your reply. I was able to remove some messages and then found that the Kaspersky scan didn't flag it as suspicious.

    However, I have another problem. When NOD32 loads at system startup, the AMON module detects malware, which it quarantines. This happens at each startup.

    C:\WINDOWS\TEMP\Pandrv.sys a variant of Win32/PSW.OnLineGames.WBE trojan quarantined - deleted NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: c:\windows\system32\rundll32.exe. The file was moved to quarantine. You may close this window.

    What should I do now?
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That file is a sign of a possible rootkit infection.

    Please follow the instructions in the below link and attach the requested logs when you finish these instructions.


    READ & RUN ME FIRST. Malware Removal Guide
    • If something does not run, write down the info to explain to us later but keep on going.
    • Do not assume that because one step does not work that they all will not.
    Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode. You can run steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools on another PC and burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
     
  5. ajf10

    ajf10 Private E-2

    I did run the READ and RUN FIRST steps already. Logs are attached:
     

    Attached Files:

  6. ajf10

    ajf10 Private E-2

    And the last log:
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What are all the below files for?
    Code:
    2007-10-27 21:44 32,768 ----a-w C:\Documents and Settings\amory\WebVpnRegKey6-emr-onsmri-com.dll
    2007-09-19 00:26 49,152 -c--a-w C:\Documents and Settings\amory\SRProxy.dll
    2007-08-27 13:49 49,152 -c--a-w C:\Documents and Settings\Annette1\SRProxy.dll
    2007-05-16 23:06 32,768 -c--a-w C:\Documents and Settings\amory\WebVpnRegKey6-209-51-234-117.dll
    2007-02-11 22:32 2,767,756 -c--a-w C:\Documents and Settings\amory\neoteris_read_6183504.reg
    2007-01-15 04:03 2,767,756 -c--a-w C:\Documents and Settings\amory\neoteris_read_20237898.reg
    2007-01-02 12:02 2,766,758 -c--a-w C:\Documents and Settings\amory\neoteris_read_31952022.reg
    2006-12-21 13:17 2,766,710 -c--a-w C:\Documents and Settings\amory\neoteris_read_24257622.reg
    2006-12-21 12:29 2,766,710 -c--a-w C:\Documents and Settings\amory\neoteris_read_8012937.reg
    2006-12-21 02:42 2,766,710 -c--a-w C:\Documents and Settings\amory\neoteris_read_13948523.reg
    2006-11-30 01:16 2,762,980 -c--a-w C:\Documents and Settings\amory\neoteris_read_810652.reg
    2006-10-30 03:31 2,758,972 -c--a-w C:\Documents and Settings\amory\neoteris_read_31556811.reg
    2006-10-09 10:55 2,753,502 -c--a-w C:\Documents and Settings\amory\neoteris_read_30008954.reg
    2006-09-06 22:41 2,748,140 -c--a-w C:\Documents and Settings\amory\neoteris_read_21573890.reg
    2006-08-26 18:04 2,712,466 -c--a-w C:\Documents and Settings\amory\neoteris_read_13359324.reg
    2006-07-28 21:31 2,712,312 -c--a-w C:\Documents and Settings\amory\neoteris_read_8310136.reg
    2006-07-10 01:30 2,712,312 -c--a-w C:\Documents and Settings\amory\neoteris_read_7802158.reg
    2006-07-08 13:34 2,712,320 -c--a-w C:\Documents and Settings\amory\neoteris_read_13372929.reg
    2006-07-07 10:47 2,712,320 -c--a-w C:\Documents and Settings\amory\neoteris_read_26178438.reg
    2006-07-04 11:32 2,712,312 -c--a-w C:\Documents and Settings\amory\neoteris_read_32110028.reg
    2006-06-18 14:13 2,680,542 -c--a-w C:\Documents and Settings\amory\neoteris_read_31116492.reg
    2006-06-18 09:55 2,680,542 -c--a-w C:\Documents and Settings\amory\neoteris_read_18500564.reg
    2006-06-13 09:58 2,680,542 -c--a-w C:\Documents and Settings\amory\neoteris_read_15427560.reg
    2006-05-29 19:32 2,681,544 -c--a-w C:\Documents and Settings\amory\neoteris_read_14197152.reg
    2006-05-26 11:12 2,681,544 -c--a-w C:\Documents and Settings\amory\neoteris_read_24968504.reg
    2006-05-22 02:02 2,681,544 -c--a-w C:\Documents and Settings\amory\neoteris_read_2003979.reg
    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - Startup: PowerReg Scheduler.exe
    O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} -
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} -
    O16 - DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} (Java Plug-in 1.6.0_01) -
    O16 - DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} (Java Plug-in 1.6.0_02) -
    O16 - DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} (Java Plug-in 1.6.0_03) -
    O16 - DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} (Java Plug-in 1.6.0_05) -
    O16 - DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} (Java Plug-in 1.6.0_07) -
    O16 - DPF: {DBA230D1-8467-4e69-987E-5FAE815A3B45} -
    O20 - AppInit_DLLs: adubes.dll

    NOTE: HJT may popup an error about the AppInit_DLLs line. Ignore it and click OK to continue.

    After clicking Fix, exit HJT.

    Now we need to use ComboFix.
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  8. ajf10

    ajf10 Private E-2

    Quote "What are all the below files for?"

    The webvpn files and neoteris files are related to vpns that I use to access my desktop at work, and work related applications, possibly with a citrix application, although I am not totally sure.

    I went through all the steps you recommended. I did get a success message.

    NOD32 no longer detects the Pandrv file at startup, or at least it didn't on the first restart after running through these steps. So far, everything looks good.

    Thank you.
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Many of the lines I asked you to fix with HijackThis are still in your log. This is probably because you did not disable Spybot's Teatimer as was requested in the READ & RUN ME. See: How to disable Spybot's TeaTimer You need to do this, reboot and then try the analyse.exe fixes again and then attach a new MGlogs.zip file after running GetLogs.bat again.
     
  10. ajf10

    ajf10 Private E-2

    Sorry, I believe I did turn off tea timer during the initial read and run first cleaning, but after I did all that I turned it back on, and didn't understand that it needed to be off for the steps to follow.

    Anyway I did turn it off and run things again.

    The only other problem I have noticed is that my remote desktop connection doesn't seem to work anymore. Not sure if this is related or coincidental. It says something about running in compatibility mode.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It does not appear to be related to anything that was fixed/removed during the cleaning process. I'm not sure if the malware itself did anything to it. You may need to work this in the Software Forum. I'm assuming you are referring to Windows Remote Desktop and not some third party software. Make sure you check under My Computer, Properties, Remote to make sure you have allowed Remote Desktop. Coomputers that are not on a domain (which is a normal setup for home networks) need a tweak in the registry to allow remote desktop to work. See the below:

    http://www.microsoft.com/windowsxp/using/mobility/getstarted/remoteintro.mspx

    Your logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommed you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
      • Delete the C:\combofix folder from combofix (if it exists)
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  12. ajf10

    ajf10 Private E-2

    Thanks for your help!
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds