System Crippling Virus Lowsec/Skynet

Discussion in 'Malware Help (A Specialist Will Reply)' started by wootah, Sep 6, 2009.

  1. wootah

    wootah Private E-2

    Hello,

    I have come here in the previous weeks through google searches to various problems with malware. Up until this point I have been able to find the solutions necessary in these and other forums to deal with the malware (so i thought) but now my system has been completely crippled.

    Tonight, at around 8:30 I was surfing google news using google chrome, opened up five news tabs in rapid succession and got a message from AVG Free 8 (fully updated) saying that some file in my IE temp folder was infected. It couldn't be cleaned or quarantined. I closed my browser down and reopened it and after a few seconds later a message popped up from avg twice more with a different file in the windows system folder being infected. None of them could be found. A few seconds later I got another message saying Adobe acrobat 32 had some error followed by a virus message from AVG for acrobat.

    I closed down all programs and first updated and then ran malwarebytes. I start the scan and disable the network connection because i think it is updating itself as I watch the lights blink away. It detected 14 objects, mostly listed as trojans and stolen data. It cleaned as many as it could and said that some needed a reboot as necessary for complete cleaning. As the computer was shutting down I again got an Adobe Acrobat error.

    I rebooted. The computer started up very slowly and when I went to run malwarebytes after reboot, I was being told the file was not found. Opening up the folder, i tried to run it directly, and it was forbidden. No problem (I thought). I would try to rename it. Access denied (as others in this forum have expressed).

    I reboot and try to jump into safemode. None of the safeboot modes work, so I boot back into normal mode and reinstall a clean set of safemode boot registry files (useful from the last time I had skynet). I successfully boot into safemode and to my horror find that whatever rootkit I have, it functions in safemode.

    I open up RootRepeal (my Savior from my previous skynet infection). It opens fine. I scan the processes. 15 items found, no problem. I tell it to scan my files on my G drive (my /systemroot/) It starts happily along and then suddenly Closes. I click to run it only to find that I am not denied access to rootrepeal as well. I Log onto this computer (netbook) and read up about not having access to files in xp because of viruses, and then following directions on a site I find on google, use the security tab -> advanced to reset all the security access to the folder in which rootrepeal. It lets me run it again, but a soon as I start a scan of files, the file is closed, and I am once again locked out. Ugh.

    At this point I decided to use safety.live.com. Now I have not read this being advertised as a good idea anywhere in any forums, but after my previous infection, with AVG and malwarebytes turning up nothing I went through a lengthy email process with two MS representatives to repair my windows update (destroyed in the previous skynet infection) live.com was able to repair the problem. In the process I noticed it had AV repair online so I logged onto safemode with networking, re-enabled my network connection and went to safety.live.com

    The scan started well but then suddenly the window was closed out. I couldn't start it again and alarmed looked to my network connections. It was greyed out listed as disabled. Not only that but the connection would go through some cycle of disabling when i clicked on it to disable. At this point i thought it was disabled but my router light was flashing happily away for that port, and wondering if windows was reporting it as disabled but really transferring my data away, I disconnected the computer from the router physically.

    I have been on the forums for the last two hours reading others' problems and the stickies. I see that you guys regularly request Mgtools logs, so with some hassle I got them on the infected computer and ran them. Unfortunately no logs were produced. I ran the clean.bat which removed almost everything but then got weird errors when i tried to run it again. After a reboot and another run, no logs were produced a second time. At this point, I am almost convinced the virus has the ability to detect any form of scanning software and kill the process.

    I have no logs from MGtools to attach, but I have tonight's (and my older mbam) logs that I can attach if that will help in anyway. I suspect in some way the infections are all related, as each time they seem the variant of the previous one. This is problematic for me because each time I have 'cleaned it off' MB and AVG would tell me my system was clean (after enough iterations and removal steps). Unfortunately, looking over the logs, I see one entry about skynet again.

    I guess I should attach the obligatory crying smiley :cry but at least I have access to most of my files still. I would like to get this cleaned off and have since read up on the other lines of defense (sun java and spywareblaster) that would have been nice to know about previously.

    I have attached the logs from tonight and past infections.
    Help would be appreciated. I plan on never using Adobe software(flash and reader) again just in case because it seems like it came through there, and I don't use IE for anything except updating windows (which I did last time as soon as it was fixed).

    Thanks for any help that you can give, it would be greatly appreciated.

    Mike
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    What happens when you run MGTools? RootRepeal should have left a txt file for you. We need to see more than what you have attached to help you.
     
  3. wootah

    wootah Private E-2

    I guess I wasn't very clear in my post. I am at work right now, but I remember quite clearly.
    Root Repeal doesn't get a chance to finish before it is terminated and then locked down. If it is generating a .txt file, It certainly isn't in the same directory as the .exe file or anywhere else I can find it.

    The first time I ran MG tools, It just sat at the dos window and did nothing. (IIRC it told me that it had found my system directory and that was it)
    Any subsequent run of the getlogs.bat flashes up a DOS window (blink of the eye) with no logs generated in my root directory of my windows install. Is there a way I can find the logs or even know if the virus is allowing them to be generated, like running from an external source? Please let me know.

    Thanks,

    Mike
     
    Last edited: Sep 9, 2009
  4. wootah

    wootah Private E-2

    TimW

    I got home and Reran Wgtools in Safemode.
    It produced 2 files in the WGtools directory, :

    Filelog.txt
    Getunkey.txt

    I am attaching them to this post. No files were created in the Root.
    It doesn't appear that the malware lets the batch complete. Afterward running the getlogs.bat, I ran the analyse.exe and chose to scan and get logs. The scanning began but was closed a few seconds into the scan. Trying to run it a second time produced the error:

    "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item." Which is the same thing that happened before with RootRepeal.

    Thanks for the Help so far,
    Very encouraging.

    Mike
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I want you to try doing a few things.

    First, see if you can run this:
    If you cannot, then try doing this:
    Win32KDiag - How to run
     
  6. wootah

    wootah Private E-2

    Thanks for the Reply.
    Here are the result:

    It stopped working at the same place that it has in the past, creating the same files as attached in my previous response. I let it sit at that spot for 30 minutes before going on to running FixAVP.exe. Running FixAVP loaded a bunch of files and shut the system down almost in the blink of an eye. After a lengthy reboot I checked the Root folder of the windows drive for any log files. I found nothing. With no MGlogs.zip to attach I went on to run the Win32KDiag.exe. I have attached the log file generated there to this post.

    Thanks for the help, it is greatly appreciated.

    Mike
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please do the below to make a copy of the good system file into the root folder of your hard disk so that we can use it to fix your problem.

    1. Click on the Start button, then click on Run...
    2. In the empty "Open:" box provided, type cmdand press Enter
      • This will launch a Command Prompt window (looks like DOS).
    3. Copy the entire blue text below to the clipboard by highlighting all of it and pressing Ctrl+C (or after highlighting, right-click and select Copy).
      copy G:\WINDOWS\system32\logevent.dll G:\ /y
    4. In the Command Prompt window, paste the copied text by right-clicking and selecting Paste.
    5. Press Enter.
      • When successfully, you should get this message within the Command Prompt: "1 file(s) copied"
        NOTE: If you didn't get this message, stop and tell me first. Executing The Avenger script below will not work if the file copy was not successful.
    6. Exit the Command Prompt window.

    Now download The Avenger by Swandog46, and save it to your Desktop.

    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:

    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.


    Now do the following (make sure you redownload the file. Do not use the old copy.):

    • Copy the Win32kDiag (If on your desktop)(Right click and choose copy / then Open my computer, click on the G drive and paste it there) and save to G:\Win32kDiag.exe. You must save it here!!!!
    • Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please attach this log

    G:\win32kdiag.exe -f -r

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )


    Then attach the below logs:

    • G:\avenger.txt
    • the new log from Win32kDiag
    • G:\MGlogs.zip

    Make sure you tell me how things are working now!
     
    Last edited: Sep 20, 2009
  8. wootah

    wootah Private E-2

    TimW,

    Thanks for the reply.
    Not to sound pretentious or ungrateful for your help, I just wanted to ask if you really meant eventlog.dll(file listed as unaccessible with win32kdiag) or logevent.dll (as you have it entered in the command).

    Just wanted to make sure before I started, thanks for all the help. I really appreciate it.

    Mike
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The first part of the message TimW gave you is correct. The logevent.dll files needs to be copied to the root folder.

    However the Avenger fix was incorrect. Tim was posting to anther thread with Vista at the same time and forgot to change this. The correct script to copy into Avenger is the below:

     
  10. wootah

    wootah Private E-2

    TimW (and Chaslang)

    Thanks for the help. I followed your directions and everything worked without incident as far as I can tell. The files you have requested are attached.

    You guys are great, this has really boost my optimism.
    I am looking forward for the next steps :)

    Mike
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    We are not out of the woods yet.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:

    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\Avenger.txt
    * C:\MGlogs.zip
     
  12. wootah

    wootah Private E-2

    Thanks for getting back to me!
    The files are attached!

    Your comment about restarting my Anti-Virus (avg 8.5) has me curious. Should it start to pick things up as files/rootkits get deleted? It hasn't yet, but my definitions might be out of date. Ever since the virus hosed my internet connection I have left it disconnected from the router ever since. Malwarebytes told me on the day of the infection that some of the files were classified as 'stolen data' And so I was wondering if it is ok at this point to connect it back up again and get updates? If it finds stuff, should i let it take action?
     

    Attached Files:

  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, you should re-enable your AV protection after doing any fix. As for updating the definitions, you can download them and copy them via cd from another computer.

    Please use windows explorer to find and delete:
    G:\Documents and Settings\Ferdinand\Local Settings\Temp\108665750.cvr
    G:\Documents and Settings\Ferdinand\Local Settings\Temp\108713328.od
    G:\Documents and Settings\Ferdinand\Local Settings\Temp\67AD5BE.dmp

    Now double click:
    G:\MGtools\analyse.exe --> tell me what happens.

    If it runs, attach the log.

    Yes, re-enable your connection, update all definitions for AVG, SAS and MBAM. Then run them and attach those logs.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * SAS
    * MBAM
    * C:\MGlogs.zip
     
  14. wootah

    wootah Private E-2

    Tim!

    Thanks for the response.
    -I deleted the files you listed.
    -I downloaded the updates for AVG and moved them to the infected computer and installed them without incident.

    Initially analyse.exe wouldn't run for me. The permissions were still locked down by the virus, so I ran mgclean.bat and then reran the mgtools.exe to recreate the folder. I attached the HJT log to this post (I believe getlogs.bat also includes it in the MGlogs.zip).

    From there I tried to run MBAM.exe and it was also locked down. I get the "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item." error. The suggestion on the internet is to reset the permissions, but right clicking on the file causes the computer to stall (the virus?) for a long while before nothing happens. Right clicking on other files quickly brings up the standard 'right click' menu where I can access the properties.

    I hadn't installed SAS up to this point so I connected to the internet and installed it, updated it, and let it run. It found around 35 trojan agents, of the UAC and skynet variety. I let it clean them and the log is attached here.

    I let the compute restart after cleaning by SAS and then again attempted to run MBAM. It wouldn't work still, and since I cannot rename it and cannot reset the permissions for the program or the parent folder, I then reran getlogs.bat and am calling it a night. I figured these logs would be good enough for now.

    I am posting this from the infected computer, But I will keep it disconnected in case the virus still has the ability to update itself (which is what I believe happened from the previous infections and wasn't entirely cleaned up).

    Thanks For all your help. I really appreciate it all and look forward to your next post.

    Mike
     

    Attached Files:

  15. wootah

    wootah Private E-2

    I Uninstalled MBAM, downloaded a new version, ran the scan of the G: drive. It found two items which were removed.

    I have attached the log.

    A subsequent reboot and scan of the entire system produced no further hits.
    Is the system 'clean yet'? I was at this point last time and got the same virus a couple of weeks later, so I still wonder if there is stuff hidden on the computer.
     

    Attached Files:

  16. wootah

    wootah Private E-2

    I hate to bump this thread before you gentlemen get a chance to respond, but I decided since I now have internet access and MBAM and SAS were turning up nothing new, that I would give safety.live.com a shot at my computer. (Which fixed my windows update problem last time I had the virus).

    I was locked out of internet explorer (like many other programs) and ran this string that I found on the internet that was supposed to reset my permissions/accessibility.

    secedit /configure /cfg %windir%\repair\secsetup.inf /db secsetup.sdb /verbose

    After running it from the command prompt, I was able to again start IE explorer.
    From there I ran the quick scan and found nothing. The Complete scan found 3 additional things that the other too programs cannot find, two of which were fixable, the third was not. Since I have no logs I will attach screenshots.

    I realize that windows live cleaning two of the files from my computer means that I probably need to update my logs, so I reran analyse.exe and getlogs.bat and am attaching the mglogs.zip as well (it has a copy of the hijackthis log inside of it).

    Sorry for the extra files.
    Thanks for the help.

    Mike
     

    Attached Files:

  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your logs are clean. You should use both CCleaner and ATF cleaner ( ATF Cleaner by Atribune ) to remove any leftover internet temp files.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real-time protection. They are useful as backup scanners.They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures in step 3 the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore ato create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  18. wootah

    wootah Private E-2

    Thanks TimW. You have been a huge help.
    If the logs are clean I am happy. The virus found from the live scan was in the temp internet folders, and I think CC cleaner removed all of those.

    I am only having one problem, which I cannot tell is from the virus or may be from damage caused from the virus (and thus not really relevant to this forum). I am getting weird disk errors. I cannot for example access my virus vault for AVG. I get an initialization failed message. The AVG forums say that this is a problem with my computer and not with the Software.

    Office was not working as well, it would lock on startup. The diagnostic tool for office crashed repeatedly, giving me this error:

    Exception Processing Message C00000a3 Parameters 75b6bf7c 4 75b6bf7c 75b6bf7c

    After a couple of crashes I chose to continue and the diagnostic tool apparently fixed it. I had multiple other files 'locked down' by the virus which the secedit string (post #16) seemed to fix, but not all.

    If this is just damage to the hard drive or windows settings is there anyway whatsoever to find and repair this stuff? Reinstalling may work for MBAM, but not so much for necessary windows folders.

    Thanks for all your help. How do I give you one of the 'thanks' things for the forum?

    Mike

    P.S. Is there some sort of thread that explains the motivation/reasoning behind the Malware experts for providing this kind of help. It is really appreciated, but it is also a never ending battle. Do you guys take donations, like the tools you recommend us using do?
     
  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You may need to completely uninstall AVG and then after running CCLeaner, reinstall it. But this is a question for the software forum.
    What files? Are you talking files or program exe's?

    Another question for the software forum.
    You are most welcome.
    Our motivation is just to help people with their issues. Same as those that volunteer their time in the other forums.
     
  20. wootah

    wootah Private E-2

    Fair enough, Thanks.

    MBAM, RootRepeal, and analyse.exe (hijackthis) all wouldn't let me run them, but i could delete them and reinstall them without a problem so at this time there are no other executables that have given me problems.

    How do I give you one of the official forum thanks? Or is that something not available to a forum private? If I wanted to make a donation to you how would I do that? Or in the event that you don't want donations, a software utility of your choice?

    Again, thanks for the help. Everything has been working for a week now with only minor software glitches I am working on, Case closed I guess :)

    Mike
     
  21. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You really don't need to do anything. :) Knowing you are clean is my reward all in itself.
     
  22. wootah

    wootah Private E-2

    Wow. Thank you TimW.
    I appreciate everything. It makes a huge difference.

    And just last night I was browsing opening up dozens of tabs when Comodo Caught a Buffer Overflow in AcroRd32.exe (I didn't even open up a pdf!), which I am sure is the same thing that happened when all this started (and AVG reported right as the system went down), so again thank you. Your advice has saved me severe headache yet again.

    Mike

    (I also uninstalled Adobe Reader and installed Foxit immediately thereafter).
     
  23. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcoee....safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds