ZeroAccess cannot run TDSKiller or MBAB Redirecting Issues

Discussion in 'Malware Help (A Specialist Will Reply)' started by nyt, Sep 23, 2012.

  1. nyt

    nyt Private E-2

    Helping a friend cleanup his computer.

    I ran RoguKiller and the log is attached. RogueKiller was only run once but it had been run last month for a prior infection.

    I know I am supposed to attach all logs but I cannot run TDSKiller. I tried renaming to several .exe and .com names. It will not run.

    Already had Malware Antibytes installed but it would not update. Error about Program Update Error 1812. So I tried a clean install and get an Access Denied Error. When it rolled back setup Malware Antibytes had been removed from the system.

    The other three logs are attached.

    Thanks!
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download OTL to your desktop.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:


    • [HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
      [HJPOL] HKLM\[...]\Wow6432Node\System : DisableRegistryTools (0) -> FOUND
      [HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
      [HJ] HKLM\[...]\Wow6432Node\System : EnableLUA (0) -> FOUND
      [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
      [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
      [SHELLSPWN] HKCU\[...]\command : ("%1" %*) -> FOUND
      [SHELLSPWN] HKUS\S-1-5-21-996898381-1273632286-416286822-1000[...]\command : ("%1" %*) -> FOUND
      [SHELLSPWN] HKCR\[...]\command : ("%1" %*) -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.

    Now click the Files/folders tab and locate these detections:


    • [ZeroAccess][FILE] n : C:\$recycle.bin\S-1-5-18\$07e6bb9c83fba767df5ef9239a68591c\n --> FOUND
      [ZeroAccess][FILE] n : C:\$recycle.bin\S-1-5-21-996898381-1273632286-416286822-1000\$07e6bb9c83fba767df5ef9239a68591c\n --> FOUND
      [ZeroAccess][FILE] @ : C:\$recycle.bin\S-1-5-18\$07e6bb9c83fba767df5ef9239a68591c\@ --> FOUND
      [ZeroAccess][FILE] @ : C:\$recycle.bin\S-1-5-21-996898381-1273632286-416286822-1000\$07e6bb9c83fba767df5ef9239a68591c\@ --> FOUND
      [ZeroAccess][FOLDER] U : C:\$recycle.bin\S-1-5-18\$07e6bb9c83fba767df5ef9239a68591c\U --> FOUND
      [ZeroAccess][FOLDER] U : C:\$recycle.bin\S-1-5-21-996898381-1273632286-416286822-1000\$07e6bb9c83fba767df5ef9239a68591c\U --> FOUND
      [ZeroAccess][FOLDER] L : C:\$recycle.bin\S-1-5-18\$07e6bb9c83fba767df5ef9239a68591c\L --> FOUND
      [ZeroAccess][FOLDER] L : C:\$recycle.bin\S-1-5-21-996898381-1273632286-416286822-1000\$07e6bb9c83fba767df5ef9239a68591c\L --> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    :killallprocesses
    :files
    C:\Users\Kirk Hilliard\AppData\Roaming\Microsoft\Windows\Templates\155wms54cnfu2bkr4nj0p7k274t2h016fddb37a241ws0
    C:\Users\Kirk Hilliard\AppData\Roaming\Microsoft\Windows\Templates\8ua16sbfju06
    C:\ProgramData\-QRa0mKkYokp2uK
    C:\ProgramData\-QRa0mKkYokp2uKr
    C:\ProgramData\QRa0mKkYokp2uK
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.


    Reboot.
    Now re-run RogueKiller and attach the new log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:

    • C:\MGlogs.zip
     
  3. nyt

    nyt Private E-2

    TimW -

    Thank you.

    Attached are 2 RogueKiller logs. First one was generated after deleting items you told me to check. Second one was generated after running the OTL fix and rebooting (twice see below).

    UAC was disabled but after running OTL it was re-enabled so I disabled it and rebooted. Then reran RogueKiller and MGTools.

    Noticed that I am still infected with MBR. Eagerly awaiting further instructions.

    Thanks again!
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please also download MBRCheck to your desktop

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...

    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:

    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message.
     
  5. nyt

    nyt Private E-2

    MBRCheck Log is attached.

    Thanks!
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Do you have your Vista install disc?
     
  7. nyt

    nyt Private E-2

    Unfortunately not. Do I have to try to contact Dell to order them?

    Thanks.
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Vista and Win7 Recovery disc It costs $9.

    To run the Bootrec.exe tool, you must start Windows RE. To do this, follow these steps:

    1. Put the Windows Vista or Windows 7 installation disc in the disc drive, and then start the computer.
    2. Press a key when you are prompted.
    3. Select a language, a time, a currency, a keyboard or an input method, and then click Next.
    4. Click Repair your computer.
    5. Click the operating system that you want to repair, and then click Next.
    6. In the System Recovery Options dialog box, click Command Prompt.
    7. Type Bootrec.exe /fixmbr, and then press ENTER.

    Then re-run MBRCheck.
     
  9. nyt

    nyt Private E-2

    The Operating System is not being detected so I cannot select it. It tells me to insert the drivers CD but when I do it does not automatically identify the appropriate drivers.

    My friend actually had the original Vista install disk so that is what I am trying to use.

    I am trolling the internet for any clues about how to handle this situation.

    Thanks.
     
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please download mbr.exe and save it to the root directory, usually C:\ <- (Important!).

    * Go to Start > Run and type: cmd.exe
    * press Ok.
    * At the command prompt type: c:\mbr.exe >>"C:\mbr.log"
    * press Enter.
    * The process is automatic...a black DOS window will open and quickly disappear. This is normal.
    * A log file named mbr.log will be created and saved to the root of the system drive (usually C:\).
    * Copy and paste the results of the mbr.log in your next reply.

    If you have a problem using the command prompt, you can just double-click on mbr.exe to run the tool.

    OK now..
    Open Windows Explorer and rename the C:\mbr.log to C:\mbr.old
    Go to Start > Run and type: cmd
    press Ok.
    At the command prompt, type: cd \
    press Enter.
    At the command prompt, type: mbr.exe -f
    (make sure you have a space before the e and the -f)
    press Enter.
    At the command prompt, type: exit
    press Enter.

    It will produce a new report at C:\mbr.log. Please copy/paste the results in your next reply.

    Reboot,very important.
     
  11. nyt

    nyt Private E-2

    Here are the results from running mbr.exe>>mbr.log

    -----------------
    Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
    Windows 6.0.6001

    device: opened successfully
    user: error reading MBR
    error: Read The handle is invalid.
    kernel: error reading MBR
    ----------------------------

    Rebooting now. Thanks.
     
  12. nyt

    nyt Private E-2

    After reboot. Re-ran mbr.exe and it showed the same results shown in the log from my prior post. Seems the -f option did not fix the issue?
     
  13. nyt

    nyt Private E-2

    I think I have the TDSS Fake Partition virus. Disk Management shows a 1MB active partition with no drive letter assigned.
     
  14. nyt

    nyt Private E-2

    I followed the instructions at another site to remove the tdss fake partition.

    1. Used Acronis Disk Director to delete 1MB partition
    2. Used Vista Recovery to do the following
    a. bootrec \fixmbr
    b. bootrec \fixboot <-- Errored out.
    c. Used diskpart to set the windows partition to active
    d. reran bootrec \fixboot <-- Now ran successfully and can boot into Windows


    I then successfully ran TDSKiller.exe. It did not find anything.

    But, when I ran mbr.exe my log still looks bad
    ----------------------
    Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
    Windows 6.0.6001

    device: opened successfully
    user: error reading MBR
    error: Read The handle is invalid.
    kernel: error reading MBR
    ----------------------------

    Thanks!


    EDIT: Just realized that if mbrfix works like fixboot, I still have to run fixmbr. Going to go run that once again and then rerun mbr.exe. May update this post again.

    Thanks!
     
  15. nyt

    nyt Private E-2

    Still same log results when running mbr.exe.

    Attached is a rerun of mbrcheck.exe. There is another 15MB partition with drive letter V. I do not recall seeing it there before. Not sure if that might be another TDSS Fake Partition.

    Still cannot install MBAM. Get an Access Denied error.
     

    Attached Files:

    Last edited: Sep 23, 2012
  16. nyt

    nyt Private E-2

    I had a brainfart. The V partition is 55MB and may have been there. Looks like it has a set of Dell diagnostic tools. Maybe it was hidden before I messed around.

    Got Malware Antibytes to install. Used Revo Uninstaller to clean out old versino and reinstalled fresh. Ran it and Log came back clean. I attached just in case.

    IE is still redirecting. Not sure what do to next.

    Thanks.
     

    Attached Files:

  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    So far, you have done excellent. Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * C:\MGlogs.zip
     
  18. nyt

    nyt Private E-2

    Ran GetLogs.bat twice. I ran it a second time because I never saw the HiJackThis prompts. I still did not see them the second time and I sat here in front of the computer to make sure.
     

    Attached Files:

  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Attached is bfe.zip

    Inside is:



    Extract bfe.reg to your desktop.
    Double-click bfe.reg and allow it to merge into the registry. If you get a "successfully merged into registry" type of message, reboot your PC and see if you can turn on BFE, or if it is already turned on.

    You can run these commands from the command prompt.

    • net start bfe
    • sc qc bfe
     
  20. nyt

    nyt Private E-2

    Merged the registy entries and rebooted.

    When I tried to start BFE it said

    ------
    The Base Filtering Engine service could not be started.
    A system error has occured.
    System error 5 has occurred.
    Access is denied.
    ---------------

    When I ran "sc qc bfe" it did a successful query. Let me konw if you need me to type in the results from that query. I was not able to copy from the command prompt.

    Thanks!
     
    Last edited: Sep 25, 2012
  21. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Go to start / run / type in:
    services.msc
    When the window opens, scroll down to the Base Filtering service and tell me what it is set to.
     
  22. nyt

    nyt Private E-2

    The BSE Service is set for Startup Type Automatic. It is not started.
     
  23. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Set it to manual and then do the fix again.
     
  24. nyt

    nyt Private E-2

    Set the BFE Service to Manual.

    Rebooted. Reran the BFE.reg. Opened Command prompt and tried to start BFE Service.

    Same results. System Error 5. Access is denied.

    Update: I checked the Services again and the BFE Service was set back to Automatic. Looks like it happened when I reran bfe.reg. I am positive I set it to Manual. Going to repeat again just in case.

    Just reset BFE Service back to Manual. Reopened Services to verify. Did not rerun bfe.reg. Rebooted. Tried to Start BFE services. Same errors.
     
    Last edited: Sep 25, 2012
  25. nyt

    nyt Private E-2

    Got BFE Started.

    Followed these instructions to get it running.

    Use Regedit and goto key HLKM\SYSTEM\CurrentControlSet\services\BFE\Parameters\Policy key, and modifying the Permissions on the key to add a user “NT Service\BFE” and give it Full Control.
     
  26. nyt

    nyt Private E-2

    Update to BFE Fix using better instructions.

    Run regedit:
    1. Browse to the location for the BFE service in the registry (HKLM\System\CurrentControlSet\Services\BFE\Parameters\Policy), right click and select permissions. (note: HKLM is short for HKEY_LOCAL_MACHINE_
    2. In the “Permissions for Policy” window, click advanced | Add.
    3. Once the “Select Users, Computers or Group” box appears, change the “From this location:” to point to the local machine name.
    4. After changing the search location, enter “NT Service\BFE” in the “Enter the object name to select” box and click “Check names” – this will allow you to add the BFE account.

    5. Give the following privileges to the BFE account:
    Query Value
    Set Value
    Create Subkey
    Enumerate Subkeys
    Notify
    Read Control

    After adding the BFE account to the registry key, please try to start the Base Filtering Engine service.
     
  27. nyt

    nyt Private E-2

    Noticed the Security Center Service was also missing. Followed another forum's instructions to download the appropriate missing registry entries. Rebooted and it is back and running.

    Still cannot get Windows Firewall or Windows Defender running. Just installed Microsoft Security Essentials so I believe I do not need Windows Defender. Still poking around for a fix on the Firewall Issue.

    Thanks!
     
    Last edited: Sep 25, 2012
  28. nyt

    nyt Private E-2

    Windows Firewall is now running. Followed same procedure as BFE.

    Imported Registry Keys for mpssvc and sharedaccess.

    Gave mpssvc account same privileges as described in BFE post below in SharedAccess registry key.

    That allows me to start Windows Firewall.

    What do I do now to see what else needs to be done?

    Thanks again for your help TimW!!
     
  29. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You should be good to go now.
    You are most welcome.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds