Persistant Trojan. Could use some help.

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by PrivatePile, Dec 14, 2011.

  1. PrivatePile

    PrivatePile Private E-2

    I'm usually pretty good with cleaning this stuff up (with alot of help from you guys! :)) but this ones sticking me. Someone at my work got a Trojan on their machine. SAS and Malwarebytes found nothing, and to get him back productive again, I replaced his harddrive and installed windows fresh. I assumed (stupidly I know now) that I was safe to USB his harddrive to my PC to recover his documents. Now my PC is infected. We have Trend Micro OfficeScan as a corporate Antivirus, and its sending out alerts saying its found a trojan but can't remove or quarantine it. If I run a manual scan, it finds nothing. Here are what the alerts are saying are on my PC.

    -TROJ_COMRO.DU
    -TROJ_SIREFEF.BX
    -TROJ_GEN.R3EC7LA

    I went through the Removal Process last night, along with running TDSKiller, and everything came up clean. When I attached to the network this morning, more alerts popped up. I ran system restore back to last week (12/7), then ran through the removal process again, and more alerts came out just prior to running combofix.

    I just want to make sure I'm clean and safe at this point. I dont want to jeopardize the company, and I'm trying to avoid reformating the machine if possible. I feel like that is giving in and I wont go down without a fight.
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hello there. :)


    Please read ALL of this message including the notes before doing anything.

    Please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. PrivatePile

    PrivatePile Private E-2

    My fault, for some reason the attachments did not attach the first time.
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    One of your logs was incomplete.

    IS UAC disabled?

    Please click Start, All Program, Accessories and you will see ( among other things ) a Command Prompt entry.

    • Right click the Command Prompt entry and select Run As Administrator.
    • o It is critical that you run it this way.
    • If you do this properly, a command prompt window will open with a title of Administrator Command Prompt.
    • Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple/brown is merely informational.
    cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    SN64 <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.

    Attach the C:\Mglogs.zip.

    Also -

    Download OTL to your desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply please.
     
  5. PrivatePile

    PrivatePile Private E-2

    I didn't see any error appear. I attached the MGTools.zip as requested, as well as the Notepad report that appeared. I saw where it said somethings were not found, so I gave you a screenshot of the CMD prompt to show you. I'm running OTL now.

    This morning I got this prompt from Trend Micro, though I manually couldn't find that .txt file, even with hidden files showing.

    Virus/Malware: Eicar_test_file
    File: C:\Users\dwear\AppData\Local\Temp\Av-test.txt
    Date/Time: 12/15/2011 8:58:38
    Result: Virus successfully detected, cannot perform the Clean action (Quarantine)
     
  6. PrivatePile

    PrivatePile Private E-2

    Here you are. Thanks again for your help.
     

    Attached Files:

  7. PrivatePile

    PrivatePile Private E-2

    Here is also the newfiles.txt that came up with MGtools, and a screen shot of its CMD prompt, just so you can see what it said was missing.
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I am due in at work now, I'll be back in a few hours. Please run this in the mean time and attach the logs.

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run


    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
     
  9. PrivatePile

    PrivatePile Private E-2

    No Worries. Thanks for your help again. Here are the logs.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Not seeing any malware.
    I am going to need full file names and file paths to these threats.

    Are you set up to use a proxy? I presume so. Just got to check.
     
  11. PrivatePile

    PrivatePile Private E-2

    Here is the alerts that I got from Trend.

    It is possible that it got removed when I System Restored back a week? I've never seen System Restore successfully remove a virus, but I guess it is possible. Any possibility it attached to any flashdrives that were connected? I'm confident in your analysis. If you don't see anything, toggle system restore and done?

    Any recommendations on how to recover files off an infected hard drive, without infecting myself? Or disinfecting the hard drive without booting it?

    Thanks again for you time, even if I did waste it. I appreciate it.
     
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Let's do this.

    Now we need to use ComboFix by sUBs

    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    File::
    C:\Windows\system32\consrv.dll
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Is this regarding another computer? Why not run the scans on it if so?
     
  13. PrivatePile

    PrivatePile Private E-2

    I ran ComboFix as instructed. It rebooted my machine (prompting Trend to Re-enable itself). Attached is the logs.

    This is now a stand alone hard drive. The PC that was infected was necessary for business critical operation, so I replaced his hard drive and reloaded windows as it was less time consuming than running the scans. It is possible however that there are documents on this hard drive that might be needed. Just wondering if its possible to recover those files without getting infected.
     

    Attached Files:

  14. PrivatePile

    PrivatePile Private E-2

    That is nothing I need your time for, as I know your time is stretched already. Its something I can do on my own with whatever tips you can give me. I highly doubt anything on the hard drive is important enough to be business necessitated.
     
  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You could slave the hard drive and run SAS and MBAM on that drive. You should have no problems if you are just copying documents. I highly doubt they would be infected. Just avoid copying exe files, etc.
     
  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi PrivatePile, is everything running okay? :)
     
  17. PrivatePile

    PrivatePile Private E-2

    I'm not noticing anything wrong, but then again I haven't. When I plug back into the work network on Monday I'll know for sure. As long as you don't see anything, I'll try it out and see what happens. Thanks again!
     
  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required (If we renamed it please rename it back to Combofix.exe.
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  19. PrivatePile

    PrivatePile Private E-2

    Plugged back into work this morning and did not receive a single alert of malware :) Thanks again so much! You guys are AWESOME!!!
     
  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome. Glad everything is running nicely again. ;) Safe surfing!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds