MajorGeeks Support Forums

Go Back   MajorGeeks Support Forums > ----------= PC, Desktop and Laptop Support =---------- > Malware Removal
Register FAQ Members List Calendar Casino Mark Forums Read

Malware Removal Malware removal forum. Please see the READ ME FIRST thread before you post. Forum is staffed by a small number of volunteers, please be patient.


Reply
 
Thread Tools Display Modes
  #1  
Old 02-17-12, 00:30
raritan01 raritan01 is offline
Private E-2
 
Join Date: Feb 2012
Posts: 5
Thanks: 2
Thanked 0 Times in 0 Posts
Default Another Rootkit.zeroaccess infection

First off, I want to thank all the moderators on this forum for the help they are offering. I've directly benefited from their knowledge.
I have a netbook running Windows 7 (no internet access in safe mode :/ ) that's infected with rootkit.zeroaccess.
First I removed McAfee because it kept getting in the way of combofix.
Second, I booted into safe mode and ran combofix. It found several files and removed them. Lastly, I booted off of kaspersky's anti virus disk and ran that. It found one infection. After that I booted back into normal mode and ran tdskiller and that found one infection with the option to "cure." I selected that and ran MBRCheck. Attached are the log files from TDSKiller and MBRCheck.
Please advise.
Attached Files
File Type: txt TDSSKiller.2.7.13.0_16.02.2012_22.15.51_log.txt (81.9 KB, 5 views)
File Type: txt MBRCheck_02.16.12_22.22.51.txt (13.6 KB, 3 views)
Reply With Quote
Sponsored links
  #2  
Old 02-17-12, 00:54
thisisu's Avatar
thisisu thisisu is offline
Malware Consultant
 
Join Date: Apr 2006
Location: Houston, TX
Posts: 8,162
Thanks: 269
Thanked 1,434 Times in 1,355 Posts
Default Re: Another Rootkit.zeroaccess infection

Hi and welcome to Major Geeks, raritan01!

You also need to try to complete as much as possible in this thread: READ & RUN ME FIRST Malware Removal Guide
__________________
Facebook . Twitter . Blog . VirusTotal
Reply With Quote
The Following User Says Thank You to thisisu For This Useful Post:
raritan01 (02-17-12)
  #3  
Old 02-17-12, 15:42
raritan01 raritan01 is offline
Private E-2
 
Join Date: Feb 2012
Posts: 5
Thanks: 2
Thanked 0 Times in 0 Posts
Default Re: Another Rootkit.zeroaccess infection

My apologies. Attached are the logs requested.
RootRepeal crashed. The logs are below (because I could only attach 4 items):

ROOTREPEAL CRASH REPORT
-------------------------
Windows Version: Windows Vista SP1
Exception Code: 0xc0000005
Exception Address: 0x00429d13
Attempt to write to address: 0x013d9000

ROOTREPEAL CRASH REPORT
-------------------------
Windows Version: Windows Vista SP1
Exception Code: 0xc0000005
Exception Address: 0x776363f8
Attempt to read from address: 0xc0af89ca

ROOTREPEAL CRASH REPORT
-------------------------
Windows Version: Windows Vista SP1
Exception Code: 0xc0000005
Exception Address: 0x776363f8
Attempt to read from address: 0xc0af89ca
Attached Files
File Type: txt ComboFix.txt (9.4 KB, 8 views)
File Type: txt mbam-log-2012-02-17 (11-59-46).txt (1.8 KB, 5 views)
File Type: zip MGlogs.zip (601.7 KB, 3 views)
File Type: log SUPERAntiSpyware Scan Log - 02-16-2012 - 23-56-29.log (583 Bytes, 4 views)
Reply With Quote
  #4  
Old 02-17-12, 20:15
thisisu's Avatar
thisisu thisisu is offline
Malware Consultant
 
Join Date: Apr 2006
Location: Houston, TX
Posts: 8,162
Thanks: 269
Thanked 1,434 Times in 1,355 Posts
Default Re: Another Rootkit.zeroaccess infection

Fixing items using ComboFix
Make sure that ComboFix.exe that you downloaded while doing the READ & RUN ME is on your desktop -- but do not run it.
If it is not on your desktop, the below will not work.
Shut down your protection software now (antivirus, antispyware...etc) to avoid possible conflicts.
Open Notepad and copy/paste the text in the below code box into Notepad:
Code:
KillAll::
ClearJavaCache::
File::
C:\Users\April Joy\AppData\Local\5b2be20f
C:\Users\April Joy\AppData\Roaming\486c57bb
C:\Users\April Joy\AppData\Roaming\Microsoft\Windows\Templates\3da83ac9
C:\Users\April Joy\AppData\Roaming\Microsoft\Windows\Templates\bedk.exe
C:\Users\April Joy\AppData\Roaming\Microsoft\Windows\Templates\fygn.exe
C:\Users\April Joy\AppData\Roaming\Microsoft\Windows\Templates\leet.exe
C:\Users\April Joy\AppData\Roaming\Microsoft\Windows\Templates\rpnt.exe
C:\Users\April Joy\AppData\Roaming\Microsoft\Windows\Templates\v36mok4an6a6i
C:\ProgramData\56c805e9
C:\Program Files\Internet Explorer\e19a033d
C:\Users\April Joy\AppData\Local\temp\ASK8F92.tmp
C:\Users\April Joy\AppData\Local\temp\tmp689F.tmp
FileLook::
C:\Windows\system32\Drivers\dfsc.sys
Folder::
C:\Windows\$NtUninstallKB12310$
C:\Users\April Joy\AppData\Local\temp\5abb12b32e854e3368affa
RegLock::
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
Save this file as CFScript.txt to your desktop. So now you should have both CFScript.txt and ComboFix.exe on your desktop.
Now use your mouse to drag CFScript.txt on top of ComboFix.exe and then release.

This will launch ComboFix.
Note: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.
Allow ComboFix to update itself if prompted.
When ComboFix finishes, a log will be produced at C:\ComboFix.txt
Attach this log to your next message. (How to attach)

Your logs are showing that you have full internet connectivity. You won't be able to connect to the internet while in Safe Mode. If you would like to use the internet while in Safe Mode, you may utilize Safe Mode with Networking.

I'd like you to rescan with TDSSKiller using the same parameters are before. Then attach the latest log. (How to attach)

Please download OTL by OldTimer.
  • Save it to your desktop.
  • Double click on the OTL icon on your desktop. (Vista/7 right-click and select Run as Administrator)
  • Check the "Scan All Users" checkbox.
  • Check the "Standard Output".
  • Change the setting of "Drivers" and "Services" to "All"
  • Copy the text in the code box below and paste it into the text-field.
    Code:
    netsvcs
    /md5start
    dfsc.sys
    /md5stop
    %windir%\system32\*.sys /90
    %windir%\system32\drivers\*.sys /lockedfiles
  • Now click the button.
  • Two reports will be created:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized
  • Attach both OTL.txt and Extras.txt to your next message. (How to attach)

Now run C:\MGtools\GetLogs.bat by right-mouse clicking it and then selecting Run as Administrator
This updates all of the logs inside MGlogs.zip.
When it is finished, attach C:\MGlogs.zip to your next message. (How to attach)

Let me know how the system is running after you have completed these steps.
__________________
Facebook . Twitter . Blog . VirusTotal
Reply With Quote
  #5  
Old 02-18-12, 22:45
raritan01 raritan01 is offline
Private E-2
 
Join Date: Feb 2012
Posts: 5
Thanks: 2
Thanked 0 Times in 0 Posts
Default Re: Another Rootkit.zeroaccess infection

Thank you for your help!
The system is running fine. I haven't used the computer on the net at all since I noticed I was infected with something. What installs Rootkit.zeroaccess? What should I look out for/avoid?
Attached are the logs as requested.
Attached Files
File Type: txt ComboFix.txt (13.8 KB, 4 views)
File Type: zip OTL_Log_Files.zip (28.9 KB, 2 views)
File Type: txt TDSSKiller.2.7.13.0_18.02.2012_20.04.01_log.txt (81.2 KB, 2 views)
File Type: zip MGlogs.zip (603.6 KB, 1 views)
Reply With Quote
Sponsored links
  #6  
Old 02-18-12, 23:19
thisisu's Avatar
thisisu thisisu is offline
Malware Consultant
 
Join Date: Apr 2006
Location: Houston, TX
Posts: 8,162
Thanks: 269
Thanked 1,434 Times in 1,355 Posts
Default Re: Another Rootkit.zeroaccess infection

Still have a bit more work to do.

Fix items using OTL by OldTimer

Double-click OTL.exe to run. (Vista/7 right-click and select Run as Administrator)
Shut down your protection software now (antivirus, antispyware...etc) to avoid possible conflicts.
Copy the text in the code box below and paste it into the text-field.
Code:
:processes
killallprocesses
:otl
[2011/09/13 02:19:56 | 000,000,017 | ---- | C] () -- C:\Windows\System32\shortcut_ex.dat
[2011/09/08 10:49:07 | 000,000,288 | -H-- | C] () -- C:\Users\April Joy\AppData\Roaming\7FEC82BD.reg
[2011/09/08 10:47:07 | 000,001,056 | -HS- | C] () -- C:\Users\April Joy\AppData\Local\v36mok4an6a6i
[2011/09/08 10:47:07 | 000,001,056 | -HS- | C] () -- C:\ProgramData\v36mok4an6a6i
[2011/09/08 10:47:07 | 000,000,000 | ---- | C] () -- C:\ProgramData\qbsf.exe
[2011/09/08 10:47:07 | 000,000,000 | ---- | C] () -- C:\ProgramData\ogcv.exe
[2011/09/08 10:47:07 | 000,000,000 | ---- | C] () -- C:\ProgramData\nllx.exe
[2011/09/08 10:47:07 | 000,000,000 | ---- | C] () -- C:\ProgramData\cddk.exe
:files
C:\Windows\$NtUninstallKB12310$ /d
C:\Windows\winsxs\x86_microsoft-windows-dfsclient_31bf3856ad364e35_6.1.7600.16804_none_87c60c95472f7333\dfsc.sys|C:\Windows\winsxs\x86_microsoft-windows-dfsclient_31bf3856ad364e35_6.1.7600.16385_none_87708401476f7a4f\dfsc.sys /replace
[2012/01/28 14:05:16 | 000,000,679 | ---- | M] () -- C:\Users\April Joy\Application Data\Microsoft\Internet Explorer\Quick Launch\System Check.lnk
xcopy /h/i/s/y "C:\Qoobox\Quarantine\C\Users\April Joy\AppData\Local\TEMP\smtmp\1" "%programdata%\start menu" /c
xcopy /h/i/s/y "C:\Qoobox\Quarantine\C\Users\April Joy\AppData\Local\TEMP\smtmp\2" "%appdata%\microsoft\internet explorer\quick launch" /c
xcopy /h/i/s/y "C:\Qoobox\Quarantine\C\Users\April Joy\AppData\Local\TEMP\smtmp\3" "%appdata%\microsoft\internet explorer\quick launch\user pinned\taskbar" /c
xcopy /h/i/s/y "C:\Qoobox\Quarantine\C\Users\April Joy\AppData\Local\TEMP\smtmp\4" "%programdata%\desktop" /c
:commands
[emptyjava]
[emptyflash]
Now click the button.
If the fix needed a reboot please do it.
Click the OK button (upon reboot).
When OTL is finished, Notepad will open. Close Notepad.
A log file will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.
Attach this log to your next message. (How to attach)
__________________
Facebook . Twitter . Blog . VirusTotal

Last edited by thisisu; 02-19-12 at 00:39.. Reason: replace instead of delete
Reply With Quote
  #7  
Old 02-18-12, 23:23
thisisu's Avatar
thisisu thisisu is offline
Malware Consultant
 
Join Date: Apr 2006
Location: Houston, TX
Posts: 8,162
Thanks: 269
Thanked 1,434 Times in 1,355 Posts
Default Re: Another Rootkit.zeroaccess infection

Quote:
Originally Posted by raritan01 View Post
What installs Rootkit.zeroaccess? What should I look out for/avoid?
ZeroAccess (Max++) Rootkit (aka: Sirefef) is a sophisticated rootkit that uses advanced technology to hide its presence in a system and can infect both x86 and x64 platforms. ZeroAccess is similar to the TDSS rootkit but has more self-protection mechanisms that can be used to disable anti-virus software resulting in Access Denied messages whenever you run a security application. For more specific information about this infection, please refer to:
__________________
Facebook . Twitter . Blog . VirusTotal
Reply With Quote
  #8  
Old 02-19-12, 10:10
raritan01 raritan01 is offline
Private E-2
 
Join Date: Feb 2012
Posts: 5
Thanks: 2
Thanked 0 Times in 0 Posts
Default Re: Another Rootkit.zeroaccess infection

Attached is the log as requested.
Attached Files
File Type: log 02192012_080344.log (5.7 KB, 5 views)
Reply With Quote
  #9  
Old 02-19-12, 12:02
thisisu's Avatar
thisisu thisisu is offline
Malware Consultant
 
Join Date: Apr 2006
Location: Houston, TX
Posts: 8,162
Thanks: 269
Thanked 1,434 Times in 1,355 Posts
Default Re: Another Rootkit.zeroaccess infection

Looks OK now. Were you having any problem(s) with missing desktop, start menu, quick launch, icons/shortcuts?

The type of infection you had hides them. Let me know.
__________________
Facebook . Twitter . Blog . VirusTotal
Reply With Quote
  #10  
Old 02-19-12, 15:57
raritan01 raritan01 is offline
Private E-2
 
Join Date: Feb 2012
Posts: 5
Thanks: 2
Thanked 0 Times in 0 Posts
Default Re: Another Rootkit.zeroaccess infection

Initially, yes. After the majority of the infected files were removed, things looked more normal. This infection was the most persistent I've ever seen.
Thanks for your help again!
All looks good
Reply With Quote
Sponsored links
  #11  
Old 02-19-12, 15:58
thisisu's Avatar
thisisu thisisu is offline
Malware Consultant
 
Join Date: Apr 2006
Location: Houston, TX
Posts: 8,162
Thanks: 269
Thanked 1,434 Times in 1,355 Posts
Default Re: Another Rootkit.zeroaccess infection

You're welcome

If you are not having any other malware problems, it is time to do our final steps:
  1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
  2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
    • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
    • "%userprofile%\Desktop\combofix" /uninstall
      • Notes: The space between the combofix" and the /uninstall, it must be there.
      • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
  3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
  4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
  5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
  6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
  7. Go to add/remove programs and uninstall HijackThis if it present
  8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
    related to MGtools and some other items from our cleaning procedures.
  9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
    • Refer to the cleaning procedures pointed to by step 7 of the READ ME
      for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
    • Then reboot and Enable System Restore to create a new clean Restore Point.
  10. After doing the above, you should work through the below link:
Be safe
__________________
Facebook . Twitter . Blog . VirusTotal
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
ZeroAccess Rootkit ComputerHack Malware Removal 8 03-13-12 22:52
Can't connect to internet after ZeroAccess rootkit infection. Logs attached mattbiel Malware Removal 8 12-31-11 21:18
Please help, Zeroaccess Rootkit Infection suntzu83 Malware Removal 4 12-05-11 01:51
Need help finishing removal of ZeroAccess rootkit infection NukeMan Malware Removal 26 11-09-11 12:47
HELP please - Rootkit.Zeroaccess argentia Malware Removal 15 10-02-11 00:19


All times are GMT -5. The time now is 12:43.

MajorGeeks.Com Menu

MajorGeeks.Com \ All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ NEW! PC Games \ System Tools \ Macintosh \ Demonews.Com \ Top Downloads

MajorGeeks.Com \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds


Powered by vBulletin® Version 3.8.4
Copyright © 2009 vBulletin Solutions, Inc. All rights reserved.
Ad Management by RedTyger