malware backdoor

Discussion in 'Malware Help (A Specialist Will Reply)' started by clio, Jun 26, 2010.

  1. clio

    clio Private E-2

    Hi,

    I ran the Run and Read Me instructions and I'm attaching the logs. I noticed that iexplore.exe was launching in the background, sometimes quite a few instances at a time - and sometimes triggering one of the MS 'this app has crashed - do you want to send a report' windows. I never use IE myself.

    In running the tests, the item which I could see was found in both SuperAS and MBAM: Backdoor.bot. Both apps said they removed it but I still see the iexplore launching from time to time. When I see it I kill it in the Task Manager and I set my firewall to not trust IE.

    Is there something further I should do? Was iexplore always launching once and I never noticed it?

    Thanks for your assistance - this is a fantastic group/service you have.

    -Jen
     
  2. clio

    clio Private E-2

    Here's the last attachment.

    When I ran MGTools I got the Type2 error - related to the 16 bit failed dlls. I attempted the fix provided - which ran fine - but when I re-ran MGTools I still got the 16 bit type error.

    -jen
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to attach the 5 requested logs so that we can try to help you. Make sure you look for the MGlogs.zip file as something may have been created anyway.
     
  4. clio

    clio Private E-2

    my apologies - I swear I thought I had attached them - that's why there were two posts. I'll attempt again...
     

    Attached Files:

  5. clio

    clio Private E-2

    and the last one
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have a Master Boot Record (MBR) infection. Do you have all important data backed up? You really should do this before continuing since we will need to rewrite your MBR to fix this and while most times this can be done without any problem, these infections can react badly and that could result in a PC not being bootable. You really don't have much choice though since these infections are too dangerous to your security to leave on a PC.

    The belwo is not a fix. It is just more info that we need before giving you the fix.
    • Download bootkit_remover.rar
    • Click the underlined DOWNLOAD text to download the file and save it to your Desktop.
    • You then need to extract the remover.exe file from the RAR using a program capable of extracing RAR compressed files. If you don't have an extraction program, you can use 7-Zip
    • After extracing remover.exe to your Desktop, double click the remover.exe file to run the program.
    • Attach or post inline here, the output from remover.exe
     
  7. clio

    clio Private E-2

    I can't cut/paste from the DOS window and it didn't seem to do much before it stopped - not sure if this helps or if I need to do something else: here's my best typing attempt of what seems meaningful:

    ----
    Bootkit Remover version 1.0.0.1
    ...

    \\.\C: -> \\.\PhysicalDrive0
    MD5: cb75c9f14e7b925fb57a7cc5b6ece8de

    Size DeviceName MBR Status
    149GB \\.\PhysicalDrive0 Unknown boot code

    Unknown boot code has been found on some of your physical disks.
    (Instructions to dump and disinfect...)
    ------------------

    Would running a dump help? do I use the \\.\Phys name as the device name in the command?

    I can't believe I let myself get into this spot. Thanks for any assistance/mercy.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.


    Now - please do the following:


    • Click Start, Run then copy and paste the below into the Run box and click OK.
    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0
    • Now reboot your PC and after reboot continue with the below instructions.
    • Disable System Restore on all drives.
    • Look for the below folder and if if it sill exists, delete it.
      • C:\System Volume Information\Microsoft
    • Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).



      Then attach the below logs:
      • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  9. clio

    clio Private E-2

    OK.

    My computer still reboots - so that's fantastic!

    I ran the command, got an immediate OK. Rebooted and turned off System Restore (through the System Properties dialog, yes?) That required a restart which went fine.

    When I ran the .bat I got the 16bit .dll fail error again if that matters.

    The log is attached.

    The one thing I could reliably point to as evil before was the iexplore.exe ghost(s). I even renamed the .exe at one point and some process (evil or system) recreated it. I renamed it again and put my firewalls into paranoid mode. I haven't seen anything come back but I'm not sure if that really means it's gone. I'm sure the logs will be better at giving you info.

    I can't ftp out of here at the moment but I imagine that's a user-generated problem when I was trying to stop the sinking ship. When you give me a clean bill of health I'll reinstall firewalls and such. At that point would I also turn system restore back on? (or are we even close to that point yet?)

    If we are close to healthy is there something I can monitor to make sure this trouble isn't growing back? (as well as not being a moron and forgetting to put my firewall back up) If I know what I'm looking for I'm happy to troll through logs once in a while.

    Thanks so much.
     

    Attached Files:

  10. clio

    clio Private E-2

    Darn it - forget to tell you that when I look at Windows Explore and try to open c\system vol info I get an 'access denied' message - so I can't tell if the ..\microsoft folder exists (or delete it if it does). Is this a bad symptom or can I boot differently to let me get at that folder?

    Thanks again.
     
  11. clio

    clio Private E-2

    OK - one more time. After a little searching I figured out how to turn off simple sharing and access the Security tab for the SysFileInfo folder and add myself as an authorized user. The .../Microsoft/ folder existed - with two file loaders inside. I deleted the folder. Should I run the MG .bat again or ...?

    -jen
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That error and the fix was covered in the READ & RUN ME where it gave you the Using MGtools link.


    The real indicator of the problem was not IE running. It was the executable files running out of the System Volume Information folder. ;) Previously, you had the below two processes running:

    C:\System Volume Information\Microsoft\services.exe
    C:\System Volume Information\Microsoft\smss.exe


    Now they are no longer running. Both services.exe and smss.exe are valid system file names, but the valid ones do not run from the above location. The valid ones only run from the C:\Windows\system32 folder. These were the key indicator of your infection.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It would be a normal configuration to not be allow to access the C:\System Volume Information folder while System Restore is enable. This is a protected system folder. After disabling system restore, all restore points are deleted but the infection put their files in non-restore point folders (i.e., they put them in a Microsoft folder to confuse you ). Thus the Microsoft folder was not deleted and you had to do it manually. Also the infection changed permissions on the folder as you have notice and fixed. ;)

    You're logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. Now you need to re-enable System Restore.
    10. After doing the above, you should work thru the below link:
     
  14. clio

    clio Private E-2

    Somewhere down here in the thread I think I said that the fix for the 16-bit.dll didn't work for me - but as long as that doesn't hamper your ability to see what's going on I'm happy.

    And now that those files are gone from SysVolInfo (and are still gone) am I in good shape? I'm going to go back and uninstall/reinstall firewall and antivirus (and check this site for current suggestions) but I wanted to be sure I wasn't locking anything evil in.

    I can't say how grateful I am - you guys have a tip jar or donation site?

    Thanks so much!

    ps - see I was typing this while you were answering my questions ahead of time - thanks!
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you extract the files into the system32 folder or to somewhere else. They must be saved to the C:\Windows\system32 folder inorder for them to have any effect.

    No I had enough info anyway. ;)

    No formal process but some of us can accept optional donations via PayPal.

    You're welcome.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds