Jump to content

Smartservice Infection


mejv3
 Share

Recommended Posts

It appears I have the same or a very similar infection described here: 

 

 

I have a randomly named executable file running that I can not access it's folder and I can not close it. I did have several "Windows Process Manager"'s running, but do not have that any more since right clicking on it and deny all permissions to every user. I have not been able to run any anti-virus except malwarebytes - chameleon. It cleaned up most things except the problem described in the removal log linked. Thankfully I can use my computer and internet browser now. 

 

I have followed the steps listed in the linked to log. I have run MBAM multiple times. The first time it found a SYSTEM32/driver that it fixed on reboot. After doing the reboot, I now see a message during boot up that displays "fixing registry file ...." I'm not fast enough to get the name of the registry file, but it appears to be random characters.

I ran MBAM a second time and it finds nothing. The log files for each of these runs are attached. 

I proceeded to run FRST with the mentioned script in the text area.

Start::
CMD: bcdedit.exe /set {bootmgr} displaybootmenu yes
CMD: bcdedit.exe /set {default} recoveryenabled yes
CMD: fltmc instances
CMD: dir /a:-d /o:d C:\windows\system32\drivers
End::

 

I do not have a fixlist file appear on the desktop, but I do have FRST.txt and Addition.txt that appear in the directory I ran them in. They are attached. 

I do have a flash drive ready to use and a spare computer. I don't know how to decide what goes in fixlist.txt. Appreciate your help. 

mbar-log-2018-01-02 (20-11-19).txt

mbar-log-2018-01-02 (20-32-15).txt

FRST.txt

Addition.txt

Edited by mejv3
Typo
Link to post
Share on other sites

Hello mejv3 and welcome to Malwarebytes,

If your computer does not have the Windows Recovery Environment installed and available you can use the following method to run the Recovery Environment from a bootable USB USB Flash drive (memory stick)..

NOTE: This USB USB Flash drive (memory stick). needs to be created from a clean computer. You cannot use an infected computer for this process

NOTE: An 8GB USB 2.0 USB Flash drive (memory stick). is required or at least recommended. In some cases a USB 3.0 USB Flash drive (memory stick). can be used but some computers have issues booting from USB 3.0 USB Flash drive (memory stick)..

Example drive (no endorsement implied, example only) - This drive example has not been tested by me. It is an older 2015 model with many good reviews though.

Amazon: Kingston 8GB DataTraveler 101 G2 USB 2.0 Flash Drive (DT101G2/8GBZ)
NewEgg: Kingston 8GB DataTraveler 101 G2 USB 2.0 Flash Drive (DT101G2/8GBZ)


STEP 1
Download a Windows 10 ISO image from Microsoft.

Method A: Using the Microsoft Media Creation Tool
https://www.microsoft.com/en-gb/software-download/windows10
Download the Media Creation Tool: https://go.microsoft.com/fwlink/?LinkId=691209

Follow the instructions displayed on the tool to download the Windows 10 ISO image.

In my testing I was not prompted for a license key to download the latest Windows 10 ISO image.
At the time of this writing 2017/12/21 there was only one ISO image offered. Windows 10

32-bit x86  or  64-bit x64

Note: You need to run the version compatible with your system.
You can check here if you're not sure if your computer is 32-bit or 64-bit
 

Method B: If Method A: above is not working for you then you can try the following method
Microsoft Windows and Office ISO Download Tool (this is not an authorized Microsoft tool, but appears to be legal)
https://www.heidoc.net/joomla/technology-science/microsoft/67-microsoft-windows-and-office-iso-download-tool
Download: https://www.heidoc.net/php/Windows%20ISO%20Downloader.exe

STEP 2
If you were unable to use the Windows Media Creation Tool in STEP 1 to create a USB disk then you can use this tool to burn the Windows 10 ISO image from STEP 1 above.

Download the Windows USB/DVD Download Tool from Gitbub and save to your computer.
English version: https://github.com/mantas-masidlauskas/wudt/raw/master/Downloads/Windows7-USB-DVD-Download-Tool-Installer-en-US.exe

Then install the Windows USB/DVD Download Tool and run it to burn a bootable USB disk from the ISO image. Browse to the location where you saved the Windows 10 ISO image in STEP 1
Note: This tool should work on XP, Vista, Windows 7, or Windows 10 - it is simply used to make a bootable USB disk. Remember, all of this needs to be done on a clean computer.

MCWx4mf.jpg

5IvFX1o.jpg

1hzeggf.jpg

g1iLLSH.jpg

KkzebK6.jpg

 
STEP 3
Please download the Farbar Recovery Scan Tool and save it to your desktop or other location you know where it's saved to. Then copy it to the USB disk you just created.

Note: You need to run the version compatible with your system.
You can check here if you're not sure if your computer is 32-bit or 64-bit

STEP 4
Shut down the infected computer. Do Not insert the USB disk you created until the infected computer has been shut down.
Once the computer is shut down then insert the newly created Windows 10 USB disk into the infected computer and power it back on and press the appropriate key to bring up the boot menu. The link below will help show you which key for various computers manufacturers is used to bring up the boot menu. Most will be either USB or UEFI depending on hardware and settings. If the computer boots up into the Normal Windows instead of the USB stick it may become infected and need to be completely redone again. Make sure you select the correct boot option.

How to Boot Your Computer from a USB Flash Drive

STEP 5
Once the computer starts to boot up from the USB USB Flash drive (memory stick)., follow the screens and directions below.

Gvt31DC.jpg

wk8hs0E.jpg

F2gCAoF.jpg

X8NEEvb.jpg

You will need to open NOTEPAD.EXE to help find out which drive is your Windows drive and which drive is your USB  ,USB Flash drive (memory stick).you just created

O27kz3e.jpg

RRI6og4.jpg

For the more advanced user you could also use DISKPART to help locate which drive is mapped to your USB disk. In most cases the USB disk will be either D: or E: but depending on hardware the drive could be a much higher level such as H: or higher.

Example only - your hardware will look different

DISKPART> list volume
	  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
  Volume 0     Z                       DVD-ROM         0 B  No Media
  Volume 1     C                NTFS   Partition    931 GB  Healthy    System
  Volume 2     Q   SEA-USB-4.0  NTFS   Partition   3725 GB  Healthy
  Volume 3     D                NTFS   Removable   7636 MB  Healthy


Go back to the DOS Command Prompt (if you used DISKPART type in Exit and press the Enter key) and type in the following and press the Enter key.

CD /D  D: (or E: or whichever drive letter the USB stick is on)

Then type in CD\
and press the Enter key to get to the root or top of the USB disk.

Then type in FRST   or   FRST64  (depending on which version your computer uses) and click the Scan button.

A log called FRST.txt will be saved on your USB Flash Drive. Attach it in your next reply.

If all went well you should now be able to boot into Normal Mode and run Malwarebytes and run a Threat Scan to have it finish the removal process.

Thank you,

Kevin

 

Edited by kevinf80
Link to post
Share on other sites

I've followed all of the steps as described. I no longer see the suspect services running and I do see in the log that they were either moved or removed. My CPU is no longer running at a high percentage. I can run all the anti-virus tools that I previously could not and I have access to the folders the virus restricted me from. It appears I am virus free. Thanks!
Malwarebytes does not detect anything. I don't know how meaningful that is though since nothing was detected previously.

Should I go delete the files that FRST.log mentioned were "moved"? Any specific UAC controls I should check?

There are some clean up issues that I could use help with. These were either caused by the virus or trying to run various anti-virus tools.

Issue 1:
During boot, I now see the two following messages (as much as I can remember of the second one)
1. msln program not found - skipping autocheck
2. Scanning and repairing drive (?//Volume {5...some random characters...

Issue 2:
The log onscreen flashes by and does not require me to enter my password. The computer proceeds to open all the programs as they were when I shutdown the last time I shutdown with the virus.  Note: Shutting down now does not change what is opened upon reboot.

The expected behavior is that a password is required. Once logged in, only
the programs listed in startup in Task Manager will start.

 

Out of curiosity, why was using the windows image used instead of just booting into the cmd prompt of the infected computer?

Again, thanks for the help!

FRST.txt

Link to post
Share on other sites

The initial fixes have to be done from the recovery environment, they will not work any other way... There will be remnants of the infection still on your system, we need to run FRST from Normal mode now and post both produced logs...

Download Farbar Recovery Scan Tool and save it to your desktop.

Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

Be aware FRST must be run from an account with Administrator status...
 
  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"
  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach that log to your reply.

I`m going offline now, will catch up later...

Thanks,

Kevin...

Link to post
Share on other sites

Thanks for those logs, continue with the following:

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

Next,

Open Malwarebytes Anti-Malware.
 
  • On the Settings tab > Protection Scroll to and make sure the following are selected:
    Scan for Rootkits
    Scan within Archives
     
  • Scroll further to Potential Threat Protection make sure the following are set as follows:
    Potentially Unwanted Programs (PUP`s) set as :- Always detect PUP`s (recommended)
    Potentially Unwanted Modifications (PUM`s) set as :- Alwaysdetect PUM`s (recommended)
     
  • Click on the Scan make sure Threat Scan is selected,
  • A Threat Scan will begin.
  • When the scan is complete if anything is found make sure that the first checkbox at the top is checked (that will automatically check all detected items), then click on the Quarantine Selected Tab
  • If asked to restart your computer to complete the removal, please do so
  • When complete click on Export Summary after deletion (bottom-left corner) and select Copy to Clipboard.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more to retrieve the log.


To get the log from Malwarebytes do the following:
 
  • Click on the Reports tab > from main interface.
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

     
  • Use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Next,

Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
 
  • Right-click on AdwCleaner.exe and select user posted imageRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Clean button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Next,

Download Microsoft's " Malicious Software Removal Tool" and save direct to the desktop

Ensure to get the correct version for your system....

https://www.microsoft.com/en-gb/download/malicious-software-removal-tool-details.aspx


Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window
In the "Scan Type" window, select Quick Scan
Perform a scan and Click Finish when the scan is done.


Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\mrt.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....

Let me see those logs in your reply, also tell me if there are any remaining issues or concerns...

Thank you,

Kevin..

fixlist.txt

Link to post
Share on other sites

Hi Kevin,

I ran all the steps as described and the logs are attached. Everything looks clean.

The remaining issues are:

Issue 1:
During boot, I now see the following message (as much as I can remember ):
"Scanning and repairing drive (?//Volume {5...some random characters...)"

Issue 2:
The log onscreen flashes by and does not require me to enter my password. The computer proceeds to open all the programs as they were when I shutdown the last time I shutdown with the virus.  Note: Shutting down now does not change what is opened upon reboot.

The expected behavior is that a password is required. Once logged in, only
the programs listed in startup in Task Manager will start.

MalwareBytesLog.txt

AdwCleaner[C3].txt

Fixlog.txt

mrt.log

Link to post
Share on other sites

Download Portable Windows Repair (all in one) from one of the following:

www.tweaking.com/files/setups/tweaking.com_windows_repair_aio.zip

http://www.majorgeeks.com/mg/getmirror/tweaking_com_windows_repair_portable,1.html

https://www.bleepingcomputer.com/download/windows-repair-all-in-one/

Unzip the contents into a newly created folder on your desktop.

Boot your system to Safe mode, instructions here: https://support.microsoft.com/en-gb/help/12376/windows-10-start-your-pc-in-safe-mode

Open the Tweaking.com folder, run the tool by right click on Repair_Windows (icon with red briefcase) select "Run as Administrator"

From the main GUI do the following:

Select Tab 5 to make Registry backup, use the recommended option...

user posted image

When complete select "Repairs" tab, from there select "Open Repairs" tab..

From that window select the default option and checkmarck "Select All" box. When ready select "Start Repairs" tab....

user posted image

When complete re-boot your system to Normal mode, see if there is any improvement...

Logs are saved to the Tweaking.com folder on your Desktop, the one to post is _Windows_Repair_Log.txt
 
Is there any improvement...?
Link to post
Share on other sites

I ran the program as described. The log is attached.

However, that did not fix either of the issues. I did some Googling and found how to fix each issue.

Issue 1: Scanning and repairing drive (?//Volume {5...some random characters...)"

Fix: Run chkdsk using the Volume name in the boot up message. Found at https://answers.microsoft.com/en-us/windows/forum/windows_10-update-winpc/why-does-my-laptop-run-scanning-and-repairing/19e1d80c-358b-4f72-a10f-6055ffe5a606

 

Issue 2: The log onscreen flashes by and does not require me to enter my password.

Fix: Run netplwiz and set it to require password. Found at https://www.techworm.net/2017/04/bypass-windows-10-8-7-local-administrator-password.html

 

I have no more issues. I appreciate the help!

_Windows_Repair_Log.txt

Link to post
Share on other sites

Thanks for the update mejvs, good to hear you`ve cleared those last two nuisances. We just need to clean up....

Download "Delfix by Xplode" and save it to your desktop.

Or use the following if first link is down:

"Delfix link mirror"

If your security program alerts to Delfix either, accept the alert or turn your security off.

Double Click to start the program. If you are using Vista or higher, please right-click and choose run as administrator

Make Sure the following items are checked:

 
  • Remove disinfection tools <----- this will remove tools we may have used.
  • Purge System Restore <--- this will remove all previous and possibly exploited restore points, a new point relative to system status at present will be created.
  • Reset system settings <--- this will reset any system settings back to default that were changed either by us during cleansing or malware/infection


Now click on "Run" and wait patiently until the tool has completed.

The tool will create a log when it has completed. We don't need you to post this.

Any remnant files/logs from tools we have used can be deleted…

Next,

Read the following links to fully understand PC Security and Best Practices, you may find them useful....

Answers to Common Security Questions and best Practices

Do I need a Registry Cleaner?

Take care and surf safe

Kevin... user posted image
Link to post
Share on other sites

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread.

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.