Malware with Powershell failures

Discussion in 'Malware Help (A Specialist Will Reply)' started by dsHarry, Dec 4, 2014.

  1. dsHarry

    dsHarry Private E-2

    Howdy all...
    Been seeing errors with Powershell pop-up on the desktop at no set time interval. I've run the initial steps mentioned on the front page. Here are my logs.


    Many thanks,
    Harry
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Rerun RogueKiller and have it fix this item:
    [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-1746380048-202299232-356640664-1000\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found

    Disable your protection software while we do the following:

    Download OTM by Old Timer and save it to your Desktop.




    Code:
    :Processes
    explorer.exe
    
    :files
    C:\Users\Naomi\AppData\Local\Temp\*.*
    :Commands
    [purity]
    [ResetHosts]
    [emptytemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    Reboot and rescan with RogueKiller and attach that new log.

    Re-enable your AV protection


    Tell me how things are running now.
     
  3. dsHarry

    dsHarry Private E-2

    Here are the 3 logs you've requested.
    From the Rogue Killer log, I get the feeling I was not able to eradicate the Poweliks registry key even though I deleted it with RK.

    thanks,
    Harry
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Did you turn off your protection software before trying to uninstall it?

    Do so now.




    Code:
    :Processes
    explorer.exe
    
    :reg
    [-HKEY_USERS\S-1-5-21-1746380048-202299232-356640664-1000\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32]
    
    :Commands
    [purity]
    [ResetHosts]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    Reboot and rerun RogueKiller and attach the new logs,
     
  5. dsHarry

    dsHarry Private E-2

    I have Norton on the box. I have disabled it. I will try to uninstall it.

    Here are the two logs. OTM restarted before I was able to pull the results and put them into a file.
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Uninstall Norton as it may be blocking the fix. Reboot after uninstalling and try to fix the item in RogueKiller. Attach a new RogueKiller log.
     
  7. dsHarry

    dsHarry Private E-2

    I uninstalled Norton.
    Here's the last RK log.
    thanks for your help!
     

    Attached Files:

  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It said it was deleted, but reboot if you haven't already and rerun RogueKiller and attach the new log.

    Be sure to tell me how things are running now.
     
  9. dsHarry

    dsHarry Private E-2

    It's still showing up in RK scans.
    Good news is the rogue DLL process doesn't show up in the Processes tab.

    Edit: things running ok... however on reboot and rerunning RK, I see the rogue DLL process was killed. The Poweliks registry key is still showing up.
     

    Attached Files:

    Last edited: Dec 6, 2014
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please do the below so that we can boot to System Recovery Options to run a scan. There will be two options to choose from. One if you do not have your Windows 7 boot DVD and another when you have your DVD.

    For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Option1: Enter System Recovery Options from the Advanced Boot Options:

    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    Option2: Enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  11. dsHarry

    dsHarry Private E-2

    I was able to boot into safe mode with command prompt. From there, I was able to run the FRST64.exe . Please let me know if I should have not done this (i.e. figured out a way to boot directly to a command prompt in order to run FRST64.exe).


    I am attaching two files the FRST64 application created.

    thanks,
    Harry
     

    Attached Files:

  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Save fixlist.txt to your flash drive.

    • You should now have both fixlist.txt and FRST.exe on your flash drive.

    Now reboot back into the System Recovery Options as you did previously.
    Run FRST and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Reboot and rerun RogueKiller and attach the new log.
     

    Attached Files:

  13. dsHarry

    dsHarry Private E-2

    Here you go. I think we're close.
     

    Attached Files:

  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Looks good.... are you having any other issues or are you ready for final cleanup?
     
  15. dsHarry

    dsHarry Private E-2

    Can't see any other notable problems. Many thanks for your help.
    Proceed with final cleanup.
     
  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  17. dsHarry

    dsHarry Private E-2

    Thanks for your help!

    Question: what was causing the registry key to keep getting loaded in after RK killed it?
     
  18. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    This type of infection is often blocked from being removed by AV software.

    And you are welcome. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds