Help an ancient geek! Browser redirect virus still here

Discussion in 'Malware Help (A Specialist Will Reply)' started by MisterV, Dec 29, 2010.

  1. MisterV

    MisterV Private E-2

    Hi

    I have been infected by a series of malware/virus recently, on a Windows 2003 computer.
    Retrospectively, I think I know why: I had to disable the firewall and there were some trojans (at least one) waiting.
    I've seen, after investigation, that some exceptions had been created in the firewall, for svcnost.exe in particular.

    At first, the usual AV system (Symantec Corp v10) detected trojans (smitfraud.c) in some user temp folder.

    I have then scanned the infected computer (which always was protected with up-to-date Symantec Corporate AV v10) with various malware/spyware/Virus scanner, removal tools. They found some threats and quarantined them:
    smitfraud
    Suspicious.Stealers
    Packec.Win32.Upack
    Trojan.Win32.Autorun.dm
    Trojan.Win32.GenericBT
    Win32.Exploit.MS05-016
    Spyware.Passwords
    and especially
    Rootkit.agent (atapidrv.sys)

    When I ran these tools a second time, they did not find any remaining threat.

    But I still suffered from a folder redirection issue, with all the browsers.

    I suspected I had a rootkit, that could hide itself. I was right, it appeared as a hidden driver.
    As I used to be somewhat a geek myself (I programmed some simple Windows kernel drivers in the past, I even implemented a sample rootkit by hooking ZwCreateFile function call to log this function operations), I detected it "easily": I booted the infected computer off a UBCD4Win environment, mounted the "c:\windows\system32\config\system" registry hive, dumped its entry in a .reg file. I was about to boot off the regular HDD and do the same thing and compare the 2 files, but I did not have to (yet I did) since there was a very suspect entry named DJBGFDS (or something like that) which loaded a tmp file located in a user temp folder.
    I deleted both the registry entry and the file, while under UBCD4WIN environment.

    I ran TDSSKiller on the computer while it was running, after I removed the threats. It found nothing.
    I ran GMER, it found no threat (no hidden stuff).
    Sophos ANtiRootKit, RootKit revealer... none of them found anything.

    I uninstalled Firefox 3.6 and Opera 11 (which were suffering from the redirection symptom).

    I rebooted the computer.

    I stopped or killed almost all the running processes on the machine and tried Internet Explorer 8: I am still redirected!

    From UBCD4WIN, I re-flashed the BIOS, including boot blocks, restaored the MBRs on the disks. Still being redirected.


    Any help would be appreciated.
    I know that I can't run ComboFix from Win 2003, but I do know how to deleted any file or any registry entry...

    Thanks in advance

    - MisterV

    The tools that were used:
    From the infected environment:
    Windows 2003 sp2 x86 (Enterprise, French)
    Windows Firewall
    Windows updates (automatic updates, daily)
    Symantec Corp. AV v10 (online scanning enabled, automatic updates)
    Panda AV online Scanner
    TDSSKiller
    MalwareBytes
    Ad-Aware
    GMER
    CatchMe
    RootKitRevealer (SysInternals)
    Sophos AntiRootkit
    Process Explorer (I verified all the supposed MS files/processes, they were confirmed, as well as most of the other ones)
    AutoRuns (I also verified most of what is launched there)

    from UBCD4Win/WinPE environment
    Spybot SD
    SUPERAntiSpyware
    ViPRE PC Rescue
    McAfee Stinger
    Avast
     
  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything.



    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.

    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.


    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:


    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this aother user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. MisterV

    MisterV Private E-2

    I zipped the log files and attached them.

    Note that some of the tools can't run on Windows 2003 (which is the OS that operate the intefcted computer) and also that the tools are sometimes displaying/writing messages in French (since it is the locale in use).

    Note as well that no infection or threat have been reported, as far as I can tell. RootReveal saw some Kernel API hooks, but this may be related to the protection system (antivirus etc) that, even if disabled, will still have the hooks in place.

    One last thing:
    MGTools.exe does not work if run from a drive that is not C:.
    This is a common problem with batch files and I can fix it if you want, just give me some technical details about MGTools implementation, especially regarding the order of operations and the tools used to create the \MGTools folder (which gets created on the root of the drive that MGTools is run from).

    Thanks in advance
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No true. It is simply designed to be run from the drive that you boot Windows from as stated in the instructions. Thus, if your Window boot drive is H, you would put it on drive H and run it from there. Since your boot drive is C, you need to put it on drive C and run it from there. I'm not sure what you did but you should have either saved MGtools.exe to the root folder ( C:\MGtools.exe ) or you should have put it on your Desktop. Then you should have run it. It looks you you did not do this so please do this and then attach the new log. Make sure any protection software that could get in the way of operation has been shutdown first.
     
  5. MisterV

    MisterV Private E-2

    The logs I attached previously contain the correct MGLogs file, run from the C: drive.
    I think I can still "fix" MGlogs for it to be able to run from any drive, but I don't know if this is really required
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your MGLogs are missing numerous logs. Please run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\MGlogs.zip
     
  7. MisterV

    MisterV Private E-2

    These logs are all what MGLogs seems to be creating when run on my Win2003 OS.
    Many of the tools that MGLogs call won't run on Win2003.
    Then, I'll try to figure it myself I guess...

    The "only" symptom that seems to be left is the browsers redirection stuff.

    Where can I find some details about how browser redirection can work ? I understand that it can be done with some rootkit (what can't they do?).
    But is there a chance that this could be also accomplished by some other technique?
    Since it seems that I don't have an undetectable RootKit. I even suspected a VBootKit variant and restored the VBRs on my active partitions, but it did not change (though I don't know how fixboot works... Does it restore the VBR from NTFS' copy or recreate it?)

    Corrupting Winsock layer would work, but I would expect antiviruses and other mechanisms to make it hard to be left undetected.

    Well, in short, any detail about techniques used for Browser redirection could help me figuring out where to search.

    Thanks in advance

    - MisterV
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    See if you can run this:

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!


    Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.

    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it.
    • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_14.17.05_log.txt) will be created and saved to the root directory ( usually Local Disk C ).
    • Attach this log to your next message
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    They all work fine on Win2003. We have hundreds of people who have used it here. Are you looking in the root folder for MGlogs.zip or are you making your own.

    Please click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple is merely informational.

    cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    GetRunKey <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    ShowNew <-- this will try to run all another scan from MGtools. Tell me what error messages, if any, you see.

    If the above run, then attach the C:\MGlogs.zip file.
     
  10. MisterV

    MisterV Private E-2

    TDSSKiller reports no infection.
    Tdsskiller log was attached to my previous post. No change since then

    Regarding MGLogs tool on Windows 2003, do you confirm they all should work? Combofix won't for sure.
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, MGTools works on your system. Did you do as Chaslang asked? We need to see an MGLog.zip that includes the logs from GetRunKey and ShowNew at a minimum. Or we need to figure out why they are having a problem running.
     
    Last edited by a moderator: Dec 31, 2010
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    ComboFix is not part of MGtools.
     
  13. MisterV

    MisterV Private E-2

    I did like you asked.
    ShowNew does not seem to work on Win2003.

    I created outputs (stdout and stderr) for the tools using the redirection:
    "> [File.out.txt] 2>&1"
    The stderr/stdout files are in MGLogs.zip

    Nothing more than previously.

    I thank you for your time, but don't bother trying to fix my system using these logs. I am pretty sure you will not find anything useful.
    I understood all what they log said. Nothing to correct... I told you I was an ancient geek, actually that's false, I was more the nerd kind. To solve the current problem I was envisaging using IDA, WinDBG and IRPtracker to see what causes the issue, from inside.
    I even began.
    I could also have used some hardware probe, loaded Checked versions of the system files one by one, etc...
    But I don't have enough time.

    I will perform an "upgrade re-install" of Windows 2003 R2 on the top of the problematic computer and I'll tell you if this solves anything (I think it should, because I am pretty sure that what happened is that my system is compromised the "old way": a system file has been infected by a virus, and this virus is not detected by any of the tools I tried. Maybe a manually crafted virus. I had a backdoor opened for sure, and "someone" could have been doing about anything on my system). But reinstalling Windows (and make sure the files are safe, the boot sectors, MBR/VBR ar OK) should be enough to solve the issue. I removed almost all non MS files. I'll monitor carefully this computer's activity anyway.

    If the re-install seems to work, I'll do a RootRepeal again and see if the kernel APIs hooking table has changed...

    Anyway thanks for the support and the time you spend fixing user's issues.

    - MisterV
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Hmmm! I could have sworn this was working okay for others, but we get relatively few Win 2000 and even fewer 2003 systems here these days. Please help me debug this ( I no longer have a Win Server 2003 system available ) by doing the below. I think the fix will be simple.

    From a command prompt Window, enter the below command:

    ver > C:\sys.txt

    Then attach the C:\sys.txt file here.
     
  15. MisterV

    MisterV Private E-2

    ver says:

    Microsoft Windows [version 5.2.3790]

    It's MS Windows 2003 enterprise sp2 "R2"
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Thanks! Okay this is the issue. Hang on a couple minutes and I will have you download a different version to try if you don't mind.
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please delete the current MGlogs.zip file.
    Then please try downloading and running this new version >> MGtools

    Attach the new MGlogs.zip file.

    Thanks!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds