RootKit random digit process

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by DKirk, Oct 15, 2011.

  1. DKirk

    DKirk Private E-2

    Hi there,

    My wife presented her laptop to me stating it wouldn't connect to the internet, "Fix it!". So I logged on and yes no connection then AV pops up a message "real time scanning disabled".... Oh great! Could not re-enable it either...Checked task manager and noticed an oddly named process running all digits.

    Found your wonderful forum! Ran SuperAntiSpyware for all of 5 sec before it disappeared, ran Malwarebytes for all of 5 sec before it too disappeared, Combofix didn't appear to even run, RootRepeal ran for about 2 secs before disappearing but MGTools did run, log attached.

    Tried SuperAS portable version, same problem.... Also came across another website that suggested running RKill.exe, exehelper.com, mbrcheck.exe. Exehelper killed the digit process but it reappeared straight away, log attached.

    Help!

    DKirk
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download and run Win32kDiag per the below instructions:

    • Download this Win32kDiag and save to C:\Win32kDiag.exe. You must save it here!!!!
    • Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please attach this log

    C:\win32kdiag.exe -f -r



    Now download Junction,zip to your Windows folder

    • Please download Junction.zip and save it to your Windows folder (i.e, C:\Windows\Junction.zip This assumes C:\ is your Windows boot drive.)
    • Now unzip it and put junction.exeinto the Windows folder (i.e., C:\Windows\junction.exe)
    • Do not try to run it right now. We will run something that uses it later.

    Now we need to reset the permissions altered by the malware on some files.

    • Download and save inhertit.exe to your Desktop: Inherit.exe
    • It must be in your Desktop or the below fix will not work!

    Now run the C:\MGtools\FixPerm.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    • A command prompt window opens and also a license agreement from SysInternals will appear for Junction.
    • Accept the license agreement and the scan will begin.
    • Wait until it finishes we can take a while to run since it scans your whole harddisk. e patient and don't do anything else while it is scanning.
    • The command prompt window should close when it finishes.
    • While this is running, you will get several/many popups that have a title Finish and say OK. Just click the OK button each time. This is an indication that it has found a file and has attempted to fix permissions. Depending on how many files that need to be fixed, you could get only a few or many of these popups.

    And one more scanning tool I want to use to collect more information is OTL per the below.

    Please download OTL by Old Timer to your desktop.
    See the download links under this icon: http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif

    1. Double-click OTL.exe to run (Vista and Win7 right click and select Run as Administrator)
    2. When OTL opens, change the Output (at the top-right portion of the program) to Minimal Output.
    3. Put check-marks in LOP Check and Purity Check.
    4. Now click the http://img171.imageshack.us/img171/2405/runscanotl.png button.



    • When the scan is complete, two logs entitled OTL.txt and Extras.txt will be created on your desktop.
    • Attach both of these logs to your next message.
    Now download the latest version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one. Run the exe and attach the new C:\MGLogs.zip.
     
  3. DKirk

    DKirk Private E-2

    Hi TimW,

    Thank you for your time.

    Logs attached...

    DKirk
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    :otl
    O1 - Hosts: 127.0.0.1       localhost
    O1 - Hosts: 127.0.0.1    www.007guard.com
    O1 - Hosts: 127.0.0.1    007guard.com
    O1 - Hosts: 127.0.0.1    008i.com
    O1 - Hosts: 127.0.0.1    www.008k.com
    O1 - Hosts: 127.0.0.1    008k.com
    O1 - Hosts: 127.0.0.1    www.00hq.com
    O1 - Hosts: 127.0.0.1    00hq.com
    O1 - Hosts: 127.0.0.1    010402.com
    O1 - Hosts: 127.0.0.1    www.032439.com
    O1 - Hosts: 127.0.0.1    032439.com
    O1 - Hosts: 127.0.0.1    www.1001-search.info
    O1 - Hosts: 127.0.0.1    1001-search.info
    O1 - Hosts: 127.0.0.1    www.100888290cs.com
    O1 - Hosts: 127.0.0.1    100888290cs.com
    O1 - Hosts: 127.0.0.1    www.100sexlinks.com
    O1 - Hosts: 127.0.0.1    100sexlinks.com
    O1 - Hosts: 127.0.0.1    www.10sek.com
    O1 - Hosts: 127.0.0.1    10sek.com
    O1 - Hosts: 127.0.0.1    www.123topsearch.com
    O1 - Hosts: 127.0.0.1    123topsearch.com
    O1 - Hosts: 127.0.0.1    www.132.com
    O1 - Hosts: 127.0.0.1    132.com
    O1 - Hosts: 127.0.0.1    www.136136.net
    O1 - Hosts: 127.0.0.1    136136.net
    O1 - Hosts: 8710 more lines...
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
    O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No CLSID value found.
    O10 - Protocol_Catalog9\Catalog_Entries\000000000001 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000002 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000003 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000004 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000005 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000007 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000008 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000009 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000010 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000011 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000012 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000013 - mswsock.dll File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000014 - mswsock.dll File not found
    
    :files
    C:\WINDOWS\1318753475
    @Alternate Data Stream - 816 bytes -> C:\WINDOWS\1318753475:1013671345.exe
    
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.

    Now:
    Download HostsXpert and then follow the below steps.

    • Unzip HostsXpert.zip
    • It will create a folder named HostsXpert in whatever folder you extract it to.
    • Run HostsXpert.exe by double clicking on it.
    • Click the Make Writeable? button. (if you only see a Make Read-Only selection, it is already writeable so skip this button).
    • Click Restore Microsoft's Hosts File and then click OK.
    • Click the X to exit the program


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).
     
  5. DKirk

    DKirk Private E-2

    Hi TimW,

    On starting the laptop I am now presented with a login window prompting for password instead of the usual screen with icons.

    Ran OTL Fix with supplied script, all desktop icons and taskbar disappeared. There was no OK button to click and no Notepad log, just a completely blank desktop. The only function that appeared to work was Task Manager through Ctrl-Alt-Del, no right click options or any other Windows button function seemed to work.

    So after 15 mins tried rebooting, same login screen presented but now a "svchost.exe" application error pops up, "memory could not be read".

    Desktop appears "normal", however OTL icon replaced by standard windows icon and a "permissions error" pops up when trying to run as per every other anti-malware program you have asked me to use. Tried copying another version of OTL with a different name and it ran with the same outcome as before....

    After rebooting from Task Manager I ran HostsXpert and MGTools\Getlogs.bat, log attached.

    Thank you,

    DKirk
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    We are still getting an empty NewFiles log. Let's try doing this:

    Now please we will try using two tools designed especially for this kind of infection.

    • Download AntiZeroAccess to Desktop
    • Also download and save this >> ESETSirefefRemover to your Desktop
    • Now double click on AntiZeroAccess to run it (If running Vista or Windows 7, right click on it and select "Run as an Administrator")
      • Type y and press enter to run the scan
      • Please attach the AntiZeroAccess_Log.txt log to your next message. This file is saved in the same location as AntiZeroAccess program.

    • Now run the Win32/Sirefef tool while in Normal Mode and follow the prompts as directed


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * C:\MGlogs.zip
     
  7. DKirk

    DKirk Private E-2

    Hi TimW,

    Ran AntiZeroAccess which seemed to locate a few files and prompted me to clean and reboot which I did, log attached.

    Upon reboot ran ESETSirefefRemover but this returned nothing found.

    Ran GetLogs.bat but do not get any prompts for HijackThis do still get a lot of errors when running though for which I choose "Ignore" as it advises.

    Getting some where now! :)

    Still get svchost.exe error at login screen, desktop command bar and icons take a good 5 mins to suddenly appear.

    Thank you

    DKirk
     

    Attached Files:

  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Are you now able to run ComboFix and OTL? Would like to see logs from both if you can.

    Please click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple is merely informational.
    cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    ShowNew <-- this will try to run all another scan from MGtools. Tell me what error messages, if any, you see.
     
  9. DKirk

    DKirk Private E-2

    Hi TimW,

    Combofix ran and seemed to do a lot, 2 reboots and log attached.

    OTL ran as well, log attached.

    MGTools still gives lots of errors as per attached Doc1 screenshot.

    Svchost error now gone from login screen, desktop appears straight away but cannot access Network Connections to restore Internet connection just get the hourglass for a few seconds.

    DKirk
     

    Attached Files:

  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    :otl
    :files
    @Alternate Data Stream - 816 bytes -> C:\WINDOWS\1318753475:1013671345.exe
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Tell me how things are running now.
     
  11. DKirk

    DKirk Private E-2

    Hi TimW,

    I have attached an error received after Windows loads.

    Ran OTL script and log attached.

    Ran MGTools, still get lots of cmd.exe errors as per last post (76) as well as the two others attached.

    DKirk
     

    Attached Files:

  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your error messages should be addressed in the software forum.

    I am not seeing any more malware issues, but since your NewFiles log is empty, please re-run OTL and get me the new logs.

    Also, tell me how things are running now.
     
  13. DKirk

    DKirk Private E-2

    Hi TimW,

    OTL log attached.

    How are things running? Network Connections will not run, tried manually starting the service and receive an Error 5: Access denied.

    Do permissions/settings have to be reset after this rootkit is removed?

    Some icons in Control Panel have been replaced with windows default ones and the programs do not run. Likewise with the "old" OTL/rkill/combofix icons on the desktop that were used originally.

    DKirk
     

    Attached Files:

  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download and save the below files into the C:\MGtools folder and overwrite the copies already in the folder with these new versions which should work around the problem.

    GetRunKey

    ShowNew

    NwkTst


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).



    Then attach the below logs:
    • C:\MGlogs.zip
     
  15. DKirk

    DKirk Private E-2

    Hi TimW,

    Files overwritten, ran C:\MGtools\GetLogs.bat and log attached. Same errors still received.

    DKirk
     

    Attached Files:

  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Now we need to reset the permissions altered by the malware on some files.

    • Download this tool and save it to your Desktop: Inherit.exe
    • It must be in your Desktop or the below fix will not work!

    Now run the C:\MGtools\FixPerm.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Tell me how things are running now. You may need to post in the networking forum for you internet issues.
     
  17. DKirk

    DKirk Private E-2

    Hi TimW,

    Ran C:\MGtools\FixPerm.bat and was prompted to click Okay a number of times.

    Rebooted after the cmd window disappeared but there seems to be no changes from before running the batch file?

    DKirk
     
  18. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You may need to post in the software forum for further assistance with your permissions and icons. Have you run sfc /scannow?
     
  19. DKirk

    DKirk Private E-2

    Hi TimW,

    Ran sfc /scannow with nothing apparently picked up. Will try the software forum to get back online!

    Thank you very much for your time.

    DKirk
     
  20. DKirk

    DKirk Private E-2

    Hi TimW,

    After a bit of searching around, I found a suggestion to use the Recovery Console to rebuild the boot.ini and run FIXBOOT.

    This seems to have restored full functionality! :cool

    Thank you for your help and hope this helps others.

    DKirk
     
  21. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know!! ;)

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0


    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds