Poss svchost issue

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Heyman7, Dec 19, 2011.

  1. Heyman7

    Heyman7 Private E-2

    Hey Guys,

    I may be dealing with an infected svchost file. For the past few months I have not been getting the typical pop ups or browser redirects but I have noticed strange activity with Wireshark. I've also noticed strange activity on some of my event logs.

    "Special privileges assigned to new logon"
    "An account was successfully logged on"
    "An attempt was made to reset an account's password"

    Some of it was coming through VmWare, which I don't use anymore. I went on and deleted VMWare and my security logs don't show too many odd occurrences anymore, possible backdoor through vmware? Maybe a vulnerability in there. Also, for the past few months I don't have access to certain files/folders on my computer - I receive a denied message. Today my svchost file prompted Norton to open up and inform me my usage was extremely high or that it was taking up a lot of resources. I believe there is either some sort of rootkit or my svchost is vulnerable, Any assistance would be appreciated

    I ran a Super Anti Spy and it recovered something but no log for it was saved. I will run again and upload in next post and I ran a MalwareAntiBytes and nothing was recovered

    Mainly, I would like full control to all my folders again, even though no pop ups or anything like that occurred I would like to get to the bottom of suspicious activity thanks
     

    Attached Files:

  2. Heyman7

    Heyman7 Private E-2

    2 more logs attached

    Also within the past 3 months, it looks like some profiles were created but I believe I was able to locate and remove them. I made the mistake of going online using a admin account instead of a guest
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You are way out of date with your version of SUPERAntiSpyware.
    • Please uninstall your current version (this is necessary).
    • Then download this SUPERAntiSpyware
    • Install this new version. It may tell you that you need to reboot to complete the installation. You must reboot at this time.
    • After the reboot, run SUPERAntiSpyware and immediately click the Check for Updates button to get more updates for the database.
    • Now run a new full scan of your system. And attach this new log.

    Also you are way out of data with your version of MGtools.

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7, make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )

    Now attach the below log:
    • C:\MGlogs.zip
     
  4. Heyman7

    Heyman7 Private E-2


    Thanks Chaslang,
    I will uninstall both this evening if you need me too.
    I would like to note that when opening "SuperAntiSpyware" & "Combofix" & "MGTools" the program itself automatically prompts the user to download the latest updates. The programs connect directly to the FTP and automatically updates.
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I have a few comments about this.
    1. I did not ask you to update ComboFix.
    2. SUPERAntiSpyware only updates that databases for detections when you update it. When the program version changes, it has to be uninstalled and then reinstalled to get the proper program version. Then you have to update the databases again.
    3. MGtools absolutely does not do anything to automatically update. There is no such feature built into. And old versions should not be kept. It is always supposed to be redownloaded before using as it changes all the time.
     
  6. Heyman7

    Heyman7 Private E-2

    Uninstalled, reinstalled both programs with attached logs.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is no obvious sign of malware in your logs. The only questionable thing I see right now is in your partitioning information which shows the below
    Code:
    Partition Disk #0, Partition #0 
    Partition Size 11.72 GB (12,582,912,000 bytes) 
    Partition Starting Offset 1,048,576 bytes 
    Partition Disk #0, Partition #1 
    Partition Size 100.00 MB (104,857,600 bytes) 
    Partition Starting Offset 12,583,960,576 bytes 
    Partition Disk #0, Partition #2 
    Partition Size 286.27 GB (307,382,018,048 bytes) 
    Partition Starting Offset 12,688,818,176 bytes 
    
    Did you do this? Is that 100 MB ( 100 Megabyte ) partition something you did to do multi-booting or something with VMware? This partition is also the active partition rather than your Windows installation drive being the active partition. This is something that recent TDL infections having been doing. Although they normal insert their infected partition at the end of the partition table and not in the middle. So what is the 11.72 GB partition for an what is the 100 MB partition for?



    Goto the below link and follow the instructions for running TDSSKiller from Kaspersky ( use this link as your version is old ),
    • Be sure to attach your log from TDSSKiller
    Now please also download MBRCheck to your desktop.

    See the download links under this icon http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )
    Also let's see if the below will help with your complaint about permissions.

    Download SubInACL.msi from Microsoft.
    • Now double click on SubInACL.msi to run the installer. Accept any prompts you get about installing this.
    • Now download the below file and save it to your Desktop:
    • Now right click onresetperm.cmd and select Run As Administrator to run this script. Be patient as this may take awhile to run. Also it is imperative that you Run As Administrator. This is not the same thing as your user account having administrator priviledges.
    Once it finishes, reboot your PC and see if it helped.
     
    Last edited: Dec 20, 2011
  8. Heyman7

    Heyman7 Private E-2

    The 11.72 is from me. Earlier in the fall, I made some space for Windows Server. At one point I had a boot where I could select either Windows Server/Linux or Windows 7. I recall either running a older version of MGTools or maybe Combofix and on the next reboot, I was no longer giving the option to select out of the 3. Unless the infection got a hold of it.

    When I could no longer select the other 2 options at boot (Server and Linux), I went and attempted to delete the partition and I thought I had added the space back to my main drive. The 100 MB was free space. Sorry, still a novice with this computer stuff.

    Attached items, I am trying to attach a word doc as well
     

    Attached Files:

    Last edited by a moderator: Dec 22, 2011
  9. Heyman7

    Heyman7 Private E-2

    screen shots of groups or usernames that I don't recall
    attached. They are not visible in the control panel either
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    But it is not just free space according to your logs. I see the below showing it to be your active boot partition
    Code:
    Get Partition Info From WMI in K-bytes                          
    ==============================================================  
    Bootable  Name                   Size          Type                     
    FALSE     Disk #0, Partition #0  12582912000   Unknown                  
    TRUE      Disk #0, Partition #1  104857600     Installable File System  
    FALSE     Disk #0, Partition #2  307382018048  Installable File System 
    I think you should have Disk #0, Partition #2 as your active boot partition. I'm not sure if this 100 MB partition is an infected one or not but we have been seeing quite a few of them that are.
     
  11. Heyman7

    Heyman7 Private E-2

    I would like to delete the partitions. I will check into that this evening.
    Active? I'm not sure. All I remember is one day I cut the pc on and Windows 7
    was the only option I was able to select.

    I have not used Wins Serv 2008 or Linux since early October.
    I'm not sure how they are active.
     
    Last edited by a moderator: Dec 22, 2011
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    They aren't! The 100 MB partition which is too small to be any real operating system is active. You need to make the Windows 7 partition the active. You need to boot from your Windows 7 DVD to do this. The bootrec /fixboot command run from the command prompt in the System Recovery Environment should be able to do this. If it does not boot up after this. The rebooting from the DVD and running Startup Repair may fix it.

    You really should backup all important data before making any changes.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds