One Bad Mutha

Discussion in 'Malware Help (A Specialist Will Reply)' started by stuart_wildcat, Aug 2, 2007.

  1. stuart_wildcat

    stuart_wildcat Private E-2

    I have been infected with the ggf.exe trojan that is running around. This has been especially hard to fight because I only have the infected computer to use.

    The worst part about this malware program is that it scans the titlebar of any open window and closes the window if it does not like the title. This means that any browser searching for virus/trojan information, the Windows Explorer window to attempt to run HijackThis all are "enemies".

    I do not have much time as I have to get on a flight soon but I wanted to post the log files I have been able to generate to see what people think.

    I will check back later today and keep fighting this dam thing!

    Departures from "normal" malware removal steps:

    1. I ran the BitDefender online scan before Spybot or CounterSpy. I had not yet been able to install the other tools and I wanted something to be running while I took a break for dinner with family (the reason I need to be on a plane).
    2. I was not able to run Panda ActiveScan completely. I will run this again when I can.
    3. I was able to run Hijackthis after several tries. I ran in safe mode first by accident. I will attach that log file as "hijackthis-safe.log".

    Thanks for any help that can be provided. I will check later and perform any additional steps if required. This is a nasty virus.
     

    Attached Files:

  2. stuart_wildcat

    stuart_wildcat Private E-2

    Additional log files.
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Run the below steps in the order written.

    Are the below lines valid items that you configured? If not, add them to the HijackThis fix.
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = proxy.mycompany.com:5200
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = was.myhost.com;<local>

    We don't recommend adding items to the Trusted Zone unless absolutely required. It is rarely a necessity. So reconsider whether the below are really required.
    O15 - Trusted Zone: www.bankofamerica.com
    O15 - Trusted Zone: www.bofa.com
    O15 - Trusted Zone: service.capitalone.com
    O15 - Trusted Zone: www.capitalone.com
    O15 - Trusted Zone: chaseonline.chase.com
    O15 - Trusted Zone: www.chase.com
    O15 - Trusted Zone: secure.mcbbankcard.com
    O15 - Trusted Zone: www.mcbbankcard.com
    O15 - Trusted Zone: torontodomino.webagesolutions.com
    O15 - Trusted Zone: www.webagesolutions.com

    Now let's begin by stopping a bad service.
    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to ICF
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Click OK until you get back to Windows.
    Uninstall the below old versions of software:
    J2SE Development Kit 5.0 Update 7
    J2SE Runtime Environment 5.0 Update 7
    Sunbelt CounterSpy <--- We are finished with this trial program now.
    Mozilla Firefox (2.0.0.3)
    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment

    Then install the current version of FireFox from: Mozilla Firefox

    If you need the Sun Java Development kit you can get it here: http://java.sun.com/javase/downloads/index.jsp

    Continue by downloading a tool we will need

    - Process Explorer

    Extract it to its own folder somewhere that you will be able to locate it later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    Make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of any of the below DLL files (if found) and then click the kill button.
    cptbwarrmofx.dll
    iehajuwxexuq.dll

    After you have killed all instances of any of the above DLLs under winlogon click ok.
    (If you do not find these DLLS, just continue on.)

    Next double click on explorer.exe and again click once on each instance of any of the below DLL files (if found) and then click the kill button.
    cptbwarrmofx.dll
    iehajuwxexuq.dll

    After you have killed all instances of any of the above DLLs under Explorer click ok.
    (If you do not find these DLLS, just continue on.)

    Next double click on iexplore.exe and again click once on each instance of any of the below DLL files (if found) and then click the kill button.
    cptbwarrmofx.dll
    iehajuwxexuq.dll

    After you have killed all instances of any of the above DLLs under iexplore click ok.
    (If you do not find these DLLS, just continue on.)


    Now just exit Process Explorer.

    Run HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [QD FastAndSafe] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [gf1.0.0.2] C:\WINDOWS\system32\ggf.exe
    O20 - Winlogon Notify: cptbwarrmofx - C:\WINDOWS\system32\cptbwarrmofx.dll
    O20 - Winlogon Notify: iehajuwxexuq - C:\WINDOWS\system32\iehajuwxexuq.dll
    O23 - Service: ICF - Unknown owner - C:\WINDOWS\system32\svchost.exe:exe.exe

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it
    double click it and allow it to merge with the registry.
    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. Avenger
    2. GetRunKey
    3. ShowNew
    4. HJT


    Make sure you tell me how things are working now!
    There is a possibility that your svchost.exe file is infected. This is a valid required Windows process, but your may have been infected with an Alternate Data Stream (ADS) infection. The below files should be run thru this online scanner http://virusscan.jotti.org/
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\dllcache\svchost.exe
     
  4. stuart_wildcat

    stuart_wildcat Private E-2

    Thanks for the quick reply! I am now home from a cross country plane fliht and luckily I am able to bring in the "reinforcements". Part of the problem at my mom's house was her laptop was being fixed for an unrelated problem and I had no good way of getting information or tools to try and fix this. Now that I do...it's going to die!

    Anyway, a few answers to questions and results of te steps you outline. I will type this as I go so forgive if it is a bit random.

    1. The settings for the proxy server are fine. I write computer training material and those settings are from sme steps I used to explain to people how to modify the proxy server settings in IE so they would not be breaking their corporate-configured browsers during the class.

    2. I will remove the trusted zone sites. I forget why but at one point I was adjusting the security settings and added those sites to avoid getting tons of security prompts. I have not used Firefox much until now but I think that will change.

    3. I have to leave the Java version that I have on there. Some of the training materials I write were written for that version of Java so I can't really change it. I don't think any of the problems I'm having have been related to Java so I'm not as worried about that.

    4. I will download and start using the new version of Firefox.

    5. What is the 'ICF' service? I have disabled as asked but don't understand what it is. It does appear new as I am in the services panel all the time and I don't recognize it.


    I will post more results in a separate post. My wife wants to use her computer again. Hopefully this will be from my computer after it is fixed!
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    These old version of Sun Java are susceptible to allowing Virtumonde infections so doing this is rather dangereous. You should install the new version of Java on a test PC and see if it will support your training materials alright.

    It is an indeterminate trojan making use of an ADS infection which was applied to your svchost.exe file (which as I stated is a necessary process for your PC but without the infection ;)). Make sure you scan those files at the Jotti website. Removing the ADS stream may present a problem.
     
  6. stuart_wildcat

    stuart_wildcat Private E-2

    Success! I am writing this from my laptop. After running the Process Explorer steps and being able to kill those DLLs I was able to have a lot more success fighting this.

    Replies to replies:

    1. I was not aware Java 5 had security vulnerabilities. I will evaluate using the newer version. I don't think there will be an issue and testing will certainly be less of a hassle than what I have already gone through. :eek:

    2. I have not yet run the svchost.exe file through the online scanner. I wanted to post reply for other steps first.


    Notes on steps in process:

    1. When I ran the Process Explorer the offending DLLs were not associated with the Internet Explorer window I had open. They had been associated with the winlogon.exe and explorer.exe processes and I was able to kill the threads.

    2. When I ran the HijackThis to perform the fixes I did not see the line "023 - Service: ICF...' I am wondering if this is because I had already disabled that service in an earlier step. It is still disabled and I am still checking into that.

    3. When I ran Avenger it seemed to have some problems. I briefly saw in the command prompt that opened when I logged in that it could not find some of the files/folders to delete. I could not tell exactly which ones as the window closed quickly. I was able to manually go in and delete those files, something I had not been able to do previously. Avenger also created an empty log file. I got some message about not being able to find/open the log file so it created a new (empty) one. I have not attached a log file from Avenger because it was empty. I am wondering if I had logged in too quickly before some of the background services and processes had started. Since I was able to manually delete any remaining files/folders I am not worried about that.


    As a next step I will investigate the svchost.exe file to see if it is infected. Based on your post it sounds like the ADS problem (if I have it) may be worse than this, hopefully not. :cry

    Overall things are much better. Thanks so much for the help so far. I will post results for svchost.exe scan.
     
  7. stuart_wildcat

    stuart_wildcat Private E-2

    Good news, svchost.exe in the system32 and dllcache folders came up clean on Jotti online scan.

    I believe this means I am clean (for now)!

    Next step is to harden my system a little more as I admit it has been getting soft. One of my virus subscriptions ran out recently and I had not kept things up to date. No more will I choose convenience over security. :eek:

    Thanks so much for all the help! I will definitely add MajorGeeks to the list of favorites I am building from this experience.
     
  8. stuart_wildcat

    stuart_wildcat Private E-2

    Whoops! I forgot I never posted the last set of logs!

    Here they are. As I mentioned the Avenger log was empty so I will not include it.
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Maybe and maybe not! It could also be they do not detect ADS infections since they are somewhat unique and rootkit like.

    Locate and delete the below file that showed up now! Use safe boot mode if necessary.
    C:\WINDOWS\system32\drivers\jyfd^lea.sys


    Now run the below!

    Now please download F-Secure's BlacklightBeta
    • Download fsbl.exe and save it to the Desktop.
    • Once saved... double click fsbl.exe to install the program.
    • Click accept agreement and Click scan
    • This application may trigger a warning from your antivirus. Let the driver load. Wait for it to finish.
    • If it displays any items...don't do anything with them yet. Just hit exit (close)
    • It will drop a log on Desktop that starts with fsbl....big number
    Please attach the BlackLight log.

     
  10. stuart_wildcat

    stuart_wildcat Private E-2

    "You are not ready to face the empire alone young Skywalker..."


    I was able to delete that new file in the drivers folder. I will reboot and be sure everything is gone from recycle bin, etc.

    I ran the Blacklight tool and it didn't find anything. Log is attached.

    Of course at the same time I got a message from the AVG programs I had just installed about the C:\WINDOWS\system32\svchost.exe:exe.exe file being infected. I was able to put it in the AVG "Virus Vault". It lists the infection as 'Trojan horse Generic5.ZOC'.

    I ran the new files and run keys tools again just in case anything else shows up on there.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well that just confirmed that my suspicion was correct.

    Do a file search for svchost (without the .exe) using the below.

    Click Start and select Search
    Now Select "All files and folders"
    Enter the svchost in the "All or part of the file name:" box
    Now select "More advanced options"
    Make sure the following check boxes are checked:
    • Search system folders
    • Search hidden files and folders
    • Search subfolders
    Then click the Search button.

    Tell me what you find! NOTE: DO NOT REBOOT or SHUTDOWN YOUR PC.
     
  12. stuart_wildcat

    stuart_wildcat Private E-2

    I find the following files:


    svchost.exe (14KB) - C:\i386
    SVCHOST.exe-2D5FBD18.pf (27KB) - C:\Windows\Prefetch (this is the most suspicious file to me)
    svchost.exe (14KB) - C:\Windows\system32
    svchost.exe (14KB) - C:\Windows\system32\dllcache
    SVCHOST.EX_ (4KB) - E:\Copy\Win 2000\Root\I386 (This was a copy of a Win 2000 CD I was trying to install on another PC several months ago)


    The file size reported in the AVG Virus Vault is 57.5KB.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What are the file dates on the ones in the below folders also right click on them and select Properties and tell me the exact size in bytes.

    C:\i386
    C:\Windows\system32
    C:\Windows\system32\dllcache
     
  14. stuart_wildcat

    stuart_wildcat Private E-2

    File details:

    C:\i386\svchost.exe - 14,336 bytes, created 5/16/06 (when I got this computer)
    C:\Windows\system32\svchost.exe - 14,336 bytes, modified 8/1/07 1AM (this is about the time of original infection)
    C:\Windows\system32\dllcache\svchost.exe - 14,336 bytes, modified same as above

    The first file lists a modified time of 8/4/04.
    The last two files list a creation time of 8/11/04.

    I'm concerned about the modified time of the last two files.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes and that is why I was just double checking the date. After AVG said it put them in the vault, I was still concerned because of the dates I had seen earlier in your log and also because of the fake service showing C:\WINDOWS\system32\svchost.exe:exe.exe

    Do you have your Windows XP bootable CD?
     
  16. stuart_wildcat

    stuart_wildcat Private E-2

    Yes, I have the Dell reinstallation CD that came with the laptop. It is Win XP SP 2.

    I can see online various tips about how to extract a system file from the Windows CD and I assume that is where we are going. I also see from the Microsoft documentation that you can do this in a regular boot session or from the recovery console.

    I assume we might need to do this from the recovery console since svchost.exe is loaded on startup but I will wait for further instructions. I don't want to make blind changes that might only break something worse ;) My laptop is definitely in a better state than 24 hours ago.
     
    Last edited: Aug 3, 2007
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes we need to do this from the Recovery Console. You can either copy the svchost.exe from the c:\i386 folder or from the i386 folder on the CD. Using the one in C:\i386 may be easier since it is already uncompressed. You would have to copy it into both the C:\windows\system32\dllcache and C:\windows\system32 folders to overwrite both potentially infected versions.

    Do you know how to do the above or do you require detailed instructions?
     
  18. stuart_wildcat

    stuart_wildcat Private E-2

    I have the directions from Microsoft Support.

    Right now I want to let the AVG virus test run to completion since I have already spent 10 hours on it. Don't want to start over.

    I will post back how it goes.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay if you need specific directions let me know. In outline form it is basically.

    • boot to the recovery console
    • when you get to the command prompt copy the good svchost.exe file from c:\i386 to both folders mentioned.
    • if you opt to use the file on your CD and MS's directions you will need to use the expand command to uncompress the svchost.ex_ file into the folders. You will again have to do it twice.
     
  20. stuart_wildcat

    stuart_wildcat Private E-2

    I was able to expand the svchost.exe file from the Windows CD into the two locations. I could not copy from the C:\i386 folder as the recovery console in XP denies access to all but a few folders.

    The only thing that is odd to me is the time that is listed for the files in Windows explorer now. The created and modified times both seem to be about 5 hours earlier than I expected. The only thing I can figure is when I was viewing file details in the recovery console it was not making adjustments for my time zone.

    The created time is listed as 5 hours before when I actually expanded the files. The modified time is listed as 5 hours before the time that was given in the recovery console.

    Of course none of the times involved are from when I first obtained the infection on 8/1 so I am OK with that. The time zone difference is a way to explain it and is somewhat of an interesting thing to learn.

    I have attached logs of HJThis, RunKeys, and ShowNew after expanding the svchost.exe file. I see nothing that sticks out but let me know if you notice anything.

    I have read some of the other posts and I hope I have been at least a little more knowledgable than others that come on this site looking for help. I have learned a lot through this and can't say thank you enough times. I can now leave for my next software training trip with a working computer!
     

    Attached Files:

  21. stuart_wildcat

    stuart_wildcat Private E-2

    Any thoughts on how to permanently remove the 'ICF' service we identified earlier?

    I would hate to have something sitting there that might reinfect me if I accidentally enable the service because I forget what it is.

    I would like to include that along with some other clean up work I am going to do.
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Good job! I would not worry about time differences in the files. The important thing is that the ones from 8/1 were replaced.

    They are clean.

    Yes you have done just fine and it has been easier than with some users. You're welcome.
     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The below my find and remove it if it is still in the registry.


    1. Download this file - combofix.exe
    2. Double click combofix.exe & follow the prompts.
    3. When finished, it will produce a log ( C:\combofix.txt ) for you. Attach this log to your next reply
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.
     
  24. stuart_wildcat

    stuart_wildcat Private E-2

    Attached is the combofix log. Also mentioned quarantined files so I attached that also.
     

    Attached Files:

  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay as I suspected, it found and removed ICF.


    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix, you can delete the ComboFix.exe file, C:\ComboFix folder, C:\QooBox folder, C:\WINDOWS\nircmd.exe, and the C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used SmitFraudFix, you can delete all files and folders related to it now including the c:\rapport.txt log.
    5. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    6. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    7. If we had you run Avenger, you can delete all files related to Avenger now.
    8. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    9. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    10. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    11. After doing the above, you should work thru the below link:
     
  26. stuart_wildcat

    stuart_wildcat Private E-2

    Confirmed, no more ICF service.

    I am still doing some cleanup which includes uninstalling some programs and deleting unneeded files. When running my first virus scan after getting control again I noticed files that I no longer need that were just slowing down the scan.

    I also need to disable/enable system restore but I have the directions for that.

    Thanks again! In the future when I have problems (hopefully never) I will come here to search first instead of Google! :major
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I guess you did not complete my last instructions yet! This was step 10. ;)

    You're welcome. Surf safely.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds