Help removing Cool Web Search trojan

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by RubyDist, Oct 10, 2004.

  1. RubyDist

    RubyDist Private E-2

    I seem to have a new CWS variant that is not being removed by the posted process. I got the thing by clicking on a link to a supposed electronic greeting card that looked legitimate. McAfee identified the trojan but was unable to stop it from doing its thing.

    I followed the instructions on your site, and several of the programs identified CWS and said they removed it, but it wasn't really gone. I ran through all of the cleaning steps again and here are the results:
    Housecall found nothing
    Symantec found hacker exposure, nothing else
    Stinger reported clean
    CCleaners removed about 2Mb of temp files and reports XPSP1, P3 mobile 1Ghz, 318 ram, FAT32
    AdAware reports 13 processes, 494 process modules,
    0 critical new objects
    13 negligible objects, all MRU lists, all were removed
    SpyBot reports no immediate threats, all known bad products already blocked
    CWShredder reports no infections
    Kill2Me reports no signs of infection
    AboutBuster reports Attempted clean of Temp folder after both scans.
    (reboot) to allow Explorer to work again
    HSRemove reports 8 items removed, complete. I ran it again and it reports no items
    Trojan scan reports no trojans found.

    A reboot to normal mode results in Explorer home page being hijacked immediately.

    I also have an evaluation copy of SpySweeper which reports the trojan and attempts to clean it, but is not successful. It finds the registry entries for the default page and the home page and as soon as it cleans them the trojan puts them back. This happens within 2 seconds of them being cleaned.

    I also have a evaluation copy of XofSpy which reports the trojan Troj/AnaFTP-01, which it claims has hijacked the file c:\windows\rundll.exe. Since I haven't purchased the program, it won't let me clean this. I'd be fine to spend the $30 for the program if it would clean it, but since several of the other programs unsuccessfully claim to have cleaned it, I'm reluctant.

    Apparently, this thing hides somewhere that these programs are not looking and they find the results but not the cause. I need help.
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Goto this link and scroll down to the entry for XoftSpy and the remove it from your PC.

    Please read this Sticky thread NO HIJACK THIS LOG FILES BEFORE READING THIS: HJT Tutorial & LOG File Posting

    And then post your log as a .txt file attachment.

    Do NOT run Hijack This from the Desktop, a temp folder or choose run from the download. Place it in its own folder, for example C:\Program Files\HJT
     
  3. RubyDist

    RubyDist Private E-2

    Log is attached. Thanks for your assistance.
     
  4. Kodo

    Kodo SNATCHSQUATCH

    Ruby,
    Your log didn't make it. Try attaching again.
     
  5. RubyDist

    RubyDist Private E-2

    here it is again.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Make sure viewing of hidden files is enable and system restore is disabled.

    Please bring up Task Manager by hitting CTRL-ALT-DEL and click the Processes tab. Find the below processes and End them:
    SYSTIME.EXE
    w?nspool.exe
    fmifs.exe

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://213.159.117.134/index.php
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://213.159.117.134/index.php
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://213.159.117.134/index.php
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://213.159.117.134/index.php
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = http://213.159.117.134/index.php
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = http://213.159.117.134/index.php
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by AT&T WorldNet Service
    R3 - Default URLSearchHook is missing
    O2 - BHO: (no name) - {41FA6572-9266-29C0-8750-10550F822C1C} - C:\WINDOWS\System32\bgnajd.dll
    O4 - HKLM\..\Run: [QBCD Autorun] D:\autorun.exe restart QB_SEQUENCE first
    O4 - HKLM\..\Run: [SysTime] C:\WINDOWS\System32\systime.exe
    O4 - HKCU\..\Run: [SysTime] C:\WINDOWS\System32\systime.exe
    O4 - HKCU\..\Run: [Siblbvqn] C:\WINDOWS\System32\w?nspool.exe
    O4 - HKCU\..\Run: [fmifs] C:\WINDOWS\System32\fmifs.exe
    O15 - Trusted Zone: *.windupdates.com
    O16 - DPF: {1D0D9077-3798-49BB-9058-393499174D5D} - file://c:\counter.cab


    Now boot in safe mode and use Windows Explorer to delete:
    C:\WINDOWS\System32\bgnajd.dll
    C:\WINDOWS\System32\systime.exe
    C:\WINDOWS\System32\w?nspool.exe
    C:\WINDOWS\System32\fmifs.exe


    While in safe mode Reset your web settings:
    Reset Web Settings by clicking Start, Control Panel (for some systems it may be Start, Settings, Control Panel) and select Internet Options. Then click Programs and click the Reset Web Settings button. Then go back to the General tab and set your home page back to what you like (i.e., www.majorgeeks.com). Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.

    Now reboot in normal mode and post a new HJT log and tell me how these steps went and how things are working.
     
  7. RubyDist

    RubyDist Private E-2

    Success!!! Many thanks for your assistance!

    Before your post, I had actually gone through and cleaned up some of it using HijackThis - as follows:
    attempting to remove the KH's to the bogus page did no good, as there was a program that repopulated that about every second. That program turned out to be "bgnajd" Attempting to remove this took two trys with HJT, but after this, I had control of the browser again! I had also removed 'systime' etc. during this process.

    After getting your post, I also removed "fmifs" and "winspool" This has no apparent affect, which tells me that they were doing some snooping that was not visible.

    Things are working as I think they should now.

    I do have one quesiton based upon the new HJT log - is it your suggestion that I keep both Spybot and SpywareGuard running at all times?

    Again, many thanks for your assistance.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You should fix this line:

    O2 - BHO: (no name) - {41FA6572-9266-29C0-8750-10550F822C1C} - (no file)


    I would just disable SpyBot's TeaTimer. I don't use it. Just enable SDhelper. And yes keep SpywareGuard too.
     
  9. RubyDist

    RubyDist Private E-2

    Chaslang,
    I have tried 4 times to remove that BHO line, and HJT has deleted the associated file, but won't delete the line. Do I need to manually edit the registry?

    Thanks for your help.
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    1) go here and download Registrar lite and install it: http://www.majorgeeks.com/download469.html
    2) Run it, copy and paste this line to reglite's address bar:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\AppInit_DLLs
    3) Click the "go" tab
    4) Find: "AppInit_Dlls" value on the right side panel.
    5) DoubleClick on AppInit_Dlls and tell me exactly what you see in the Value field:
     
  11. RubyDist

    RubyDist Private E-2

    Chaslang,

    Ran Registrar Lite as you specified. For AppInit_Dlls, The Value field is blank - nothing in it.
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay Ruby,

    Run Registrar Lite again and click the magnifying glass to do a search.

    Then past in: 41FA6572-9266-29C0-8750-10550F822C1C as what you want to search for.

    Tell me what matches you get. I need the full registry key path info.
     
  13. RubyDist

    RubyDist Private E-2

    Chaslang,
    Here is the address:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BrowserHelperObjects\{41FA6572-9266-29C0-8750-10550F822C1C}
    The Value field is empty (blank)

    BTW, every time I boot, Spybot asks the same questions about whether its okay to really delete the things that I changed like browser start page, etc. How do I get it to accept those changes and not make me answer the same question every time I start the computer? (This has happened the last 3 times I started the computer.)
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay do the same search again with Registrar Lite and when that key comes up in the search window, right click on it and select Delete selected registy key and value. Then exit Registrar Lite and get a new HijackThis log for me.

    Did you try saying yes to Spybot? If so then run SpyBot and change the Mode to Advanced and select Tools, IE Tweaks and uncheck all the Miscellaneous locks. The exit SpyBot. Reboot and see if that helps. If it does, now you should go back and set the locks how you want them.
     
  15. RubyDist

    RubyDist Private E-2

    I deleted the key as instructed. New log is attached. All appears well.

    I turned off TeaTimer and that caused the boot-time messages to go away. I was answering to accept the changes, because not accepting them would have resulted in Spybot attempting to revert to the bad (hijacked) pages.

    Your assistance has been greatly appreciated, and I hope that this information is helpful to others in the community. Thanks!
     

    Attached Files:

  16. Kodo

    Kodo SNATCHSQUATCH

    not quite..
    I see this
    C:\WINDOWS\System32\fmifs.exe

    that is not a known EXE. looks like it's mutating again.
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Hmmm! Where did that come from? I know the below FMIFS.DLL is OK. Never saw this exe though.

    FMIFS.DLL Interface between File Manager and installable file system


    See if you can boot in safe mode and locate this file and rename it to fmifs.bad.
    Tell me if you locate it and get an error trying to rename it.

    The boot in normal mode and post a new HJT log.
     
  18. RubyDist

    RubyDist Private E-2

    Good catch. I think I may have inadvertently allowed it back by responding incorrectly to one of the Spybot questions about allowing changes.

    Anyway, my weekly McAfee VirusScan happened last night, and McAfee identified that file as being infected with the 'downloader' virus if I recall the message correctly and had deleted it. A new HJT is attached, which I believe shows that it is really gone now.

    Thanks again!
     

    Attached Files:

  19. Kodo

    Kodo SNATCHSQUATCH

    i don't see anything this time around..
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Agreed! Looks good now!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds