Win32:Bamital-X explorer.exe & winlogin.exe

Discussion in 'Malware Help (A Specialist Will Reply)' started by adarob, Sep 3, 2010.

  1. adarob

    adarob Private E-2

    Hi there, this is my first experience with a support forum so hope I get it right!

    I am running XP Pro SP3 32bit and have acquired the Win32:Batimal-X trojan affecting explorer.exe and winlogin.exe. When running an Avast scan these files were detected as high threats although can't be deleted as they are read-only system files.

    I have looked at similar threads posted and in particular followed the steps suggested in 'steveyell''s post (08-25-10 23:28) but I had no luck in removing and replacing these files.

    I have attached the log files after completing your 7 steps and XP cleaning procedure. The only trouble I had was with the ComboFix.exe which after producing a log file I lost Windows Explorer and I had to manually shutdown the PC.

    I conducted all the malware removal tools whilst the PC was in 'Safe Mode'.

    Any help/direction with this would be most appreciated.

    Thanks....
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Note: You should never run fixes written for someone else like you were doing. You could break your PC. Fixes can contain specific details tailored to the individual. You can some CFScript.txt patches for ComboFix that have nothing to do with your PC or your problem.

    I want to try a new fix so please do the below in preparation for the fix.

    Now download and save this XPsp3bu.exe to your C:\ root folder ( or to your Desktop if you have a problem saving to the root). You must do this properly. Now run the XPsp2bu.exe program by double clicking on it. You may or may not notice a quick flash of a black window. This is normal. The program runs quickly and just extracts some files we need.


    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7, make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )


    Now attach the below log:
    • C:\MGlogs.zip


    NOTE: The above will not fix anything. These are necessary steps so that I can prepare the next fix.
     
  3. adarob

    adarob Private E-2

    Thanks chaslang, I have attached the MGlog file.

    Realised my mistake after running the other fix and receiving 'blue screen' - however luckily all ok now!
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay now click Start, Run, and enter cmd into the Run box and click OK. This will open a command prompt window. You should see the below prompt in the black window.

    C:\Documents and Settings\Administrator>

    At this prompt type the below command. There is a space after the cd and notice the \ before mgtools

    cd \mgtools

    The prompt should change to

    C:\MGtools>


    Now write this down or print if necessary because when you run the next steps your Internet Explore browsers will be closed and your Desktop will disappear for awhile during the execution of the command. Then you Desktop should hopefully reappear and an Internet Explorer session should reopen a connect to the main page of the Malware Removal forum. You will need to locate your thread to post the log.

    Now at the C:\MGtools> prompt, enter the below command

    BamFix.bat

    After this runs, attach the C:\BamFix.txt log and DO NOT REBOOT your PC until you hear back from me. I will be gone for a while since I have to run out. But do note that the above fix will currently make it necessary for you to use the POWER DOWN button to shutdown your PC when we are ready. The normal logout/shutdown methods from the Start button will not work right now due to the above fix. It will work normally after the next reboot.
     
  5. adarob

    adarob Private E-2

    Hi, I have attached the BamFix.txt log. I accessed the web (this thread) via Firefox and have left it running until I hear back from you. Working at this PC for another 5 hours...:(

    Thanks.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay I'm back for a few minutes and have to run out again so this will be a brief next step. Still do not reboot until I requested it.

    That looks like it ran okay but I'm not sure whether we had 100 % success in replacing the infected files. When the BamFix.bat program was running, did you notice any error messages at all about trying to copy files?

    Please download SystemLook from one of the links below and save it to your Desktop.
    Download Mirror #1

    Download Mirror #2
    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :filefind
      winlogon.*
      explorer.*
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. You can just close this notepad window since the log is already saved on your Desktop. Be patient! It may look like it is not doing anything, but it takes awhile for this to scan thru your whole system look for matches.
    • Please attach the SystemLook.txt log found on your Desktop to next reply.
     
  7. adarob

    adarob Private E-2

    When I was running the BamFix.bat program I did not notice any error messages although the cmd window did not close (still open - attached screen grab of text in cmd). Suggesting it could not replace Windows Explorer as it was still being used by another process?

    Also attached is the SystemLook.txt

    Thanks for helping with this!
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No that is Internet Explorer not Windows Explorer and not sure why it was in use since it should have been closed by BamFix
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay based on your SystemLook log the infection intercepted the changes and infected to files we were trying to use to repair the infection. Something must have still been loaded in memory that contained the infection. Did you have FireFox open when you ran BamFix.bat? If so, close EVERYTHING down except the command prompt window where you ran BamFix.bat. Then in the command prompt window enter the below commands ( this assumes that you saved XPsp3bu.exe to the root folder as requested) Note: Do not use FireFox if possible! Just use Internet Explorer if it works okay.

    C:\XPsp3bu.exe
    BamFix.bat


    Then attach the new c:\BamFix.txt log
    And also rerun the same SystemLook scan again and attach this new log.
     
  10. adarob

    adarob Private E-2

    I tried to run the BamFix.bat with everything closed but received error messages in the cmd window 'the process cannot access the file because it is being used by a different process'. (screen grab attached) - No log file was generated and Windows IE popped up at the end of the cycle.

    The XPsp3bu.exe is in the C: folder.

    I have another formatted drive (E:) installed on the PC, not sure if this would prevent the file deleation?
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay if your Desktop is still showing and if Internet Explorer is still open then:
    • close the command prompt window we opened to run BamFix.bat in.
    • the run the below ESET scan
    • Attach the log from ESET when it is finished. If it tells you that your PC must be rebooted, then reboot your PC immediately and then attach the log after reboot.
    • Then once you have booted up, run the ESET scan a second time and then attach the second log.
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is another user account named utec with administrator priviledges which may be the root cause of the infection. I see the below file in a temp folder for the utec user.

    C:\Documents and Settings\utec\Local Settings\temp\explorer.exe 1033728 bytes [20:39 03/09/2010] [04:42 14/04/2008] 12896823FB95BFB3DC9B46BCAEDC9923


    This is not a location that should have explorer.exe

    EDIT: OK on MD5 code. Just in wrong location.
     
    Last edited: Sep 4, 2010
  13. adarob

    adarob Private E-2

    Ok I'm replying to this on a different PC and running the ESET scanner as you asked in the previous thread. Shall I continue to scan the drive and attach the logs?
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes. Just don't do anything else on the problem PC except what is requested. By limiting what is run, we can contain the infection more.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You know..... in my haste to get a fix posted while running in an out, I think I misread some info in your MGlogs.zip and SystemLook.txt logs after the initial run of BamFix.bat. It looks like the files may have been replaced properly and the only infected files that remained were the backup copies I renamed to have .bad and also the ones from your ComboFix QooBox folderthat have the .vir extension.

    However it does not hurt to run ESET since it will also check to see if other files besides winlogon.exe and explorer.exe have been infected.
     
  16. adarob

    adarob Private E-2

    OK, sounds promising:) just ran the first scan and Bamital files were found and deleted - no sign of winlogin or explorer files being flagged. I'm running the scan again and will post the logs. Internet connection is pretty sloooow at best of times.
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay can you attach the first log and did it ask you to reboot?

    It should have find the infected versions of the files. The below should have been flagged:

    C:\WINDOWS\system32\winlogon.exe.bad
    C:\WINDOWS\explorer.exe.bad
    C:\Qoobox\Quarantine\C\WINDOWS\system32\winlogon.exe.vir
    C:\Qoobox\Quarantine\C\WINDOWS\explorer.exe.vir


    The key will still be to see if it remains clean after a reboot.
     
  18. adarob

    adarob Private E-2

    Here's the first scan log showing the flagged files.

    I was not asked to reboot and had to power off the PC to restart it. Currently running the second scan...
     

    Attached Files:

  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay it found the ones in Qoobox. The ones in System Restore are to be expected since we have not disabled System Restore yet. We will do that later.

    Stop the current scan with ESET.

    Then run a new scan with ComboFix while in Normal Boot Mode.

    After ComboFix is run, now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).



    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  20. adarob

    adarob Private E-2

    In normal boot mode ComboFix is warning that Avast real-time scanner is active. Avast is not in the System tray and I disabled it prior to running all malware scans however it does show up in the task manager processes as AvastSvc.exe SYSTEM. Shall I run ComboFix and accept the warnings?
     
  21. adarob

    adarob Private E-2

    I have attached the 2 log files. I still experienced the warning messeges in ComboFix telling me Avast was running although I checked in the Computer Management>Services and disabled Avast whilst running as an Admin.

    Thanks for help today, off shift now will be back on 10 hours. I'll leave PC as is.
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's okay! Sometimes it just gets confused and you have to run it anyway.

    You're welcome. It is looking good now and I suggest that if you have no more apparent malware problems to do the below as soon as you can.


    Delete the below two files:
    C:\WINDOWS\explorer.exe.bad
    C:\WINDOWS\system32\winlogon.exe.bad

    Then empty your Recycle Bin.


    Then if you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  23. adarob

    adarob Private E-2

    Chaslang, thank you for your invaluable help over last 2 days - Windows looking fine now with no obvious Malware! :) Much appreciated.
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds