Stealth Trojan

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by EcoGeek, Aug 26, 2011.

  1. EcoGeek

    EcoGeek Private E-2

    Ok This is rather complicated and I don't know if I should post here or MS but it has to do I think with with Outlook being compromised and causing a stealth trojan. There is a issue with Outlook and the preview screen in which a trojan can be embedded in email message and if you have the preview screen open, it can run a trojan hooked to one of the add in modules that do not need a dll to run and then runs the dll script embedded in the message.

    Whenever an email message is clicked on, it immediately launches Firefox and tries to go out to a server on the net. In explorer viewer, my cpu goes up to 80% and I get a notice from Google about too much data coming from my computer and ask to enter word in captura to make sure I am not a robot. If I close outlook, the computer still operates at high cpu with a large number of svchosts file. When I see svchost file generating a large amount of cpu, I click on properties remove the unknown account and kill the process. This happens 2 or 3 times, and then everything is normal until I open Outlook again and view a message.

    It changes my hosts file from 346k to over 1000k and puts a file called icalendar from Outlook 1K into my hosts directory.

    It changes my security policies, turns on show all folder info, I have unknown account names logged on to many svchost.exe processes with anonymous logon service to RPC and Restricted Logon. My network service has a password logon which I didn't input.

    It hooked into some kernel and memory modules and deleted or took over my recovery partition and wiped out my restore points. It disabled real time protection on my malware software.

    Winpatrol service module lists strange services which when Google states they are stealth trojans. Yikes, I don't know if it would be easier at this point just to format the hard drive again except I don't make a recovery disk.
    My thoughts are that my computer has been taken over and they are going out to a proxy server through my hosts file.

    All scans to date show nothing. I took screen shots of all the problems.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    We still need the following logs:
    RootRepeal --- if it runs
    ComboFix
    C:\MGLogs.zip


    Malware detected in email databases has to be cleaned up by you. You have a few choices:

    1. delete the whole file which is not an option you normally want to use
    2. load the email folder that contains the infection and delete ALL unnecessary emails (hoping to remove the problem email) and then use the Mailbox Cleanup option to delete all old emails. Then compact the Outlook database to permanently remove data. See http://support.microsoft.com/kb/291645 If you do not cleanup and compact the databases, the deleted emails may still be leaving hidden information in the database that you just cannot see but a scanner may still pickup on it.
    3. create a new folder and move only emails you really need into the new folder and then delete the infected folder.
     
    Last edited: Aug 26, 2011
  3. EcoGeek

    EcoGeek Private E-2

    Rootrepeal gives me a memory exception error and will not run
     

    Attached Files:

  4. EcoGeek

    EcoGeek Private E-2

    I understand about the email database and will delete it. Could it have migrated to any other processes or programs?
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please Disable Spybot's TeaTimer --> Should have been done as per the R&R instructions!

    * Run Spybot and click Mode
    * Select Advanced Mode.
    * Then click Tools and select Resident.
    * Now in the right window pane, uncheck TeaTimer.
    * Also while this is open, in the left column now select IE Tweaks
    * and then in the right pane make sure all the Miscellaneous locks are unchecked.
    * Now quit Spybot!

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    Driver::
    MEWQYPZEUQRX
    SVKMEQV
    TVSGIQTUGSI
    XHVIIOCAY
    YFAGR
    
    File::
    c:\users\HANNSP~1\AppData\Local\Temp\MEWQYPZEUQRX.exe
    c:\users\HANNSP~1\AppData\Local\Temp\SVKMEQV.exe
    c:\users\HANNSP~1\AppData\Local\Temp\TVSGIQTUGSI.exe
    c:\users\HANNSP~1\AppData\Local\Temp\XHVIIOCAY.exe
    c:\users\HANNSP~1\AppData\Local\Temp\YFAGR.exe
    C:\Windows\System32\YZZPPSWWDDHXRWZV
    
    FCopy::
    C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_de3024012ff21116\userinit.exe | c:\windows\system32\userinit.exe
    
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below log:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  6. EcoGeek

    EcoGeek Private E-2

    Sorry about that on the spybot. I appreciated your help in correcting this problem although I am at the state of going to a Mac.

    Is it possible to determine where and when this infection occurred. The reason I ask is that this problem occurred after I visited a friend and used their IPS through their home/office wireless router. After that, everytime this person sent me an email, I would have this problem. Was a program downloaded to my computer to be able to read my email or take control of my computer or observe what I was doing as I believe I got infected maybe from logging in on this person's home router and got the infection through their computer or email. Just wondering...

    Ok, I copied the text and saved it on my desktop and then dragged it over to Combofix which then immediately launched. It said it needed to update to a new version which it did but I did not drag the txt box over it again figuring Combofix would know this already. After awhile it rebooted the system and I logged in. I forgot to turn off Avira and Mbam after restart until Avir notified me, then I exit out of Mbam and Avira and Combofix continued. I hope I didn't mess up the file.

    THANKS!
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I don't think you were infected by using your friends router, more likely it was from an infected email. I hope you have cleaned out your inbox and removed any suspicious emails.

    Your logs are clean. What issues are you still having, if any?
     
  8. EcoGeek

    EcoGeek Private E-2

    Under proexplorer even though I have admin rights it will not allow to view some processes using svchost. Network service to a number of processes has a logon screen which I have no idea whether that is a system generated password or not. I have unknown account? SID linked to anonymous logon,Everyone, restricted, trusted installer have Full Control. I get invalid certificate to RPC under windows secure server authority

    Is there a way to reset the security policies back to default as I fear they may have been compromised. I am not a windows expert by any stretch of the means so I don't know if this is normal full these accounts to be connected to svchosts with full control. I don't know what to do about all these unknown account? sids under different svchost processes.

    I just don't understand how Mbam, Winpatrol, Avira, Spybot, SAS, and under user control it is set to always notify bar being at the top and how all these scans failed to pick this stealth trojan up? It operates using services, hosts files and some other programs to by pass the system 32 dll but the exe in the reg files should have been picked up. Any ideas? That is why I don't think windows could ever be a secure system.
     

    Attached Files:

  9. EcoGeek

    EcoGeek Private E-2

    I also have WinPatrol on here as well.
    Under services in WinPatrol it shows a list and one of them is unusual.
    APPSMGTS svchosts.exe APPSMGTS.dll as though the two are bound some how but unlike the other services listed it does NOT show the company, status, startup, or when it is first detected. Is this normal?

    Thanks for all your help.
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Normal. It is part of Windows. See: http://www.bleepingcomputer.com/startups/appmgmts.dll-25615.html

    Network Service account is not for your use. It is for Windows. See: http://msdn.microsoft.com/en-us/library/ms684272(v=vs.85).aspx

    You need to stop snooping around before you break something. Just tell Tim if you are having any problems.
     
  11. EcoGeek

    EcoGeek Private E-2

    I don't know yet. I have to wait and see if it regenerates itself. Can't figure out how it bypassed WinPatrol as I had the registry keys locked down by WinPatrol. I'll contact them. Thanks for your support.
     
  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let us know if you continue to have malware issues.


    In the meantime:

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0

    Help Support MajorGeeks
    Buy Discounted Software @ Majorgeeks Store. Giveaways Too!

    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     
  13. EcoGeek

    EcoGeek Private E-2

    Thanks for all your help. Is it possible to pm a moderator? All my ant-virus, anti spyware and malware are purchased products with real time protection. The only thing that is unusual is these hidden files that WinPatrol indicates may be suspicious. Is there a donation page some where on this site through Paypal?

    Thanks
     

    Attached Files:

  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not finding any info on those files. Can WinPatrol quarantine them to see if it effects your system in any way?

    You are most welcome. We don't do Paypal, but you are more than welcome to purchase geek wear which I linked you to in the last post. ;)
     
  15. EcoGeek

    EcoGeek Private E-2

    Yes Win Patrol isolated them
    Thanks for all your help
     
  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds