need help

Discussion in 'Malware Help (A Specialist Will Reply)' started by murwood, Oct 26, 2015.

  1. murwood

    murwood Private E-2

    Hello,
    I have a laptop with XP Pro, SP3. Seem to have gotten an infection during a trip, using hotel WiFi. Can not boot into safe mode, constant network activity so the machine is now disconnected from the network.

    Scans found Trojan.FakeMS and Win32/Ramnit.AH.

    Bootup gives error window QtZgAcer.EXE failed to initialize 0x0000005 error twice.

    Task Manager shows ASBOKBBM.EXE and JRSTRNHS.EXE using 90% or more of the CPU. When shut down they just pop up again.

    Ran the steps called for and here are the logs.

    Thanks for any help you can be.
    Tom
     
  2. murwood

    murwood Private E-2

    It seems the log files did not get attached. I will try again.....
     

    Attached Files:

  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ramnit is nasty. I'll have a go at clearing up for you, but you may find it just keeps coming back. :(

    Activate the free trial for Hitman Pro and have it remove the below:



    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [Suspicious.Path] HKEY_USERS\S-1-5-21-954458941-1417818515-3399203189-1004\Software\Microsoft\Windows\CurrentVersion\Run | AsbOkbbm : :\Documents and Settings\Tom\Local Settings\Application Data\rpjcabry\asbokbbm.ex [x] -> Found
    • [Suspicious.Path] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon | Userinit : C:\WINDOWS\system32\userinit.exe,,:\Documents and Settings\Tom\Local Settings\Application Data\rpjcabry\asbokbbm.ex,C:\Documents and Settings\Tom\Local Settings\Application Data\rpjcabry\asbokbbm.exe [7][x][-] -> Found
    • [PUM.HomePage] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.toggle.com/en/index.php?rvs=hompag -> Found
    • [PUM.SearchPage] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.toggle.com/en/index.php?rvs=hompag -> Found
    • [PUM.SecurityCenter] HKEY_LOCAL_MACHINE\Software\Microsoft\Security Center | AntiVirusDisableNotify : 1 -> Found
    • [PUM.SecurityCenter] HKEY_LOCAL_MACHINE\Software\Microsoft\Security Center | FirewallDisableNotify : 1 -> Found
    • [PUM.SecurityCenter] HKEY_LOCAL_MACHINE\Software\Microsoft\Security Center | UpdatesDisableNotify : 1 -> Found
    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for this entry on the Files tab please....

    • [Suspicious.Startup][File] C:\Documents and Settings\Tom\Start Menu\Programs\Startup\asbokbbm.exe -> Found

    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    • O4 - HKCU\..\Run: [AsbOkbbm] :\Documents and Settings\Tom\Local Settings\Application Data\rpjcabry\asbokbbm.ex
    After clicking Fix exit HJT.


    Download and run OTM.


    Download OTM by Old Timer and save it to your Desktop.

    Code:
    :Files
    C:\Documents and Settings\Tom\Local Settings\Application Data\rpjcabry
    C:\Documents and Settings\Tom\Local Settings\Application Data\rjnfbcol.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\phhqysbc.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\etydwfhf.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\ujpvbngd.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\rehldkto.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\xrxpirxi.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\AdbeRdr1012_en_US.exe
    C:\Documents and Settings\Tom\Local Settings\Application Data\phohtxfu.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\445dd65f4c.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\cantwfvf.log
    C:\Documents and Settings\Tom\Local Settings\Application Data\ahtakgrc.log
    C:\DOCUME~1\Tom\LOCALS~1\Temp\jrstrnhs.exe
    C:\Documents and Settings\Tom\yP37FPPq
    C:\Documents and Settings\Tom\QyuWuUdp
    C:\Documents and Settings\All Users\Application Data\htopdtlp.log
    C:\Documents and Settings\All Users\Application Data\jcmhmcrs.log
    C:\WINDOWS\system32\yP37FPPq
    C:\Documents and Settings\Tom\Local Settings\Temp\5.tmp
    C:\Documents and Settings\Tom\Local Settings\Temp\6.tmp
    C:\Documents and Settings\Tom\Local Settings\Temp\qxajpiyk.exe
    C:\Documents and Settings\Tom\Local Settings\Temp\jrstrnhs.exe
    C:\Documents and Settings\Tom\Local Settings\Temp\RABRNOIV.EXE
    
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "AsbOkbbm"=-
    [HKEY_USERS\S-1-5-21-954458941-1417818515-3399203189-1004\Software\Microsoft\Windows\CurrentVersion\run]
    "AsbOkbbm"=-
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Now re run Hitman and RogueKiller again (just scans) and attach logs.

    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     
  4. murwood

    murwood Private E-2

    Hello Kestrel13 and thank you for taking the time to help me.

    I ran HitmanPro and removed the 2 instances of asbokbbm.exe, one required a reboot. After the reboot, Task Manager did not show asbokbbm.exe or jrstrnhs.exe running anymore.

    I then ran RogueKiller and the first 2 items were not there. The rest were deleted.
    It did find catchme.sys, after searching the net I had it delete catchme.sys.

    Under tasks it did not find the asbokbbm.exe entry.

    MGtools\analyse.exe did not find the asbokbbm.exe entry.

    OTM was run and the log file created and attached.

    JRT was run and the log file attached.

    Hitman and RogueKiller were run again, logs attached.

    MGtools\GetLogs.bat was run, logs attached.

    At this point TM does not show any unusual activity, but I have not yet enabled the network adapter and connected it.

    I still can not boot into safe mode, and any use of explorer.exe causes a complete blue screen. At that point I can still Ctl-Alt-Del to bring up TM and start CMD to bring up a command window.

    Also I still get the QtZgAcer.EXE failed to initialize 0x0000005 error twice.
     

    Attached Files:

  5. murwood

    murwood Private E-2

    And the rest of the log files. Hope I did not miss any!
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Most welcome. ;)

    Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

    Note: Make sure you download the correct version for your PC. Only the correct version will work.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  7. murwood

    murwood Private E-2

    Last night I ran MSERT, it found 2 more Ramnit infected files. While replacing them from the original program files, I noticed other files that were suspiciously large. I uploaded 1 to Virustotal online scanner and only 5/55 found it infected. Metascan was worse, only 2/44 found it infected. Some call it Ramnit others call it Nimnul.

    I ran FRST and the 2 files are attached.
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  9. murwood

    murwood Private E-2

    Here is the eset log. Could not attach from infected m/c due to explorer giving blue screen.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK run it twice more, back to back scans. Attach results from each scan.
     
  11. murwood

    murwood Private E-2

    Unable to run eset anymore. Just sits there uploading and downloading thousands of packets.
     
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Can you try using a different browser?
     
  13. murwood

    murwood Private E-2

    IE and Firefox both would not work. Even before I open the browser the network is being swamped with activity.

    As the online file scanners found the infection with Avira, I downloaded it onto a USB stick and moved it to the laptop. It found 1821 files infected with W32/Nimnul.D.
     
  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ramnit infections have really become quite nasty and dangerous. We could attempt to remove it, and we have had some success in the past, but recently it has become even more troublesome to remove. It is really safer to just bite the bullet and do a clean reinstall.

    The problem is that the damage caused by this infection really makes a PC unreliable/untrustworthy. PE file infectors like Ramnit, Virut,.... etc can infect all executable files (DLL, EXE, SCR....and many more and also HTML). These infections can open back doors that truly may compromise your computer and your security. These backdoors could allow a remote attacker to access and instruct the infected computer to download and execute more malicious files.

    In many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus or by other scanning tools. Also when disinfection is attempted, the files often become corrupted and the system may become unstable or irrepairable. The longer Ramnit remains on a computer, the more files it may infect and/or corrupt so the degree of infection can vary.

    Ramnit is commonly spread via a flash drive (usb, pen, thumb, jump) infection where it copies the Ramnit worm using a random file name. The infection is often contracted by visiting remote, crack and keygen sites. These type of sites are a major source of system infection.
     
  15. murwood

    murwood Private E-2

    Ouch....
    I was hoping that would not be needed. A lot of work related stuff on there.

    What would be the best way to make sure all my USB sticks are OK to use and not spreading it around?
     
  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Malwarebytes' Anti-Malware.

    For usb flash drives and/or other removable drives, perform a Full scan. The option for a Flash Scan will analyze memory and autorun objects but that option is only available to licensed users in the paid version.


    Norman Malware Cleaner.

    For usb flash drives and/or other removable drives to scan, use the Add button to browse to the drives location, click on the drive to highlight and choose Ok.


    Dr.Web CureIt.

    Choose Custom Scan after the Express Scan has finished to add your usb or external drive to the scan.

    Other options
    • Microsoft Safety Scanner
    • MCShield Anti-Malware Tool
    • ClamWin Portable Antivirus
    • McAfee Avert Stinger Tool
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds