Zeroaccess Rootkit on Windows 7 64bit

Discussion in 'Malware Help (A Specialist Will Reply)' started by GuyverZ, Mar 15, 2013.

  1. GuyverZ

    GuyverZ Private E-2

    Hello,

    This is my first time posting an issue to the MG forums, I'm hoping someone can help me out. I've been in IT for many years and have developed my own malware cleanup regiment, however this time it did not work.

    One of our home PC's running Windows 7 Home Premium 64-bit got infected by one of my son's friends. I found out later that he was trying to go to various free software websites for cracked software. The Java 7 was out of date, so I am thinking that was the cause of the infection. It happen about a week ago and I didn't notice anything was wrong with the PC until yesterday when I went to install updates on it. Many updates would fail to install. Itunes, Nvidia driver package among a couple others would simply not run. The messages were all related to corrupted downloads or installer files. I update these programs regularly and this was the first thing to get my attention.

    I ran some tools to check for infection and found that I had the zeroaccess rootkit installed, McAfee's Rootkit Remover saw the rootkit but was unable to remove it. ESET's SirefefRemover was able to remove it, or so I thought. I am still getting weird network connection drop-outs and delays as well as the installer issue is still there. Many downloads through IE10 and Firefox 19.0.2 will get corrupted, and the programs will not run. So I must still have some remnants of the zeroaccess program, or other spyware still.

    So i ran through the Major Geeks Win7 Malware cleaning process (RogueKiller, MalwareBytes, TDSSKiller, HitmanPro, then finally MGtools), saving all of my logs (see attached logs).

    The machine is still acting strange after that process so I need help from a Majorgeeks expert!

    Thank you!
     

    Attached Files:

  2. GuyverZ

    GuyverZ Private E-2

    I had a system image backup of this system from before the infection, I am currently restoring it from there, re-formatting the hard drive first. I will report back if this is successful in fixing the issue.

    Thank you,
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!
    Was not necessary as we likely could have fixed it. Did not notice too much of significane in your logs though. Maybe just the below from ZeroAccess:
    C:\$Recycle.Bin\S-1-5-21-3698642035-3385020065-1026497421-1001\desktop.ini

    But let us know if you need any more malware removal help.
     
  4. GuyverZ

    GuyverZ Private E-2

    Unfortunately the system image didn't go back far enough, the Zeroaccess rootkit was still in there.

    I have re-run all of the tools again and attached new logs. I only did a quick-scan with MalwareBytes as a full scan takes 4+ hours on this system, plus it didn't find anything the last time I ran a full scan with this particular infection anyway.

    Attached are the new logs, let me know what I need to do next.

    Thank you!
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please download OTM by Old Timer and save it to your Desktop.
    • Run it by double clicking on it (Note: if using Vista, Win7, or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    
    :Files
    C:\$Recycle.Bin\S-1-5-21-3698642035-3385020065-1026497421-1001\desktop.ini
    C:\ProgramData\Babylon
    C:\Windows\TEMP\*.*
    C:\Users\Kat\AppData\Local\Temp\*.*
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Prod.cap]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  6. GuyverZ

    GuyverZ Private E-2

    OK, I ran OTM with the script you gave me and ran the MGTools GetLogs.bat file again. I have attached the logs.

    The computer seems to be running normally again. No more strange network disconnects, and most importantly no more corrupted signatures on downloaded installers.

    If the attached logs look clean I think I am in good shape. Thank you so much for your help!
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Your logs are clean.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  8. GuyverZ

    GuyverZ Private E-2

    OK, got it all cleaned up and the UAC and System Restore re-enabled. Thank you again for your help!
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds