Trojan Horse Downloader Generic9.CAXD infection

Discussion in 'Malware Help (A Specialist Will Reply)' started by cactoctin, Jul 6, 2010.

  1. cactoctin

    cactoctin Private E-2

    Hi,

    I've a Sony VAIO laptop running Windows XP and AVG Free 9.0. I normally use Firefox as my browser. On June 13th, my computer started displaying ads periodically (around 30 minute period) using Internet explorer. When I investigated, I found that my AVG had found "Trojan Horse Downloader Generic9.CAXD" in my SMSS.EXE and SERVICES.EXE. When I told AVG to nuke 'em, it replied "object inaccessible". The path name for the infected files pointed to the System Volume Information folder which is unavailable to the uninitiated. I'm an electrical engineer with a substantial software background but I don't count myself as knowledgeable about the innards of Windows and I'm a real newbie on viruses and malware.

    I talked with my company's IT people. The recommendation was to download Spybot, Malwarebytes, and other tools until I found one that would take care of it. The one that seemed to handle it was Trend Micro's Housecall. I thought I'd successfully nuked it several times but it always came back. Over the weekend, another behavior started - new IE windows popping up about once a second keeping me from doing anything on my computer. So I did some more research and found your forum.

    I have followed all of the instructions in your stickies. Everything went smoothly until I tried to run MGTools. It hung (and my computer with it) on the first DOS-like window. I still have the problem where periodically IE opens with an ad. The machine gun IE behavior has not occurred since completing your instructions an hour or so ago. Attached are the logs. I was unable to find a txt file log with the name SASlog.txt nor RRlog.txt. I attached the files that seemed to be the log files for the particular application.

    Looking forward to your guidance - this is way outside my experience.

    Thanks!
     

    Attached Files:

  2. cactoctin

    cactoctin Private E-2

    And here are the text files I found in the MGtools\temp folder. I used 7-zip to zip them into two separate zips because of the 2MB file limit.

    Thanks!
     

    Attached Files:

  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You have zipped the wrong files. There was no need for you to zip anything yourself because all we requested from you was the:

    C:\MGlogs.zip

    Without seeing that I cannot issue you with a complete fix so please attach it in your next reply. :)

    Thanks
    Kes.
     
  4. cactoctin

    cactoctin Private E-2

    In my first post, I mentioned that MGtools seemed to hang on the first screen. After about 2 hours, I ended up turning the computer off since the computer wouldn't respond to anything (even ctrl-alt-del). So there wasn't a zip file to append - just a bunch of files in the MGtools\temp folder. How long should it take? Did I pull the plug too soon?

    Shall I re-run the MGtools? Or the entire sequence?

    AVG is reporting the same infection on smss.exe and services.exe in the System Volume Information folder. Again, it failed to remove them - object inaccessible.

    Thanks for your help!
     
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • Download bootkit_remover.rar
    • Click the underlined DOWNLOAD text to download the file and save it to your Desktop.
    • You then need to extract the remover.exe file from the RAR using a program capable of extracing RAR compressed files. If you don't have an extraction program, you can use7-Zip
    • After extracing remover.exe to your Desktop, double click the remover.exe file to run the program.
    • Attach or post inline here, the output from remover.exe
     
  6. cactoctin

    cactoctin Private E-2

    Bootkit Remover version 1.0.0.1
    (c) 2009 eSage Lab
    www.esagelab.com

    \\.\C: -> \\.\PhysicalDrive0
    MD5: a7ca3eec9d6704da288f70e85abbfb86

    Size Device Name MBR Status
    --------------------------------------------
    298 GB \\.\PhysicalDrive0 Unknown boot code

    Unknown boot code has been found on some of your physical disks.
    To inspect the boot code manually, dump the master boot sector:
    remover.exe dump <device_name> [output_file]
    To disinfect the master boot sector, use the following command:
    remover.exe fix <device_name>

    Press any key to quit...

    --------------------

    Output from the bootkit remover program above.

    Thank you so much!
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do you have all important data backed up? You really should do this before continuing since we will need to rewrite your MBR to fix this and while most times this can be done without any problem, these infections can react badly and that could result in a PC not being bootable. We have used this fix many times without a problem but there is always a risk. You really don't have much choice though since these infections are too dangerous to your security to leave on a PC.


    Also note if you have a Dell PC which uses a non-standard MBR, fixing the mbr may prevent access the the Dell Restore Utility, which allows you to press a key on startup and revert your computer to a factory delivered state. There are a couple of known fixes for said condition, though the methods are somewhat advanced. If you are unwilling to take such a risk, you should not continue but you risk serious problems leaving this infection in place and thus your only other option would be to try using the Dell Restore Utility to return a factory ship state which will remove everything you additional you have put onto the PC.


    Now if you wish to try to fix this and have observed the above warnings and have backed up important data, please do the following:
    • Click Start, Run then copy and paste the below into the Run box and click OK.
    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0
    • Now reboot your PC and after reboot continue with the below instructions.
    • Disable System Restore on all drives.
    • Look for the below folder and if if it sill exists, delete it.
      • C:\System Volume Information\Microsoft
    • Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

      Then attach the below logs:
      • C:\MGlogs.zip
    Make sure you tell me how things are working now! You do have some other infections besides the MBR infection that need to be fixed.
     
  8. cactoctin

    cactoctin Private E-2

    I backed up everything several days ago so I am ready to proceed.

    Is there any possibility that my backups are compromised by any of my infectious diseases? They are data file backups (made the simple brute force way of copying folders to a portable drive) not an image copy of my drive.

    How do I delete c:\System Volume Information\Microsoft ? Whenever I click on the c:\System Volume Information folder, I get the error dialog box "C:\System Volume Information is inaccessible. Access is denied."

    Thanks!
     
  9. cactoctin

    cactoctin Private E-2

    I did the following:

    Click Start, Run then copy and paste the below into the Run box and click OK.
    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0​


    The first time I did this I got the following error dialog box with a title bar labelled "C:\Documents":
    Windows cannot find 'C:\Documents'. Make sure you typed the name correctly, and then try again. To search for a file, click the start button, and then click Search.

    This didn't make any sense to me at all. In hindsight, I probably should have stopped there and asked for guidance. But, I repeated the command as specified. This time I got a DOS style window with the version of the bootkit remover version and copyright info with a popup box warning asking me if I wanted to proceed and asking if I would allow it to reboot the machine immediately after the disinfection. I told it to proceed and allow the immediate reboot.

    It seemed to immediately reboot. I don't know how long the remover activity normally takes but I got the Windows splash screen immediately. And I've been staring at that since about 2am. The Cylon style progress bar is still moving.

    I haven't any ideas at all about what to do now. Is this recoverable?

    Thanks!
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Power down the PC for a couple minutes and see then see if you can boot into normal mode. If normal boot mode does not work, first try safe boot mode and if that does not work try booting to Last Known Good Configuration.


    Not sure. It's possible you had a non-standard type boot record on your PC.

    Do you have your Windows XP Professional boot CD?
     
  11. cactoctin

    cactoctin Private E-2

    Sony doesn't give you the CDs - it's all in the disk partition. I could borrow a set from my lab at work.

    It appears to have booted normally on the first try.

    A dialog box just appeared "System Settings Change". "Windows has just finished installing new devices. The software that supports your device requires that you restart your computer. You must restart your computer before the new settings will take effect. Do you want to restart your computer now?"

    Should I restart?
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes!
     
  13. cactoctin

    cactoctin Private E-2

    It's back up.

    Thanks!
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to attach the requested new MGlogs.zip file. See the last fix.

    Also are you having any more malware problems.
     
  15. cactoctin

    cactoctin Private E-2

    I disabled the System Restore and then started the GetLogs.bat program. It ran through some things and then, while running analyse.exe a dialog box appeared asking me to allow it to report a HijackThis error:

    An unexpected error has occurred at procedure: modRegistry_InGetString(sFile=system.ini, sSection=boot, sValue=Shell)
    Error #5 - Invalid procedure call or argument

    Windows version: Windows NT 5.01.2600
    MSIE Version 6.0.2900.2180
    HijackThis version: 2.0.4


    Next step?
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just ignore it and continue.
     
  17. cactoctin

    cactoctin Private E-2

    Here's the log.

    As for any other virus behaviors, the computer's only been on for about an hour. Haven't noticed anything yet but I've thought it was gone before and been wrong. :(

    Thanks!
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay let's double check what your MBR looks like now.
    • Double click the remover.exe file on your Desktop to run the scan part of the program.
    • Attach or post inline here, the output from remover.exe.
    NOTE: The Command Prompt window text can be copied to the clip board by right clicking on the top bar of the window and using the Edit commands to Mark, Copy, and Paste.
    I see some items from Symantec in your logs but you are using AVG for an antivirus. Do you have anything else from Symantec/Norton still installed?
     
  19. cactoctin

    cactoctin Private E-2

    Bootkit Remover version 1.0.0.1
    (c) 2009 eSage Lab
    www.esagelab.com

    \\.\C: -> \\.\PhysicalDrive0
    MD5: 6def5ffcbcdbdb4082f1015625e597bd

    Size Device Name MBR Status
    --------------------------------------------
    298 GB \\.\PhysicalDrive0 OK (DOS/Win32 Boot code found)


    Press any key to quit...
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That looks good.


    You did not answer my question about Symantec.
     
  21. cactoctin

    cactoctin Private E-2

    I missed the question on Symantec.

    Sony shipped the laptop with Norton anti-virus and I bought it again one year. But I didn't like how slow my machine ran so when my hard drive died last September, I decided to use something else. But, a trial subscription to Norton is part of the Sony base installation bloatware. When you rebuild your OS, it gets installed again. I tried to get rid of it but I must not have found all the pieces.

    You mentioned in one post that I have more viruses than the Trojan. Did the Bootkit Remover take care of them, too? Which other viruses? I've tried to research the Trojan / Black Internet malware but there's almost nothing other than people fighting it. What's the point of this one?

    Thanks!
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes I did but some questionable items turn our to be part of Protector Suite that you are using and I needed an answer on the Symantec stuff to work up a complete next procedure. So we are almost finished. ;)

    I've tried to research the Trojan / Black Internet malware but there's almost nothing other than people fighting it. What's the point of this one? [/QUOTE] Like most MBR infections the end goal may be to steal personal information; however, all of what it does has not been determined yet. Right now all most people know is that it is a major nuisance but I expect more is going on than just the nusiance aspects.


    Please run the below then reboot. After reboot run it one more time.

    Norton Removal Tool (SymNRT)


    Now we need to use ComboFix to DeQuarantine some files
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it has expired or need to be updated to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now also delete all files and subfolders in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Documents and Settings\Susan\Local Settings\Temp


    Now run Ccleaner. Only use the Run Cleaner button. Do not run anything else on any other forms.


    Now if you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  23. cactoctin

    cactoctin Private E-2

    Just now, as I was downloading the Norton removal tool, AVG popped up its Alert screen - the Trojan Horse Downloader Generic9.CAXD on the C:\System Volume Information\services.exe is back.

    Should I proceed with the Norton removal or should I go back and repeat some steps?

    Thanks!
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do my last fix up to and including CCleaner, but instead of running the final steps, do the below so we can see if it is really a return of the infection or just a detection of the previous infection that is really left over in system restore.

    • On your Desktop, double click the remover.exe file to run the program.
    • Attach or post inline here, the output from remover.exe
    NOTE: The Command Prompt window text can be copied to the clip board by right clicking on the top bar of the window and using the Edit commands to Mark, Copy, and Paste.


    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7, make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )


    Now attach the below log:
    • C:\MGlogs.zip
     
  25. cactoctin

    cactoctin Private E-2

    Bootkit Remover version 1.0.0.1
    (c) 2009 eSage Lab
    www.esagelab.com

    \\.\C: -> \\.\PhysicalDrive0
    MD5: 6def5ffcbcdbdb4082f1015625e597bd

    Size Device Name MBR Status
    --------------------------------------------
    298 GB \\.\PhysicalDrive0 OK (DOS/Win32 Boot code found)


    Press any key to quit...
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You are still clean. Complete all of the final instructions in message number 22 before worrying about anything reported by AVG. After finishing 100% of those instructions, if AVG still reports something, attach a log from AVG that shows exact what and where.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds