Trojan.FakeAV - unable to run any form of A/V removal

Discussion in 'Malware Help (A Specialist Will Reply)' started by v_w, Feb 3, 2011.

  1. v_w

    v_w Private E-2

    I have been given a PC to fix. Certain fixes were attempted by the owner of the PC but I am unaware what exactly has been done.

    The user describes a "You have virus" message popping up while browsing normally and being of an older generation, panicked and clicked "scan and fix". IE then stopped working completely.

    I initially scanned with my preferred virus tool (ClamAV) and found an infected file called flash_stream-viewer-v.48206.exe which was flagged as containing Trojan.FakeAV-3608 this file was then removed from the PC.

    I have attached the log should it be of any interest - clamav_report_280111.txt

    All subsequent attempts to run more mainstream AV tools have failed - more details below.

    **********

    I have read and digested all the sticky posts on virus removal. I have run all housekeeping procedures, UAC is off and CD emulation has been halted. I have followed the instructions for Vista virus removal and my results are as follows;

    SUPERAntiSpyware - ran through from the HDD and found and cleaned(?) 4 errors - log attached SASLog_013111.txt - now no longer runs instead displays a permissions error despite the user account having the required access.

    Malwarebytes Anti-Malware - installs fine, clicking "Perform quick scan" starts a scan which works for 5 seconds, then the GUI disappears completely. Subsequent attempts to run MB from the desktop shortcut result in an error;

    "Windows cannot access the specified device, path or file. You may not have the appropriate permissions to access the item"

    The security tab of the mbam.exe properties box shows the user has been changed to "Everyone", presumably by this virus. Changing it back to normal permissions, results in a repeat of the above.

    ComboFix - exactly the same results as above.

    RootRepeal - ditto

    MGtools - ditto

    I also attach a log gleaned from running GMER - GMER_020211.txt

    I cannot run a full GMER scan because it crashes/BSODs the machine when it begins to scan the HDDs, I can however run a Process Scan which shows there is a rootkit in action.

    I detest asking for help but this one has be stumped.

    I welcome your expert advice.

    / vw
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Welcome to Major Geeks!

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop

    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor.
    • Allow the application to run and a window will open showing that it is TDSSkiller from Kaspersky
    • Click Start scan
    • It will run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )



    Please download and run the below tool named Rkill (courtesy of BleepingComputer.com) which may help allow other programs to run.

    There are 4 different versions. If one of them won't run then download and try to run the other one.

    Vista and Win7 users need to right click and choose Run as Administrator

    You only need to get one of them to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.
    1. Rkill.exe
    2. Rkill.com
    3. Rkill.scr
    4. Rkill.pif
    Once you've gotten one of them to run then try to immediately run the following.

    Now download and Run exeHelper from Raktor
    • Please download exeHelper to your desktop.
    • Double-click on exeHelper.com to run the fix.
    • A black window should pop up, press any key to close once the fix is completed.
    • A log file named log.txt will be created in the directory where you ran exeHelper.com
    • Attach the log.txt file to your next message.
    Note: If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together (they will both be in the one file).

    Now try Malware Bytes again.

    Now run this: Using MGtools


    Now you need to attach (See: HOW TO: Attach Items To Your Post ) the below logs created while running the above scans
    • exeHelper log
    • MGlogs.zip - normally it is C:\MGlogs.zip - only attach this log from MGtools.exe DO NOT attach any logs seen in the MGtools folder.
     
  3. v_w

    v_w Private E-2

    Thanks for the welcome and the quick reply - very much appreciated.

    TDSSKiller ran as it should and the log is attached - TDSSKiller.2.4.16.0_03.02.2011_16.54.06_log.txt

    Rkill.exe again ran as expected, I have the log but have not attached it as it wasn't requested and nothing was terminated.

    exeHelper ran fine, log attached - exehelperlog.txt

    Malwarebytes performed as per the explanation in my first post - fine for a few seconds then vanishes, edits permissions and so on.

    MGtools as above. Appears to work, a command line window opens and the MGtools folder is created, but then the command line window disappears. The fixes as detailed in your linked post don't work either.

    / vw
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Try renaming C:\MGTools.exe to C:\ghft.com and try running it in safe mode if not normal mode.

    If you really still have no luck try the below as I really need more information:

    Download OTL to your desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.
     
  5. v_w

    v_w Private E-2

    Frustrating isn't it, but I bet you've seen worse!

    MGTools renamed, safe mode and normal mode - same issue, runs then closes itself.

    OTL works fine and the logs are attached as requested.

    Your help is appreciated.

    / vw
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    The infection you have is difficult to tackle. I am due in at work in ten minutes so when I return I will make a start on a fix for you but I may need the help of Chaslang.
     
    Last edited: Feb 3, 2011
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Well I think I was mistaken with saying I think I see which type of infection you have. Let's have you try and do the below:

    Please click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple is merely informational.

    cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    ShowNew <-- this will try to run all another scan from MGtools. Tell me what error messages, if any, you see.
    GetRunKey <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.

    Have you now got a C:\Mglogs.zip?
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes I was wrong in my original statement about the infection. Was not what I thought it was! let's continue on.

    Where?

    Without clicking on any of the contents, tell me what's inside of the below pair of folders?

    C:\Windows\System32\ZNBWRWC
    C:\Windows\System32\GBIYZZANY

    Can you do this?

    Run this and attach the results.

    Using ESET's Online Scanner

    Also try the below considering you are having problems with Superantispyware & MalwareBytes.

    Using Inherit to correct program execution permissions issues
     
  9. v_w

    v_w Private E-2

    ShowNew briefly displays a command line window then it closes, it's a flicker so it's impossible to see what the text says.

    GetRunKey as above.

    I have and it's attached - MGlogs.zip

    When using GMER to scan running processes I was informed a rootkit was in operation (I think that's the wording) and a selection of files appeared in the rootkit tab. The log is attached to my first post - those are the files that were flagged.

    They are files (rather than folders) with no extension and seemingly no content. Both were created at 18:00 (GMT) yesterday (Feb 2nd). Which is, I think, around the time I powered down the infected machine before leaving work.

    It scanned 743 files and then finished with nothing detected.

    I know there are far more files than that so I ran it again, this time it returned an error during step 2 of 4; Unexpected error 101

    Inherit returns the permissions to the files, but whatever is strangling this machine regains them within a few seconds of running the program (and shuts it down as before)

    Sorry and thanks for your continued support.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Your infection is one of the older forms that we have not seen for a while.

    First disable UAC and reboot if you have UAC enabled!

    Please download and run Win32kDiag per the below instructions:
    • Download this Win32kDiag and save to C:\Win32kDiag.exe. You must save it here!!!!
    • Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please attach this log
    C:\win32kdiag.exe -f -r


    Now download Junction,zip to your Windows folder
    • Please download Junction.zip and save it to your Windows folder (i.e, C:\Windows\Junction.zip This assumes C:\ is your Windows boot drive.)
    • Now unzip it and put junction.exeinto the Windows folder (i.e., C:\Windows\junction.exe)
    • Do not try to run it right now. We will run something that uses it later.

    (Try inherit again but you already have it downloaded)

    Now we need to reset the permissions altered by the malware on some files.
    • Download and save inhertit.exe to your Desktop: Inherit.exe
    • It must be in your Desktop or the below fix will not work!
    Now run the C:\MGtools\FixPerm.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).
    • A command prompt window opens and also a license agreement from SysInternals will appear for Junction.
    • Accept the license agreement and the scan will begin.
    • Wait until it finishes we can take a while to run since it scans your whole harddisk. e patient and don't do anything else while it is scanning.
    • The command prompt window should close when it finishes.
    • While this is running, you will get several/many popups that have a title Finish and say OK. Just click the OK button each time. This is an indication that it has found a file and has attempted to fix permissions. Depending on how many files that need to be fixed, you could get only a few or many of these popups.
    Now see if SUPERAntiSpyware and Malware Bytes will run.

    Try running C:\MGTools.exe again (but we renamed it so run it as it is with it's new name)

    Also attach the C:\MGlogs.zip file now if there is one that is not incomplete.
     
  11. v_w

    v_w Private E-2

    I don't like keeping up with all these modern trends :-D

    Win32kDiag ran fine - log attached as a zip due to the file size - Win32kDiag.txt.zip

    FixPerm.bat also ran fine - quite a few OK boxes to click and then the license agreement to accept but then that was it.

    SUPERAntiSpyware - sorry, no dice

    Malware Bytes - ditto

    MGTools.exe - Not quite sure if this is actually working as it doesn't run as per the instructions. I have attached the MGlogs.zip though because there is a new log (junclog.txt) included.
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Rest assured you have not been forgotton. Hang in there.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.
    Now rerun Win32kDiag like last time.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\avenger.txt
    • the new Win32KDiag log
    • C:\MGlogs.zip
     
    Last edited: Feb 6, 2011
  14. v_w

    v_w Private E-2

    I understand you have a life outside of here - not problem at all.

    Thanks for all your assistance so far.

    Thanks for helping with this.

    Once I convinced my SmoothWall firewall that this file wasn't "Trojan.Agent-119128" (at least my security measures work huh!) everything went to plan.

    This has fixed the issue of programs closing before completion and I can now attach completed logs for Avenger (avenger.txt) MGtools (MGlogs.zip) and Win32kDiag (Win32kDiag.txt.zip).
     

    Attached Files:

  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Why am I not seeing any antivirus installed?

    Delete these files using windows explorer.
    • C:\Windows\System32\GBIYZZANYGBIYZZANY
    • C:\Windows\System32\ZNBWRWC
    • C:\Windows\Tasks\{BB65B0FB-5712-401b-B616-E69AC55E2757}.job

    Run Ccleaner. Only use the Run Cleaner button. Do not run anything else on any other forms.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    What problems remain, how are things running?
     
  16. v_w

    v_w Private E-2

    AVG Free was initially installed but the user had not been updating or scanning regularly. I removed AVG and replaced it with avast!, however, when I went to update avast! I realised my error (unable to run the program at all) and it was too late to do anything about it.

    As a lot of the processes described in the Read Me thread involved disabling antivirus programs and/or firewalls I figured it was easier to just completely remove and disable all (software based) forms of protection while I waited for assistance.

    The computer is currently on a network which is protected by a SmoothWall firewall so it isn't completely open. Once this infection is clear I will be reinstalling avast! and Comodo Firewall.

    **********

    I have deleted those files as instructed.

    Ccleaner run successfully.

    MGtools run and fresh logs are attached - MGlogs.zip.

    I ran Malwarebytes purely to see if it would run (which it does!) and it found 3 infections - I have attached a log - mbam-log-2011-02-07.txt

    Not wanting to get ahead of myself (or your advice), I note that the HJT log in MGlogs.zip contains a few services which are just random strings of letters pointing to the temp folder. Were/are these the cause of the initial infection?

    I'm interested to know what the infection was too, if you have the time to explain.

    Thanks again, I know I keep saying it, but your help really is appreciated.
     

    Attached Files:

  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Well I had assumed that you had sysinternals installed on this machine but you do not so we will be rid of those.

    As I said, Chaslang said it was an older infection, not sure which type.

    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Considering MalwareBytes ran, does Combofix now run too? Try now.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  18. v_w

    v_w Private E-2

    You assumed correctly (you MG folk are damned clever) - it was on the machine while I was attempting to monitor running programs. I was running it from a flash drive though.

    Avenger ran and the log is attached - avenger.txt

    Combofix works too (yay!) - I had a brief brown-trouser moment whereby every shortcut I clicked told me the registry key was marked for deletion. I finally realised I had to reboot the machine again - doh!
    Log attached - combofix_log.txt

    MGtools log attached - MGlogs.zip
     

    Attached Files:

  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    One more service left over from Sysinternals.

    Open notepad and copy and paste the following text in the quote box into the window:

    • Save this as fix.bat
    • Choose to save as all files.
    • Doubleclick fix.bat and let the program run.
    • A small black dos window will flash, this is normal.

    Now, if things are running well, then we will be ready for final steps soon. Any issues remaining at this point?
     
  20. v_w

    v_w Private E-2

    fix.bat run and the final Sysinternals entry has now gone.

    Malwarebytes isn't finding anything

    SUPERAntiSpyware isn't finding anything

    I've not put avast! or Comodo on yet and wont do so until we're done here.

    To answer your last question, no, no remaining issues - thank you so much!

    Is there a donate option, I feel I owe you a lot.
     
  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're most welcome. Surf safely. :)

    There are links at the end of each of my posts for software and clothing. ;) Take a look if you like.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  22. v_w

    v_w Private E-2

    I'd prefer to make a donation, but if there's no other way, I'll do what you suggest.

    The PC is spotless (but for how long?)

    I've put avast! on there and for now I've recommended he just use the Vista firewall. I may purchase one of the firewalls in the MG Store, but I know he wont continue to pay for new versions. I can only recommend sadly.

    Once again, thank you so much for your assistance.
     
  23. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    On behalf of Chaslang too, you are welcome. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds