Possible rootkit infection?

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by AverageJoe, Jun 25, 2008.

  1. AverageJoe

    AverageJoe Private E-2

    A bit of background info; a few weeks ago i was hit with a variant of the RBOT worm. It was binded with a legitimate file, and ran when i ran the other file. I at first wasn't aware but then realized something was up when I had multiple versions of csrss.exe, etc...because I know enough to know there is only 1 version supposed to be running of certain system processes.

    So i removed it, I think...and installed Comodo Firewall to protect, since its very good against leaktests (see matousec.com) ..also I am running avast.

    Well I followed your thread about running all those scans...and after I ran the ComboFix scan it didn't reset my clock back to normal time and date which annoys me..you guys have a fix for this? because I tried to fix it myself and it didn't work.

    I will attach the logs.
     

    Attached Files:

  2. AverageJoe

    AverageJoe Private E-2

    And here is my next log

    Is there any rootkit infection specialist? because if the scans I am running aren't finding much with regard to rootkits, that might be evidence that the rootkit is working properly and hiding evidence...

    Or am i just being paranoid? I found a driver called spye.sys loaded into the System (using process explorer) and couldn't find it in windows explorer, so that was a bit suspicious; googling it yielded no results, and it might have been an anti-rootkit driver but im worried maybe its a rootkit...not sure.

    Also Rootkitrevealer, which ends up crashing every time i try to save the results of its scan, always finds a really obfuscated registry entry thats hidden from Windows API...I ran Sophos and BitDefender anti-rootkit and they found nothing.
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Before we can continue, you need to put your PC into normal startup mode with MSconfig. This was requested in step 1 of the READ & RUN ME where we stated not doing this would delay getting help. After doing this, you will need to attach a new MGlog.zip file by doing the below.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file which will be created.


    And just to check for rootkits since you are worried about them, run this Running GMER to detect rootkits and attach the requested log.
     
  4. AverageJoe

    AverageJoe Private E-2

    Okay, I have done as you requested and set MsConfig to normal startup; sorry about that, I thought it was already at Normal..my eyes must have been decieving me.

    As for Gmer, i have already tried running it only to have my computer instantly crash and reboot, so no go on that one..

    I'm worried my system may be compromised since I have been infected by RBOT in the past, as ive stated...and worried about rootkit still

    Thanks for your help though
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then based on the logs you have attached, there is only a little minor cleanup. Mostly of things that never uninstalled properly due to you having been using MSconfig.

    Run this Disable/Remove Windows Messenger to remove Windows Messenger. Do not confuse Windows Messenger with MSN Messenger because they are not the same. Windows Messenger is a frequent cause of popups.

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - (no file)
    O3 - Toolbar: (no name) - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - (no file)
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [OutpostFeedBack] C:\Program Files\Agnitum\Outpost Firewall\feedback.exe /dump:eek:s_startup
    O4 - HKLM\..\Run: [Outpost Firewall] C:\Program Files\Agnitum\Outpost Firewall\outpost.exe /waitservice
    O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
    O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
    O23 - Service: G - Unknown owner - C:\DOCUME~1\David\LOCALS~1\Temp\G.exe (file missing)

    After clicking Fix, exit HJT.



    Now we need to use ComboFix to remove a bunch of malware files.
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now run Ccleaner!

    Now you can fix your clock from Control Panel ->Regional and Language Options and then on the Regional Options tab click the Customize button then on the next form click the Time tab. Then change the Time format to what you want. It explains there what the lower case and upper case letters will do. Upper case H is giving you 24 hour clock settings.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it.



    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  6. AverageJoe

    AverageJoe Private E-2

    Here are my logs;

    The registry thing went fine; I think G.exe was the process that RootkitRevealer installed, but o well. its gone now

    I also removed some other startup's with HijackThis (just extra stuff that was lagging my startup, nothing crucial)

    But I am still worried I have malware left over from RBOT and maybe my system is compromised...maybe i have a rootkit that none of the rootkit detectors are finding..why else would RootkitRevealer be crashing? If the scan find nothing its even more evidence that i have a rootkit..cause u never know.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes it was but it does not need to be there as a permanent service wasting system resources while the program is not even running.


    Not accoring to any of your logs and seeing as how you had multiple other rootkit scanners installed, you probably noticed they found nothing too.

    Scans crash all the time for non-malware reasons. Could be problems within your Windows OS or conflicts due to other software you are running.

    The only other items on your system that I even wonder about are the below
    Code:
    2008-06-11 23:44 . 2008-06-11 23:44 1,720,086 --a------ C:\WINDOWS\system32\TmpA24604843
    2008-05-30 00:10 . 2008-05-30 00:13 22 --a------ C:\name.reg
    2008-05-29 21:32 . 2008-05-29 21:32 30,001 --a------ C:\WINDOWS\gktemp.wat
    2008-05-29 21:25 . 2007-12-24 18:50 926,720 --a------ C:\keymaker.exe
    2008-05-27 19:37 . 2008-05-27 19:37 0 --a------ C:\WINDOWS\system32adsŽñz.JPG
    The last one I would just delete immediately since it is zero bytes and due to the strange name.
     
  8. AverageJoe

    AverageJoe Private E-2

    So you don't think the rootkit is tricking the rootkit scanners? It might be r3eally sophisticated, how would I ever know? it could lie to the OS itself

    So am I okay then? I deleted most of those files that you said looked suspicious.
     
  9. AverageJoe

    AverageJoe Private E-2

    I just found something pretty suspicious!!

    I was running USEC Radix (a new rootkit discovery tool, seems quite advanced, you can find it for download at antirootkit.com)

    I will list something suspicious that it has found here (since I cant get the log thing to work) its called spho.sys, and i googled only found one result in chinese..not sure what this is.

    Driver atapi.sys is hidden.
    IRP function of driver dmio.sys (Device \driver\dmio) was hooked by spho.sys

    Driver iaStor.sys is hidden.
    IRP function of driver ftdisk.sys (Device \driver\ftdisk) was hooked by spho.sys

    Filter Driver atapi.sys is hidden.
    IRP function of driver cdrom.sys (Device \Driver\cdrom) was hooked by spho.sys

    IRP function of driver ACPI.sys (Device \Driver\ACPI_HAL) was hooked by spho.sys

    IRP function of driver NTFS.sys (Device \Filesystem\Ntfs) was hooked by spho.sys

    IRP function of driver cdfs.sys (Device \Filesystem\cdfs) was hooked by spho.sys.

    When I click on Details it shows me that the file is packed/crypted, and it says "possible file location" is C:\Windows\system32\drivers\spho.sys

    When I click to jump to file location, it says the file cannot be found. Hmm, suspicious!!

    How do I get rid of spho.sys; I'm sure if it was legit I could find info about it on the web. But I can't...read Chinese

    Please help I think I have a rootkit.
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    First I see that you are working on another forum here:

    http://forum.sysinternals.com/forum_posts.asp?TID=15235&PID=73478

    It is a waste of precious resources (the malware fighters) to do this and it can be dangerous and cause confusion for the two fighters since they don't know about each other.

    Please choose one forum where you want to work and remain there.

    An FYI for you, the user named CooKooBird who posted in the 7:29 PM message to you is giving you incorrect information. MEMSWEEP is not malware. It is from you installing Sophos AntiRootkit. The C:\WINDOWS\system32\1D.tmp file is also part of Sophos.

    Also CooKooBird implied that Flashget may be a problem and it is not. You do not have the trojan. You downloaded and installed the Flashget Download Manager yourself which is a valid program.
     
    Last edited: Jun 27, 2008
  11. AverageJoe

    AverageJoe Private E-2

    Okay well I would like to work with you...this guy at the other forum doesn't seem like he knows much.

    But if I am going to work with you, you must take my rootkit paranoia seriously, because im almost 100 percent sure I have a rootkit and you must believe me and work with me to fix it instead of trying to convince me i am clean.

    Is that acceptable? beacuse that spho.sys file is really looking suspicious
     
  12. AverageJoe

    AverageJoe Private E-2

    What is all this stuff?

    explorer.exe RegQueryValue HRZR_EHACVQY:%pfvqy2%\GUD\Jvagre Nffnhyg\Qnja bs Jne - Jvagre Nffnhyg.yax

    and a bunch of randomly named registry entries like that come up in Process Monitor...all from explorer.exe.....that is just WEIRD, cant be normal.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I am taking you serious. All I had stated was that based on the info you had provided be up to the point of my comment was that there were no problems found. You more recent logs show some additional data that bares further investigation. But there is a possibility that the file spho.sys may already be gone or it is just hidden beyond the ability of the tool to find. I will think about what to do next and get back to you.
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    This is more than likely not a problem. It is just a ROT13 encoded message. If you paste the HRZR_EHACVQY:%pfvqy2%\GUD\Jvagre Nffnhyg\Qnja bs Jne - Jvagre Nffnhyg.yax string into the below link

    http://rot13-encoder-decoder.waraxe.us/


    and translate it you will see the below:

    UEME_RUNPIDL:%csidl2%\THQ\Winter Assault\Dawn of War - Winter Assault.lnk

    Is this a game you play?
     
  15. AverageJoe

    AverageJoe Private E-2

    Lol...you are too good man. That is true, i was thinking that i was finding patterns in those "random" letters...but why would explorer.exe ROT13 encode this stuff? i didnt know that happened

    Oh, and by the way, you still haven't answered what spho.sys is doing on my system and why i cant find it.

    that is my main concern
     
  16. AverageJoe

    AverageJoe Private E-2

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Sorry but CooKooBird is incorrect. The MEMSWEEP2 registry keys are all added when you install and run Sophos AntiRootkit. They appear after running the scan the first time. Actually they appear almost immediately after you start the scan. The tmp file is also part of the scan.

    Getting proof is rather simple. Just run Sophos AntiRootkit and you will see it show up. You don't need to do what CooKooBird suggested in his 8:14pm post because MEMSWEEP2 is from Sophos AntiRootkit. We already know this due to years of malware removal experience.
     
    Last edited: Jun 29, 2008
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Two possible reasons you cannot find it.

    1. One would be based on the ability of the the malware (if it is malware) to hide the file. You would normally not be able to see files hidden by a rootkit program using normal programs so that would be expected. The specialty tools will normally find and reveal the files though. However the tool you ran only pointed out hooked entries in the registry and did not find the file when you had it check. Thus the file either does not exist or it is capable of hiding from the tool you ran.
    2. The second is that it may already be gone and all that the scanner is finding is regisrty information that is left over.
    Download Registry Search (see the link titled RegSearch Download Link)

    * Extract the files from Regsearch.zip into a folder.
    * Doubleclick regsearch.exe to start the program.
    * Enter spho.sys in the top area of the form and then click "OK".
    * Notepad will be opened with text in it (the file named RegSearch.txt will be saved in the program's folder as well). Attach this file to your next reply.
     
    Last edited: Jun 29, 2008
  19. AverageJoe

    AverageJoe Private E-2

    The tool I was using is called Radix; its a new anti-rootkit tool that found spho.sys hooking acpi.sys and cdrom.sys and all that i mentioned earlier

    I also found spho.sys hooked into the system with ProcessExplorer; it created several threads so i know its on my system, but i can't find it because its cloaked (rootkit) ; thus, its there just hiding itself...so how can we possibly find it if the OS itself is lying to us? BartPE perhaps?

    Heres the log, it showed nothing but you can take a look anyway.
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is a very strong possibility that this driver is related to protection software for the games that you have installed. Especially since you say it hooks the CD ROM driver. If you do find it and remove it, you may break the games that require it to be in place.

    You create a bootable CD like below and use it to bootup your PC. Since Windows will not really be running from your hard disk but rather from the CD, you will be able to hunt around on your hard disk to see if the file can be located. Any protection put into place by any stealth/rootkit like software will not be loaded and will not block you from finding the file if it really exists. Just remember that if it is for your games, they may not work anymore.

    Make this CD which should be in everyone's tools chest anyway: UBCD4Win
     
  21. AverageJoe

    AverageJoe Private E-2

    What am I supposed to do once I have downloaded it, in other words, how do I make a cd, and when I make it, how am I supposed to use it to scan my OS? Never used it before

    Also your version is 3.11 the current one is 3.13
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The link on their web page explains it. See How to Build in the left column: http://www.ubcd4win.com/downloads.htm

    It will boot up to a Windows like environment. It is rather intuitive to figure out. ;) It has a much better Explorer interface built in so it is easy to hunt around thru folders.

    Ours will be updated soon but you can just download it from the author in the meantime.
     
  23. AverageJoe

    AverageJoe Private E-2

    The iso refuses to build since there was 4 errors and 1 warning (on my computer) and i tried it on a friends computer first but still got 1 error (if there is even 1 error it wont build the iso). still dont know what the error is..or why its happening, but cant build the cd succesfully
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I suggest that you post a message in the Software Forum explaining your problem with creatng this CD. If there are any error messages, provide the exact word for word message. I have built these CDs several times and never had a problem. Did you copy your Windows CD to the hard disk as instructed? If not, this is often the cause of failures.
     
  25. AverageJoe

    AverageJoe Private E-2

    Which software forum, majorgeeks or UBCD4Win?

    Also I'm not sure where to find the error message, it doesn't tell me what the errors are..

    Yes, I copied it; but its a DVD, Dell Preinstallation...doesn't come with drivers and utilities mostly for sound and internet (they are on a separate DVD)
    so maybe that is the problem?

    So is there anything else I should do in the mean time?

    By the way, the spho.sys changed its now spac.sys. I'm noticing a pattern, its always 4 letters, starting with SP, and the last two change sometimes...and its always hidden. Could this be Splinter Cell, or starforce? But it has no name, so it couldnt be, could it?? What is this thing on my system, i need to know
     
  26. AverageJoe

    AverageJoe Private E-2

    Ah...figured it out finally

    sp**.sys is a rootkit-like behavioral technology of Daemon Tools/Alcohol 120

    okay, guess i am fine then? Do you think? I'd still like to make that CD though..and then maybe you could tell me where to look and how to use it to find malware? Maybe I am clean? Do you know?
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    As I said from the beginning.... your logs were clean and we only did some minor cleaning to remove some unnecessary items. There was no malware as far as I was concerned.

    It is not a malware scanning tool per say. It is just a great tool. But it does allow you to run scans since it has a whole bunch of added software that is installed with it. To make the CD, you need a real Windows bootable CD.
     
  28. AverageJoe

    AverageJoe Private E-2

    Ah...that is too bad that my disk isn't "real".

    Well, thanks dude

    If you say i am clean i believe you
     
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds