I'm back here again.

Discussion in 'Malware Help (A Specialist Will Reply)' started by PCneedsHelp, Apr 16, 2007.

  1. PCneedsHelp

    PCneedsHelp Private E-2

    :eek:

    So I was looking for more fun programs that I could install on my PC and I forgot to look at the site in cached mode from Google first...then I got infected.

    I think I got rid of Smitfraud-C, Wincom32, and ntos.exe using Killbox and Spybot.
    I know that I have Peacomm because Blacklight found the windev-peers.ini file.

    In order for me to open Windows Explorer, I have to run Spybot and let it fix the FirewallBypass each time I boot into Windows or else I get a BSOD with a memory dump.

    The only program that wouldn't finish was Activescan which froze at the same file it always freezes at but Activescan did find 1 instance of spyware and 2 instances of hacking tools or rootkits.

    I think the best thing to do would be to reinstall XP but I'm just wondering if I can save a few files onto a CD-R or flash drive without bringing the infections along.
     

    Attached Files:

  2. PCneedsHelp

    PCneedsHelp Private E-2

    These are the other two logs.
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Use pocketKill box to delete these:
    C:\WINDOWS\TEMP\HSB6D.EXE-> unless you know what this item is!
    C:\WINDOWS\ua2.dll

    Please download and install: Registrar Lite - be sure you select a Majorgeeks download link and not the Authors!

    Run Registrar Lite navigate to each of the following keys (one at a time) and take ownership of them (I explained how to do that further down).

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINCOM32]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINCOM32\0000]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINCOM32]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINCOM32\0000]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_WINCOM32]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_WINCOM32\0000]

    To take ownership of the key do the following:

    * Copy & Paste the registry key from above into the Address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    * Click-on Security in the top Menu
    * Select Take Ownership
    * Repeat these steps for all of the registry keys given above before continue to the next steps below.
    * Now leave RegistrarLite running and continue
    * Now run the fixME.reg REGISTRY PATCH below in this message.
    * Tell me the results. Any error messages?
    * Now in RegistrarLite click View and then Refresh
    * Now navigate one at a time to each of the above keys we took ownership of to make sure they were deleted.
    * If any of the keys still exist, move on down to PART 2 - Setting Permissions for Everyone below!.


    Here is the Registry Patch

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    After click Edit Permissions , here is what I expect you to see in the Group or user names area of the form:

    Everyone
    SYSTEM

    Select Everyone by clicking on it. Now at the bottom in the Permissions box click the check box for Full Control. The click Apply and then OK to get back to the main Registrar Lite screen. Now right click on the registry key and select Delete. The click View and Refresh. Check to see if the registry key just deleted truly deleted. If so, move on to the next to work thru the whole list. If it does not delete, I want you to boot into safe mode and repeat these exact same steps to see if we can do it from safe mode.

    Then reboot your PC!

    Now run GetRunKey again and attach a new log!
    And a ShowNew log also.
     
  4. PCneedsHelp

    PCneedsHelp Private E-2

    C:\WINDOWS\TEMP\HSB6D.EXE <= This is part of OfficeScan and is a randomized 5-digit .exe file.

    I deleted ua2.dll with Killbox and it doesn't appear to be back.

    I'm going to clean the registry now.
     
  5. PCneedsHelp

    PCneedsHelp Private E-2

    I removed those entries with Registrar Lite (had to set the permissions), rebooted, and ran GetRunKey and ShowNew.

    Also, I found these registry entries which the Peacomm trojan makes.
    Should I remove them using the same process as the previously removed entries or wait until further instruction?

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDEV-27D7-3EA]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDEV-27D7-3EA\0000]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDEV-27D7-3EA\0000\Control]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINDEV-27D7-3EA]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINDEV-27D7-3EA\0000]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINDEV-27D7-3EA\0000\Control]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_WINDEV-27D7-3EA]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_WINDEV-27D7-3EA\0000]
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please download the newest version of GetRunKey (you are 4 versions out of date) from the READ & RUN ME link and attach a new log for Tim!
     
  7. PCneedsHelp

    PCneedsHelp Private E-2

    Oops... :eek:
     

    Attached Files:

  8. PCneedsHelp

    PCneedsHelp Private E-2

    I'm just going to format the drive and reinstall XP since Counterspy found another backdoor. I guess you can close this thread then.

    Thanks for the help.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You don't need to format the PC but that's your choice. I thought that TIm would be back to help you out but he has not been around.

    You will see that the new version of GetRunKey found those other Peacom registry keys. You can fix them using the same type procedure that he gave you with Registrar Lite but just subsitute in these new keys. Do you know how to do that? Or would you like a write up (assuming you still want to fix vs formatting).
     
  10. PCneedsHelp

    PCneedsHelp Private E-2

    I'll give it a try and see if I still have problems.

    Should I be worried about those backdoor trojans installing a backdoor that I wouldn't be able to find? That's why I felt that formatting would be safer.
     
    Last edited: Apr 17, 2007
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not necessarily! Attach a log from CounterSpy if you have it! Anytime you have a malware detection, it is alot more useful to us if you tell us exactly what and where something is being found. And attaching a log that shows it (when possible) is even better. Just saying a backdoor is found is not helpful!

    If you run into a problem deleting the registry keys, let me know. Also be sure to attach a new log from GetRunKey after doing the deletions. This way we can be sure that all keys were removed.
     
  12. PCneedsHelp

    PCneedsHelp Private E-2

    I saved that CounterSpy log and the backdoor should be the last file on the list. The first CounterSpy log also has a backdoor listed. Both were quarantined.

    I edited the registry and it seemed to work. :)

    I posted a new RunKeys and NewFiles.
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Part of the problems you are having are due to the fact that some of the Windows OS files on your PC have become infected. Thus each time you shut down or reboot, you become reinfected. How good are you at using a command prompt window and entering commands to copy and delete files? I can give you detail steps but I want to get a feeling for your knowledge level.
     
  14. PCneedsHelp

    PCneedsHelp Private E-2

    I can do run cmd and type. :eek:

    I've used ipconfig, ping, and tracert many times before.
     
    Last edited: Apr 17, 2007
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! :) Sounds like you are not a DOS expert! :D

    Open a command prompt and try doing the below commands in a command prompt window. If you get an error message basically denying a copy because a file is in use, we will have to do it in safe mode.

    copy C:\WINDOWS\system32\drivers\ndis.sys C:\WINDOWS\system32\drivers\ndis.sys.bak

    copy C:\WINDOWS\ServicePackFiles\i386\ndis.sys C:\WINDOWS\system32\drivers\ndis.sys


    Just try the above and tell me if you get any error messages! becareful to note the spaces! One after the word copy, and one just before the second c:\ on each line!
     
  16. PCneedsHelp

    PCneedsHelp Private E-2

    The first command won't work because it is being used by another process.

    Should I try this in safe mode with networking?
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's what I expected!

    Do it in safe mode with NO networking! Make sure the first command actually works before doing the second one. You can check this by either looking in the C:\windows\system32 folder with Windows Explorer or you could just type the below at the command prompt to make sure both ndis.sys and ndis.sys.bak exist.

    dir c:\windows\system32\ndis.*
     
  18. PCneedsHelp

    PCneedsHelp Private E-2

    I copied both files and used

    dir C:\WINDOWS\system32\drivers\ndis* and found both .sys and .sys.bak.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Attach a new log from ShowNew!
     
  20. PCneedsHelp

    PCneedsHelp Private E-2

    Here is the log.
     

    Attached Files:

  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Good job! ;) You got the infected file successfully replaced.

    Now try deleting the below files. If they will not delete right now, use safe mode or use Pocket Killbox to delete them.

    C:\cp1041.nls
    C:\WINDOWS\system32\o.dll

    Then either way after a reboot attach new logs from
    • GetRunKey
    • ShowNew
    • HJT
    How is everything working now?
     
  22. PCneedsHelp

    PCneedsHelp Private E-2

    C:\cp1041.nls I deleted this file from explorer.
    C:\WINDOWS\system32\o.dll I used KillBox to delete this on reboot.

    I rebooted, ran GetRunKey, ShowNew, HJT, and saved the logs.

    I couldn't connect to the internet and ran LSPFix again which made those two files and after a reboot, I could reconnect.

    I think I'm supposed to run LSPFix as Admin, though. :eek:

    Should I delete those two files again, reboot, get the logs, and then run LSPFix as Admin, and then post the new logs?
     

    Attached Files:

  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I don't quite understand what you mean by "which made those two files"?


    Run LSP-Fix.

    Check the Box labeled "I know what I'm doing" and then click on the o.dll file (in the “Keep” section) to select it.

    Then, Select the >> button to move o.dll into the Remove section.

    Now, click the Finish Button. When the Repair Summary box appears, click OK.
    If it is already in the Remove section, just click Finish.

    Make sure those two files are deleted. And attach new logs!
     
  24. PCneedsHelp

    PCneedsHelp Private E-2

    Actually those files are gone.

    I thought that by running LSPFix, that o.dll file would be recreated and fix the entry on the HJT log that said

    Then, I assumed that the other file was somehow related and would also be replaced. They were removed the first time. I'm an idiot. :eek:


    Also, CounterSpy finished the daily 2:00AM scan and quarantined another trojan. I'll attach the log.

    BTW, I can click on Windows Explorer without fixing the FirewallBypass in Spybot and not get a BSOD. So that problem is taken care of.
     

    Attached Files:

    Last edited: Apr 18, 2007
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    CounterSpy only found what we removed using Killbox! Our final steps will take care of removing the backups.

    Is the O10 line now gone from your HJT log?


    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  26. PCneedsHelp

    PCneedsHelp Private E-2

    The O10 line is gone. I don't seem to have any problems.

    Should I worry about any backdoors created by those infections?

    Thank you for your help! :)
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No! Unless you are really paranoid!;) Then your only alternative would be to delete your Windows partition and then recreate it and reinstall from scratch.
     
  28. PCneedsHelp

    PCneedsHelp Private E-2

    Thanks again! :)
     
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds