I've been Hijacked I think.

Discussion in 'Malware Help (A Specialist Will Reply)' started by flints, Sep 10, 2006.

  1. flints

    flints Private E-2

    I'am not sure what I have.

    Using W2k SP4 with Firefox mostly Fat filesystem.

    My hosts file has been Hijacked somehow I think. However the hosts file looks to be Ok but I can't get into regedit to see if "it" is pointed at. I am unable to run any online virus scanners, the browser simply shuts down when I go to these sites. Also I am unable to run my installed AVG Free antivirus or Search & Destroy. I can't even get into the Grisoft directory. Also regedit shuts down immediately on launch. In fact even txt files with the word "virus" in the name shut down and cannot be read without changing the name.

    I do suspect the smss.exe process as when I tried to lookup smss.exe explots on the net the browser again shut down.

    I unpluged my network card and checked for the following services

    Network Security Service
    Workstation Netlogon
    Remote Procedure Call Helper

    They were not running

    I ran HSremove.exe and it reported 8 files removed.

    Ran About:Buster twice second time in safe mode. No Files



    Rebooted into normal mode and ran Hijackthis
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Why didn't you attach the log from CounterSpy as requested?

    You also did not install and renamed HijackThis as requested. See step 7 now and fix this. You are running it from the exact location we specify not to run it and you must also rename the file!!!! Do this now before continuing.

    You have a load of problems!

    Goto to Add/Remove programs and uninstall SpywareBot if found (note this is not Spybot Search & Destroy).


    In the below procedure make sure you onl fix exactly what my instructions say to fix. You may see other similarly named services but you must only fix what I give.
    Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'. On the page that opens, scroll down to Windows Network Security Management Service ... then right click the entry, select 'Properties' and press 'Stop Service'. When it shows that it is stopped, next please set the 'Start-up Type' to 'Disabled'. Press 'OK' until you get back to Windows.

    Now repeat the above stop and disable for the following services:
    Remote Procedure Call (RPC) Remote
    Microsoft sdk core

    Next, run HJT, but instead of scanning, click on the "None of the above, just start the program" button at the bottom of the choices. At the lower right, click on the 'Config" button, and then the Misc tools' button ... select 'Delete an NT Service" ... copy/paste the following into the box that opens, and press "OK":

    nsms

    Now repeat the Delete NT Service steps for:
    RpcRemote
    sdk

    If you receive any error messages just ignore them and continue.

    Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.


    Now download - Pocket KillBox

    Extract it to its own folder somewhere that you will be able to locate it later.

    Please run HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click Kill process. Then click yes.

    C:\WINNT\system32\1.tmp
    C:\WINNT\system32\bootini.exe
    C:\WINNT\system32\winIogon.exe


    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    F2 - REG:system.ini: Shell=Explorer.exe bootini.exe
    F2 - REG:system.ini: UserInit=C:\WINNT\system32\userinit.exe,bootini.exe
    O4 - HKLM\..\Run: [Microsoft (R) Windows Network Security Management Service] C:\WINNT\system32\1.tmp
    O4 - HKLM\..\Run: [Windows Explorer] C:\WINNT\system32\explorer.exe
    O4 - HKLM\..\Run: [Microsoft Patch Update] 38576_netapi.exe
    O4 - HKLM\..\Run: [Microsoft Windows] bootini.exe
    O4 - HKLM\..\Run: [Windows Logon Application] C:\WINNT\system32\winIogon.exe
    O4 - HKLM\..\Run: [SpywareBot] C:\Program Files\SpywareBot\SpywareBot.exe -boot
    O4 - HKLM\..\RunServices: [Microsoft Patch Update] 38576_netapi.exe
    O4 - HKCU\..\Run: [Microsoft Windows] bootini.exe


    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):


    C:\q1win32.exe
    C:\wincomm.exe
    C:\asus.exe
    C:\winservnt32.exe
    C:\msejavaupdt32.exe
    C:\WINNT\eraseme_35852.exe
    C:\WINNT\system32\net32a.exe
    C:\WINNT\system32\lxqf.exe
    C:\WINNT\system32\msnchecke9.exe
    C:\WINNT\system32\38576_netapi.exe
    C:\WINNT\system32\55158_netapi.exe
    C:\WINNT\system32\30286_netapi.exe
    C:\WINNT\system32\08480_netapi.exe
    C:\WINNT\system32\82032_netapi.exe
    C:\WINNT\system32\67210_netapi.exe
    C:\WINNT\system32\27044_netapi.exe
    C:\WINNT\system32\14831_netapi.exe
    C:\WINNT\system32\45142_netapi.exe
    C:\WINNT\system32\44461_netapi.exe
    C:\WINNT\system32\14222_netapi.exe
    C:\WINNT\system32\1.tmp
    C:\WINNT\system32\explorer.exe
    C:\WINNT\system32\bootini.exe
    C:\WINNT\system32\winIogon.exe
    C:\WINNT\system32\remote.exe
    C:\WINNT\lsass.exe
    C:\Program Files\Common Files\svchostsys\svchostsys.exe
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.


    After reboot locate the below folders and delete them if found:
    C:\Program Files\SpywareBot
    C:\Program Files\Common Files\svchostsys

    Also delete all files in the below folder except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINNT\Temp
    C:\Documents and Settings\D. E. Bressey\Local Settings\Temp

    Now download HOSTER and then follow the below steps.
    • Unzip Hoster to a convenient folder such as C:\Hoster
    • Run Hoster.exe, click Restore Original Hosts and then click OK.
    • Click the X to exit the program
    Now attach a new HJT log and tell me how the steps went.
    Also attach a new log from ShowNew and GetRunKey.

    Make sure you tell me how things are working now!
     
  3. flints

    flints Private E-2

    Sorry I didn't follow your instructions because before I got them CounterSpy got my browser and regedit going and I ran a number of scanners afterwards. Every thing seems to be Ok except on bootup explore.exe is running and I still have some unwanted startup files that I can't get rid of.

    bootini.exe
    38576_netapi.exe
    mobsync.exe

    Waiting for your reply before I touch anything else.

    Thanks
    Neil

    HJT,runkeys,newkeys attached
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You did not follow my previous directions. In fact it looks like you did none of them. Not even the Killbox step.

    Let's do this again but only part of it. Make sure you follow these steps exactly!!!

    Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'. On the page that opens, scroll down to Windows Network Security Management Service ... then right click the entry, select 'Properties' and press 'Stop Service'. When it shows that it is stopped, next please set the 'Start-up Type' to 'Disabled'. Press 'OK' until you get back to Windows.

    Now repeat the above stop and disable for the following services:
    Remote Procedure Call (RPC) Remote
    Microsoft sdk core

    Next, run HJT, but instead of scanning, click on the "None of the above, just start the program" button at the bottom of the choices. At the lower right, click on the 'Config" button, and then the Misc tools' button ... select 'Delete an NT Service" ... copy/paste the following into the box that opens, and press "OK":

    nsms

    Now repeat the Delete NT Service steps for:
    RpcRemote
    sdk

    If you receive any error messages just ignore them and continue.

    Now exit HJT and reboot when it tells you it needs to.

    After reboot attach a new HJT log.
     
  5. flints

    flints Private E-2

    Guess I don't take Instructions very well. Tail between my legs.

    Reading from the email and not the forms I disabled the "Remote Procedure Call" service not the "Remote Procedure Call (RPC) Remote" service which was not there.

    Now I have no internet service and are unable to restart the Remote Procedure Call.

    I did follow the rest of the instructions however.

    HJT attached

    Just take me out and shoot me.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That was a very bad thing to do. You must be careful and only do exactly what we say to do and nothing else. Malware constantly names itself very similar to valid processes and services names on purpose just so they can trick you into doing things like this. With the real RPC service disable there is very little that your PC can do.

    Before we try to fix the RPC service let's try to fix more of the malware while your PC is in a mode where many things cannot run. It could possibly help us at this point. Follow steps EXACTLY!


    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    F2 - REG:system.ini: UserInit=C:\WINNT\system32\userinit.exe,userinit.exe
    O4 - HKLM\..\Run: [Microsoft Windows] bootini.exe
    O4 - HKLM\..\Run: [Microsoft Patch Update] 38576_netapi.exe
    O4 - HKLM\..\RunServices: [Microsoft Patch Update] 38576_netapi.exe


    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete
    :
    C:\WINNT\system32\bootini.exe
    C:\WINNT\system32\38576_netapi.exe

    Now reboot into normal mode and try the below.

    You can try the instructions in the below link from Microsoft but I suggest that you read thru it a couple times before doing it. Make sure you DO NOT skip any steps and make sure you do exactly what they say. Make sure to create the registry backup as they indicate in step 4 where they have you do an Export.

    http://support.microsoft.com/default.aspx?scid=kb;en-us;838428

    Let me know if this gets the real service running again.
     
  7. flints

    flints Private E-2

    Hi I've been out of town.
    I followed your instrustions.

    There was no

    C:\WINNT\system32\bootini.exe
    C:\WINNT\system32\38576_netapi.exe

    to delete.

    HJT seemed to take care of that part of the problem
    There doesn't seem to be any sign of them anymore.

    I tried to follow the MS instructions you attached.

    However there was no

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Enum\ROOT\LEGACY_RPCSS

    To delete

    Also under step 7

    There wasn't a ROOT subkey

    • MS_PSCHEDMP

    There was however a ROOT the following subkeys

    • MS_L2TPMINIPORT
    • MS_NDISWANIP
    • MS_PPPOEMINIPORT
    • MS_PPTPMINIPORT
    • MS_PTIMINIPORT
    • NTAPM

    So basically there was nothing to do in the MS instructions.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Attach new logs from GetRunKey, ShowNew and HJT!

    If you run services.msc do you see the Remote Procedure Call (RPC) service?

    If so is the Service status: Started
    And is the Startup type: Automatic (and grayed out)
     
  9. flints

    flints Private E-2

    Remote Procedure Call (RPC) is shown as "Disabled"

    When I right click on Remote Procedure Call (RPC)

    Start
    Stop
    Pause
    Resume
    Resart

    Are all greyed out

    When I select Properties "services.msc" just hangs.

    When I try to quit services I get the error message "Close all property pages before closing"

    Task Manager shows Services -- Running

    When I cancel Services with the Task Manager "End Program" pops up and say's "The system cannot end this program because it is waiting for a respones from you"

    I get the same respone when I click "Properties" on other services as well althought I am able to Start and Stop things like the "Clip Book" service but when I click "Porerties" it just hangs.

    Files attached
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You can give the below procedure a try, but if the first part of the solution does not work, you will need a bootable Windows 2000 SP4 CD to boot to the recovery console. Do you have a bootable CD for your OS?

    See: http://support.microsoft.com/kb/830071/en-us
     
  11. flints

    flints Private E-2

    No I only have the I386 files probably SP2. I have a Windows 98 and a XPII SP2 ISO disk. I also have an old EBCD 0.6.1 Pro disk.
     
  12. flints

    flints Private E-2

    I went and looked at the Key mentioned by MS and it's set at start type 4.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well it needs to be a 2. So edit it to be a 2.
     
  14. flints

    flints Private E-2

    Success I think.
    I just had to change the RpcSs key to Start type 2, I didn't need the Recovery Console.

    Thank you very much, I learned a lot.

    Neil

    Files attached
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome!

    Okay so is everything working alright now! Are you having any other malware problems?

    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 1
    J2SE Runtime Environment 5.0 Update 2
    J2SE Runtime Environment 5.0 Update 4
    J2SE Runtime Environment 5.0 Update 6
    Mozilla Firefox (1.5.0.6)


    Now install the current version of Sun Java from: Sun Java Runtime Environment

    Then install the current version of FireFox from: Mozilla Firefox
     
  16. flints

    flints Private E-2

    Yes everything seems hunky-dory.
    Thanks again.
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds