Student Laptop hijacked with hard to find malware

Discussion in 'Malware Help (A Specialist Will Reply)' started by JT_Everhart, Dec 30, 2012.

  1. JT_Everhart

    JT_Everhart Private E-2

    Hello All!

    This is a laptop for a College Student I was asked to help with before school restarts. I tried all the conventional virus and walware scanners, and was not able to stop the problem :confused. I don't know when the issues first surfaced, but the symptoms included:

    Browser Redirects (IE & Firefox)
    Documents, Pictures and Music hidden
    Sluggish behavior
    Inability to run TDSSkiller (none of the fixes in the sticky worked)

    Before coming to MajorGeeks, I also used TrendMicro's Housecall, Spybot S&D, Malewarebytes and still nothing. The Antivirus constantly gives alerts to processes and such that it blocked/intercepted. Im not at all an expert, but this has been one of the worst cases I've recently dealt with. I'll attach all required files and I appreciate everyone's assistance in fixing this students laptop! :major
     
  2. JT_Everhart

    JT_Everhart Private E-2

    Log Files I forgot to include
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    We have alot to do.

    Hope that you did not run any disk cleaning programs. If you did, they could be permanently gone.

    Run Hitman Pro again and allow it to fix the below MBR infection.
    Code:
     
        Master Boot Record (sector 0)
        > HitmanPro  . . . . : Win64/Bootkit
    
    Also allow Hitman to fix all those Potential Unwanted Programs

    Reboot afterwards and then run a new scan with Hitman Pro and attach the new log.

    Now continue with the below.

    Uninstall the below software:
    Bandoo << Installs malware
    Java(TM) 6 Update 27 (64-bit)
    Java(TM) 6 Update 27

    Now install the current version of Sun Java from: Sun Java Runtime Environment

    Now please download and save the below to your Desktop or anywhere else you can find it ( if the Desktop is not showing )

    http://download.bleepingcomputer.com/grinler/unhide.exe

    Now run it ( if you are running Vista or Win 7, use right click and select Run As Administrator ). Did that help with your missing items?

    Also note that Grinler ( the creator of unhide.exe ) has the below link which gives info on restoring some system defaults when the unhide program
    cannot find backups. Scroll down in the link:

    http://www.bleepingcomputer.com/forums/topic405109.html



    Now please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    :Services
    Bandoo Coordinator
     
    :Files
    C:\ProgramData\SpeedyPC Software
    C:\Program Files (x86)\Bandoo
    C:\Program Files (x86)\Shop to Win 12
    dir C:\ProgramData\1C17 /c
    :Reg
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD22}]
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{58020CD0-0CB8-49C2-B9C2-C42FC5695EB0}"
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD22}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{CF1638E0-6765-414E-BE9A-1AC42E89DE04}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1F44B5B5-7976-4378-9A7F-FE6435E9660F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7DB2D5A0-7241-4E79-B68D-6309F01C5231}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EB5CEE80-030A-4ED8-8E20-454E9C68380F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c}"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=""
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7, make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )


    Now attach the below log:
    • the newHitman Pro log
    • the C:\_OTM\MovedFiles log
    • the JRT.txt log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  4. JT_Everhart

    JT_Everhart Private E-2

    I'd like to first thank you for your time and expertise, Chaslang!

    Unfortunately i've hit a snag already. The first step: run HitmanPro (Under Administrator), and remove said objects, has left the system unable to boot.

    I'm currently running Windows Startup Repair
     
  5. JT_Everhart

    JT_Everhart Private E-2

    None of the repair options has helped boot the system. I am also unable to boot safe mode or successfully from a system restore.

    A quick google search shows me that quite a few people have had this problem in December alone
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes this can sometimes happen with MBR type infections as they are quite nasty. And sometimes removing them can result in unbootable PCs. There is not much choice though. These infections have to be removed as they can be very dangerous. It is very possible that you also had an infected partition as well. The below partition showed and it is very questionable
    Code:
     Partition 4    Primary             10 MB   465 GB

    Let's see if we can get lucky in making it bootable. First I need the results from the below FRST scan.

    Please do the below so that we can boot to System Recovery Options to run a scan.

    For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.



    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  7. JT_Everhart

    JT_Everhart Private E-2

    Alright, was able to complete without a feuss. Here's the FRST log.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Download this >> View attachment fixlist.txt


    Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.
    Now reboot back into the System Recovery Options as you did previously.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Now see if you can boot normal Windows.
     
  9. JT_Everhart

    JT_Everhart Private E-2

    New log after running fix
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Any change?
     
  11. JT_Everhart

    JT_Everhart Private E-2

    Not yet, prompted me to run recovery again to no avail

    edit: On restart it booted!
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then complete the other instructions that were after the Hitman Pro fix.
     
  13. JT_Everhart

    JT_Everhart Private E-2

    So far as I can tell, this fixed things much better than they were. I had already set many files back to normal mode, rather than "hidden" manually, but this string of processes seems to have fixed them. Here are the logs:
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks good now.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  15. JT_Everhart

    JT_Everhart Private E-2

    Everything looks good now! I followed the cleanup steps, and I'll begin to use Spyware Blaster in my fixes, and continue to schedule Spybot S&D to auto-run once a week.

    Thank you for all your time and help, I obviously could not have done this without your assistance! -Salute
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    Malwarebytes is a much better/advanced scanner. And so is SUPERAntiSpyware. Spybot is passe as are tools like Ad-Aware.
     
  17. JT_Everhart

    JT_Everhart Private E-2

    Creature of habit I suppose, from using it for 10 years or so :-D Thanks for the tip. I'll go ahead and look into the paid version of MalewareBytes for it's advanced scheduling feature or try SuperAntiSpyware instead.

    Again, your help was super quick, above and beyond. We can close this one because If there's anything left on this computer, I'm not concerned about it. Many thanks!
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds