Possible Rootkit

Discussion in 'Malware Help (A Specialist Will Reply)' started by HiNachoClan, Jan 12, 2010.

  1. HiNachoClan

    HiNachoClan Private E-2

    I have not had any luck removing what I suspect to be a rootkit / backdoor.
    Notably, there is a driver in system32, "spsb.sys", that seems suspicious (I think it changes it's name each go to something different: "sp*.sys".
    Random issues (such as inexplicably locked files), lead me to investigate.

    This is close to what I am seeing (I think!):
    http://forum.sysinternals.com/printer_friendly_posts.asp?TID=13645

    RootRepeal crashes with an empty error box (lots of posts about "locked to the windows API though").
    Windows Vista SP2, though the exploit could have been installed prior to SP2.

    Please help... :(
     

    Attached Files:

  2. HiNachoClan

    HiNachoClan Private E-2

    One quick addition:
    I managed to run all of the non-file RootRepealer tests and have included the logs. In addition, I included some screen shots of the results I get before the crash. More results in Windows/winsxs/msil.... appear after these images ("Invisible to the Windows API!").
    Thank you again.
     

    Attached Files:

    • RR.zip
      File size:
      379.8 KB
      Views:
      2
  3. HiNachoClan

    HiNachoClan Private E-2

    Alright, I realize you are not supposed to reply to your own topic, but it has been less than an hour (I am not changing the queue) and I found some important info.

    The whole sp**.sys thing is apparently very likely to be a
    "legit" rootkit created by Daemon Tools, a CD virtualization app. That said, I would still be very happy if you gave my logs a once-over.

    Thank you very much.
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    What software notified you of these changes?



    We have a little to do:

    1. Please use MSConfig to put this machine into normal start up mode if you haven't already done so before we continue:

    2. You have combofix running from the wrong location:

    I need it to be directly on your desktop before we continue.

    3. Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    Driver::
    WFPOY
    
    File::
    c:\users\WAZOOT~1\AppData\Local\Temp\WFPOY.exe
    
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    4. Please go to Jotti's malware scan

    (If more than one file needs scanned they must be done separately and logs posted for each one)
    • Copy the file path in the below Code box:
      Code:
      C:\WINDOWS\System32\PJKTMHXS
    • At the upload site, click once inside the window next to Browse.
    • Press Ctrl+V on the keyboard (both at the same time) to paste the file path into the window.
    • Next click Submit file
    • Your file will possibly be entered into a queue which normally takes less than a minute to clear.
    • This will perform a scan across multiple different virus scanning engines.
    • Important: Wait for all of the scanning engines to complete.
    • Once the scan is finished, Copy and then Paste the link in the address bar into your next reply.

    5. Now you did not agree to the Trend Micro HJT license - your logs are missing a HJT log which I would prefer to also see.

    So please now double click the C:\MGTools.exe to run it and this time when asked to accept, bear in mind you may have to click twice (yes it's a bug) When completed attach the C:\Mglogs.zip and also attach the log from Combofix.

    6. Let us know of any problems you may have encountered with the above instructions and also let me know how things are running now.
     
  5. HiNachoClan

    HiNachoClan Private E-2

    I was alerted to sp**.sys by RootRepeal, which I had used to poke around before I came to this forum.
    Also, I had checked MSConfig, and it is still in normal startup mode.

    When I ran ComboFix with the specified script (on the desktop), I simply got an error in the dev console:
    'NIRCMDC' is not recognized as an internal or external command, operable program or batch file.

    I probably shouldn't have, but I decided to re-download combofix and run it again with the same script (I figured ComboFix could not find the developer console it installed earlier). It ran its full scan routine (only without the reboot at the start I saw last time).
    After completing all the stages it rebooted and created a log (after a long delay). I have attached it.

    Next, when attempting the scan at Jotti's, I uploaded the specified file but the upload just hung ("Uploading, please wait..." - progress bar remains empty). Eventually, the window simply said "No File Uploaded!". The service load was very low. Did not work on Chrome or Firefox. I uploaded a random other file and scanned successfully.

    I re-ran MGTools and have attached the results.

    As a final note, I do not see any symptoms of infection. I had an issue with credit card fraud which led me to suspect I might have been compromised, and when I saw the sp**.sys issue, I decided to post here. It is possible that there is no infection, but given that I had a credit card number stolen, I want to be sure.

    I have removed DaemonTools and the "legit" rootkit that came with it, so sp**.sys no longer show up.

    Thank you again for your time.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Could you please get this: PJKTMHXS into a zipped file and attach it for me in your next post? To do this, see the below:

    Please go to start > Run and paste in the following:

    log retrievable @ C:\collect.zip
     
  7. HiNachoClan

    HiNachoClan Private E-2

    The file is 12.9 MB so I have uploaded it to Rapidshare instead.
    Link:
    http://rapidshare.com/files/335295990/collect.zip.html

    Also, I was able to upload the zip to Jotti's (uncompressed it is 97mb, so it seems likely that is why I could not upload it before). None of the scanners found anything, one scanner timed out (?).
    Here are the results:
    http://virusscan.jotti.org/en/scanresult/7d92da0d75ab4a8aa6641ef44ef47aeab196a348

    For what it is worth, I have no idea where this file came from.

    Thanks.
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I would like for you to use Windows Explorer to locate the following bold file:


    C:\WINDOWS\System32\PJKTMHXS

    Right click it and re-name it to PJKTMHXS.old to add the .old extension.

    Let a day or so go by and a couple of reboots. Tell me how your PC is behaving, and then more than likely we can delete that file away and then I can give you final steps.
     
  9. HiNachoClan

    HiNachoClan Private E-2

    I have renamed the file and will get back to you in a day or two after some normal usage.

    Meanwhile, I had a quick question: What do you think the odds are that, at the beginning of this process, I had an active malware infection? As I mentioned, this search was touched off by fraudulent purchases made using my credit card, and malware could help explain that (but so could online holiday shopping from non-mainstream sites). Have there been any dead giveaways? I am not counting the Daemon Tools rootkit.

    I would note that the single virus found by SuperAntiSpyware (Mixxx/uninstall.exe) is very likely a false positive (though I removed it anyway). Mixxx (despite the name) is a moderately reputable, open source sound mixing package (http://sourceforge.net/projects/mixxx/).

    Thanks!
     
  10. HiNachoClan

    HiNachoClan Private E-2

    Computer has been operating without issue.
    What's next?
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Your logs are clean, you can delete the PJKTMHXS.old file now, and follow the steps below:

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    3. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures in step 3 the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  12. HiNachoClan

    HiNachoClan Private E-2

    Thank you again for all the help!
    So you don't think I was infected to begin with?
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    All I know is that I went through your logs, removed a odd looking service that shouldn't have been there and it's corresponding file. I also had you rename another strange looking file and since there has been no system instability or programs broken from doing so, had you delete it. Nothing else is lurking.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds