Jump to content

Rogue service process left after otherwise successful MBAM detection/deletion


Recommended Posts

Please ignore or close http://forums.malwarebytes.org/index.php?showtopic=71184 -- I hit "Send" before realizing I hadn't

pasted in the DDS log, so I posted a reply to it with the DDS log -- and *then* I read that I shouldn't have replied to

my own post within 48 hours, because that could cause it to be skipped over by the folks authorized to help me. So I am

reposting here, with the DDS log properly pasted and the attachments properly zipped. Sorry for the duplication.

===

My son's computer was attacked a couple of days ago when he browsed to a malicious website.

He ran MBAM (1.50.1, database version 5383), which detected and deleted *most* of the malicious attack artifacts, but not

all.

The attack disabled his Microsoft Security Essentials -- removed the MSSE entry from

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run, disabled the MsMpSvc service, and launched a malicious

service (in a rundll32.exe launched by the regular svchost.exe for the netsvcs service group).

The maliciously launched rundll32.exe loaded a dll named ntmsdba2.dll that had been dropped in c:\windows\system32.

When that process was running, MSSE was unable to initialize when launched -- it exited within seconds of being launched

manually.

The attack-dropped ntmsdba2.dll had been attributed system, hidden, read-only, and ACLed to prevent deletion.

MBAM did not detect it when in that state.

I killed the rundll32.exe and then used cacls.exe to overwrite the ACLs with EVERYONE:F, and removed the S H & R

attributes.

After doing that, I ran another MBAM scan, which *did* detect it, and an apparently associated registry key as well:

Registry Keys Infected:

HKEY_CURRENT_USER\SOFTWARE\H3O8CABBPI (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Files Infected:

c:\WINDOWS\system32\ntmsdba2.dll (Trojan.Agent) -> Quarantined and deleted successfully.

We have a remaining issue however -- the svchost.exe is still attempting to launch the malicious service. The

rundll32.exe does not exit, even though the dll has been deleted. Its command line is:

C:\WINDOWS\system32\rundll32.exe "C:\WINDOWS\system32\ntmsdba2.dll",Bkmap

However there doesn't seem to be a service in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services, or an entry in

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\netsvcs, corresponding to this process.

It's unclear to me what the mechanism is by which the process is being launched. It appears to be launched at boot time,

but not in safe mode.

I have searched the registry for the string "ntmsdba2" anywhere in any key, value, or data -- nothing found. If the dll

filename is being stored in the registry anywhere it must be in something other than clear text.

I have searched the file system (with Explorer set to view hidden and system files, of course) for files containing the

string "ntmsdba2" -- no luck. Again, if it's being stored in the file system, it's not in clear text.

The svchost.exe and rundll32.exe program files themselves appear to be OK -- they byte-compare identical to copies of the

respective file taken from an uninfected system running the same OS revision (WinXP SP3, with all critical updates pushed

by Microsoft through 12/23/10).

I have checked the system for rootkits using GMER, RootRepeal, Sysinternals RootkitRevealer, HitManPro 3.5, and

Kaspersky's TDSSKiller -- none of them reported anything that didn't have a legitimate explanation. But it seems I might

have been using an older-than-current version of GMER. I also realize now that I scanned after having killed the

suspicious rundll32.exe instance -- I should have left it running while scanning.

I originally reported this problem at http://forums.malwarebytes.org/index.php?showtopic=71123, and was asked to start a

topic here with DDS, GMER, and MBAM logs per http://forums.malwarebytes.org/index.php?showtopic=9573.

Before running the scans to create these logs, I made sure to reboot the machine *without* killing the suspicious

rundll32.exe instance. (One other thing to be aware of: the machine has been disconnected from our home network until I

am sure it is malware-free -- so it's possible that event logs, etc., might show network timeouts or disconnected NICs.)

The (apparently newer version of) GMER linked to on http://forums.malwarebytes.org/index.php?showtopic=9573 did show a

.text section in a kernel driver that reported as writeable, something I hadn't seen with my existing version of GMER

(and scanning with the suspicious rundll32.exe instance no longer running).

I am curious as to why the rundll32.exe doesn't exit, if the dll named on its command line doesn't exist in the file

system. One plausible explanation is that it's running injected code.

In addition to pasting the DDS log (below), I've attached the requested attach.txt from DDS and ark.txt from GMER, and 4

MBAM logs, in the logs.zip attachment. The last of these (mbam-log-2010-12-25 (21-18-01).txt) was run in the machine's

current state (same as DDS and GMER, ie, fresh boot of normal-mode Windows with the suspicious rundll32.exe instance

running), immediately after GMER exited normally following its scan. The previous 3 MBAM logs are as follows:

mbam-log-2010-12-18 (13-45-28).txt - log of my son's initial response to the attack. MBAM seems to have gotten most of

the bad stuff, but not the S+H+R attributed and restrictively ACLed attack artifact ntmsdba2.dll or anything from the

address space of the suspicious rundll32.exe instance that loaded it.

mbam-log-2010-12-18 (14-02-22).txt - log of a second MBAM run my son made when he realized that MSSE was still crippled.

It didn't find ntmsdba2.dll or the rundll32.exe that loaded it.

mbam-log-2010-12-24 (15-01-27).txt - MBAM run by me after I killed the rundll32.exe, and re-ACLed and re-attributed the

ntmsdba2.dll attack artifact. MBAM now finds the dll and a (related?) registry key.

Here is the DDS log:

===

DDS (Ver_10-12-12.02) - NTFSx86

Run by Jeremy at 14:23:51.51 on Sat 12/25/2010

Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_22

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2046.1500 [GMT -5:00]

AV: Microsoft Security Essentials *Enabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

FW: Norton Internet Worm Protection *Disabled*

============== Running Processes ===============

C:\WINDOWS\system32\savedump.exe

C:\WINDOWS\system32\nvsvc32.exe

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\Program Files\Microsoft Security Essentials\MsMpEng.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup

svchost.exe

svchost.exe

C:\WINDOWS\system32\LEXBCES.EXE

C:\WINDOWS\system32\rundll32.exe

C:\WINDOWS\system32\spoolsv.exe

svchost.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\WINDOWS\system32\PnkBstrA.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe

C:\WINDOWS\system32\svchost.exe -k imgsvc

C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE

C:\WINDOWS\system32\wuauclt.exe

C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Program Files\QuickTime\QTTask.exe

C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\WINDOWS\system32\RUNDLL32.EXE

C:\Program Files\DivX\DivX Update\DivXUpdate.exe

C:\Program Files\DivX\DivX Plus Web Player\DDmService.exe

C:\Program Files\Microsoft Security Essentials\msseces.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\Program Files\Common Files\Nikon\Monitor\NkMonitor.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\Documents and Settings\Jeremy\Desktop\dds.com

============== Pseudo HJT Report ===============

uSearch Page =

uStart Page = hxxp://www.yahoo.com/

uDefault_Page_URL = hxxp://www.msn.com

uSearch Bar =

uSearchMigratedDefaultURL = 687474703a2f2f7777772e476f6f676c652e636f6d2f

uInternet Connection Wizard,ShellNext = iexplore

uInternet Settings,ProxyOverride = *.local

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

mSearchAssistant =

BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common

files\adobe\acrobat\activex\AcroIEHelperShim.dll

BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program

files\real\realplayer\rpbrowserrecordplugin.dll

BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft

shared\windows live\WindowsLiveLogin.dll

BHO: {9D425283-D487-4337-BAB6-AB8354A81457} - No File

BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google

toolbar\GoogleToolbar_32.dll

BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program

files\google\googletoolbarnotifier\5.6.5805.1910\swg.dll

BHO: CBrowserHelperObject Object: {ca6319c0-31b7-401e-a518-a07c3db8f777} - c:\program files\bae\BAE.dll

BHO: Java

logs.zip

Link to post
Share on other sites

post-32477-1261866970.gif

DO NOT use any TOOLS such as Combofix, or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Click: Start > All Programs> Accessories

Open Notepad, click on Format and uncheck Word Wrap.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

I suggest you do this:

XP Users

Double-click My Computer.

Click the Tools menu, and then click Folder Options.

Click the View tab.

Uncheck "Hide file extensions for known file types."

Under the "Hidden files" folder, select "Show hidden files and folders."

Uncheck "Hide protected operating system files."

Click Apply, and then click OK.

Vista Users

To enable the viewing of hidden and protected system files in Windows Vista please follow these steps:

Close all programs so that you are at your desktop.

Click on the Start button. This is the small round button with the Windows flag in the lower left corner.

Click on the Control Panel menu option.

When the control panel opens you can either be in Classic View or Control Panel Home view:

If you are in the Classic View do the following:

Double-click on the Folder Options icon.

Click on the View tab.

If you are in the Control Panel Home view do the following:

Click on the Appearance and Personalization link.

Click on Show Hidden Files or Folders.

Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.

Remove the checkmark from the checkbox labeled Hide extensions for known file types.

Remove the checkmark from the checkbox labeled Hide protected operating system files.

Please do not delete anything unless instructed to.

Next:

Please download ATF Cleaner by Atribune.

Download - ATF Cleaner

Link to post
Share on other sites

Hi LDTate --

Thanks for responding!

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Current computer behavior: excellent.

The suspicious rundll32.exe instance spawned by the netsvcs instance of svchost.exe on a normal boot is now *gone*.

Job well done!

I am curious as to what it was part of, and why MBAM was unable to detect it.

Also, why MBAM was unable to detect the attack artifact c:\windows\system32\ntmsdba2.dll that it had been loading, that had been attributed +S+R+H and ACLed to prevent deletion, until I reACLed it EVERYONE:F and removed the S,R,H attributes.

Is there a writeup somewhere -- on malwarebytes.org, bleepingcomputer.com, kaspersky.com, or elsewhere, identifying the malware that dropped and ran that artifact, and describing the malware's mechanism of operation?

I'm curious as to how it was operating, given the apparent absence of evidence of rootkit activity, and the absence of the DLL filename stem in clear text in the registry and the file system.

Here is the ComboFix log:

===

ComboFix 10-12-26.01 - Jeremy 12/27/2010 21:18:31.1.2 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2046.1473 [GMT -5:00]

Running from: c:\documents and settings\Jeremy\Desktop\ComboFix.exe

AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

FW: Norton Internet Worm Protection *Disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\Jeremy\Application Data\Local

C:\install.exe

c:\program files\Search Toolbar

c:\program files\Search Toolbar\SearchToolbar.dll

c:\program files\Shared

c:\windows\Downloaded Program Files\f3initialsetup1.0.1.1.inf

c:\windows\Readme.txt

c:\windows\system32\Oeminfo.ini

c:\windows\system32\srcr.dat

.

((((((((((((((((((((((((( Files Created from 2010-11-28 to 2010-12-28 )))))))))))))))))))))))))))))))

.

2073-10-27 15:55 . 2009-10-03 23:32 1118208 ----a-w- c:\program files\Microsoft Games\Halo Custom Edition\Strings.dll

2073-10-27 15:55 . 2009-10-03 23:32 1835008 ----a-w- c:\program files\Microsoft Games\Halo Custom Edition\haloceded.exe

2073-10-27 15:55 . 2009-10-03 23:31 2404352 ----a-w- c:\program files\Microsoft Games\Halo Custom Edition\haloce.exe

2010-12-27 04:01 . 2001-08-17 17:50 77824 ----a-w- c:\windows\system32\dllcache\s3sav4m.sys

2010-12-27 04:01 . 2001-08-17 19:56 198400 ----a-w- c:\windows\system32\dllcache\s3sav4.dll

2010-12-24 20:08 . 2010-12-24 20:08 -------- d-----w- c:\documents and settings\Phil\Application Data\Apple Computer

2010-12-24 20:07 . 2010-12-24 20:07 -------- d-----w- c:\documents and settings\Phil\Application Data\Malwarebytes

2010-12-22 19:24 . 2010-11-10 01:33 6273872 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{54D77D9F-DF6C-41BF-BD3D-1B7673DBF79D}\mpengine.dll

2010-12-14 21:29 . 2010-02-01 19:53 78408 ----a-w- c:\windows\system32\zlib1.dll

2010-12-14 21:29 . 2010-05-25 19:40 10833920 ----a-w- c:\windows\system32\libmfxsw32.dll

2010-12-14 21:29 . 2010-05-25 19:40 10915840 ----a-w- c:\windows\system32\libmfxhw32.dll

2010-12-14 21:29 . 2010-05-25 19:40 1003008 ----a-w- c:\windows\system32\libeay32.dll

2010-12-12 17:37 . 2010-12-12 17:37 -------- d-----w- c:\program files\ToMMTi Systems

2010-12-10 02:22 . 2010-12-10 02:22 -------- d-----w- c:\program files\Microsoft Directx

2010-12-09 01:12 . 2010-12-09 01:12 -------- d-----w- c:\program files\GTA2 DEMO

2010-12-09 01:10 . 2010-12-09 01:10 -------- d-----w- c:\documents and settings\Jeremy\Application Data\GetRightToGo

2010-12-06 22:13 . 2010-12-07 03:29 -------- d-----w- c:\program files\GTA2

2010-12-05 03:15 . 2010-11-30 12:30 63720 ----a-w- c:\temp\msvcrt-unusual-way\WindowsXP-KB884538-x86-Symbols-ENU.exe

2010-12-05 03:15 . 2010-11-30 12:30 363752 ----a-w- c:\temp\msvcrt-unusual-way\WindowsXP-KB884538-x86-ENU.exe

2010-12-05 01:05 . 2010-10-16 18:55 888424 ----a-w- c:\windows\system32\nvdispco32.dll

2010-12-05 01:05 . 2010-10-16 18:55 813672 ----a-w- c:\windows\system32\nvgenco32.dll

2010-12-05 01:05 . 2010-12-05 01:05 -------- d-----w- C:\NVIDIA

2010-12-04 16:24 . 2010-12-04 16:24 -------- d-----w- c:\program files\Rockstar Games

2010-12-03 20:42 . 2010-12-19 22:30 -------- d-----w- c:\documents and settings\Jeremy\Application Data\Bioshock2

2010-12-03 20:14 . 2010-12-03 20:14 -------- d--h--r- c:\documents and settings\Jeremy\Application Data\SecuROM

2010-12-03 20:07 . 2009-09-04 22:29 453456 ----a-w- c:\windows\system32\d3dx10_42.dll

2010-12-03 20:07 . 2009-09-04 22:29 1892184 ----a-w- c:\windows\system32\D3DX9_42.dll

2010-12-03 20:07 . 2010-12-03 20:07 -------- d-----w- c:\windows\system32\xlive

2010-12-03 20:07 . 2010-12-03 20:08 -------- d-----w- c:\program files\Microsoft Games for Windows - LIVE

2010-12-03 03:44 . 2010-12-03 03:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Amazon

2010-12-03 01:01 . 2010-12-03 01:01 -------- d-----w- c:\program files\Edmark

2010-11-28 18:08 . 2007-07-30 05:04 51472 ----a-w- c:\windows\system32\imagecfg.exe

2010-11-28 17:04 . 2010-11-28 17:04 -------- d-----w- c:\program files\SystemRequirementsLab

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-12-23 15:28 . 2010-11-27 01:44 16968 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys

2010-12-20 23:09 . 2010-01-02 09:22 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-12-20 23:08 . 2010-01-02 09:22 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-12-10 20:32 . 2009-08-18 16:30 564632 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\IdentityCRL\production\wlidui.dll

2010-12-10 20:32 . 2009-08-18 16:24 17816 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\IdentityCRL\production\ppcrlconfig600.dll

2010-11-18 18:12 . 2004-08-10 17:02 81920 ----a-w- c:\windows\system32\isign32.dll

2010-11-12 00:44 . 2010-11-12 00:44 94208 ----a-w- c:\windows\system32\dpl100.dll

2010-11-10 01:33 . 2010-11-21 22:33 6273872 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll

2010-11-08 22:57 . 2010-11-08 22:57 353592 ----a-w- c:\windows\system32\DivXControlPanelApplet.cpl

2010-11-06 00:26 . 2004-08-10 16:51 916480 ----a-w- c:\windows\system32\wininet.dll

2010-11-06 00:26 . 2004-08-10 16:51 43520 ----a-w- c:\windows\system32\licmgr10.dll

2010-11-06 00:26 . 2004-08-10 16:51 1469440 ------w- c:\windows\system32\inetcpl.cpl

2010-11-05 00:12 . 2010-04-18 18:27 138376 ----a-w- c:\windows\system32\drivers\PnkBstrK.sys

2010-11-05 00:11 . 2010-04-18 18:27 202448 ----a-w- c:\windows\system32\PnkBstrB.exe

2010-11-03 12:25 . 2004-08-10 16:51 385024 ----a-w- c:\windows\system32\html.iec

2010-11-02 15:17 . 2004-08-10 16:51 40960 ------w- c:\windows\system32\drivers\ndproxy.sys

2010-10-28 13:13 . 2004-08-10 16:50 290048 ----a-w- c:\windows\system32\atmfd.dll

2010-10-26 13:25 . 2004-08-10 16:51 1853312 ----a-w- c:\windows\system32\win32k.sys

2010-10-19 20:51 . 2009-10-02 18:23 222080 ------w- c:\windows\system32\MpSigStub.exe

2010-10-16 18:55 . 2010-01-12 17:03 61440 ----a-w- c:\windows\system32\OpenCL.dll

2010-10-16 18:55 . 2010-01-12 17:03 13012992 ----a-w- c:\windows\system32\nvcompiler.dll

2010-10-16 18:55 . 2009-11-03 22:00 14532608 ----a-w- c:\windows\system32\nvoglnt.dll

2010-10-16 18:55 . 2009-11-03 22:00 4882432 ----a-w- c:\windows\system32\nvcuda.dll

2010-10-16 18:55 . 2009-11-03 22:00 2932840 ----a-w- c:\windows\system32\nvcuvid.dll

2010-10-16 18:55 . 2009-11-03 22:00 2666600 ----a-w- c:\windows\system32\nvcuvenc.dll

2010-10-16 18:55 . 2009-11-03 22:00 1462272 ----a-w- c:\windows\system32\nvapi.dll

2010-10-16 18:55 . 2004-08-10 16:59 9623680 ----a-w- c:\windows\system32\drivers\nv4_mini.sys

2010-10-16 18:55 . 2004-08-10 16:59 6359552 ----a-w- c:\windows\system32\nv4_disp.dll

2010-10-16 17:04 . 2010-10-16 17:04 81920 ----a-w- c:\windows\system32\nvwddi.dll

2010-10-16 17:04 . 2010-10-16 17:04 277608 ----a-w- c:\windows\system32\nvmccs.dll

2010-10-16 17:04 . 2010-10-16 17:04 13851752 ----a-w- c:\windows\system32\nvcpl.dll

2010-10-16 17:04 . 2010-10-16 17:04 110696 ----a-w- c:\windows\system32\nvmctray.dll

2010-10-16 17:04 . 2010-10-16 17:04 156776 ----a-w- c:\windows\system32\nvsvc32.exe

2010-10-16 17:04 . 2010-10-16 17:04 145000 ----a-w- c:\windows\system32\nvcolor.exe

2010-10-14 06:36 . 2010-10-14 06:36 15451288 ----a-w- c:\windows\system32\xlive.dll

2010-10-14 06:36 . 2010-10-14 06:36 13642904 ----a-w- c:\windows\system32\xlivefnt.dll

2010-10-07 17:23 . 2010-10-07 17:23 91424 ----a-w- c:\windows\system32\dnssd.dll

2010-10-07 17:23 . 2010-10-07 17:23 75040 ----a-w- c:\windows\system32\jdns_sd.dll

2010-10-07 17:23 . 2010-10-07 17:23 197920 ----a-w- c:\windows\system32\dnssdX.dll

2010-10-07 17:23 . 2010-10-07 17:23 107808 ----a-w- c:\windows\system32\dns-sd.exe

2010-10-03 01:53 . 2010-10-03 01:53 52824 ----a-w- c:\windows\system32\drivers\stdriver32.sys

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-09-20 68856]

"igndlm.exe"="c:\program files\Download Manager\DLM.exe" [2009-10-27 1103216]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2008-06-20 185896]

"AdobeCS4ServiceManager"="c:\program files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" [2010-03-15 611712]

"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2006-10-03 221184]

"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-07-16 142104]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-07-16 162584]

"Persistence"="c:\windows\system32\igfxpers.exe" [2007-07-16 138008]

"wcmdmgr"="c:\windows\wt\updater\wcmdmgrl.exe" [2002-09-27 20480]

"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-09-08 421888]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-09-23 35760]

"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-11-11 421160]

"AmazonGSDownloaderTray"="c:\program files\Amazon\Amazon Games & Software Downloader\AmazonGSDownloaderTray.exe" [2009-10-23 326144]

"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2010-10-16 110696]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2010-10-16 13851752]

"nwiz"="c:\program files\NVIDIA Corporation\nView\nwiz.exe" [2010-08-26 1753192]

"DivXUpdate"="c:\program files\DivX\DivX Update\DivXUpdate.exe" [2010-12-09 1226608]

"DivX Download Manager"="c:\program files\DivX\DivX Plus Web Player\DDmService.exe" [2010-12-08 63360]

"MSSE"="c:\program files\Microsoft Security Essentials\msseces.exe" [2010-09-15 1094224]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Audible Download Manager.lnk - c:\program files\Audible\Bin\AudibleDownloadHelper.exe [N/A]

Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588]

Nikon Monitor.lnk - c:\program files\Common Files\Nikon\Monitor\NkMonitor.exe [2007-10-18 479232]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rootrepeal.sys]

@=""

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=

"c:\\Program Files\\Common Files\\AolCoach\\en_en\\player\\AOLNySEV.exe"=

"c:\\Program Files\\Electronic Arts\\The Battle for Middle-earth II\\game.dat"=

"c:\\Program Files\\Electronic Arts\\The Lord of the Rings, The Rise of the Witch-king\\game.dat"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Microsoft Games\\Halo Trial\\halo.exe"=

"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=

"c:\\Program Files\\Electronic Arts\\The Battle for Middle-earth II\\patchget.dat"=

"c:\\Program Files\\Microsoft Games\\Halo\\halo.exe"=

"c:\\Program Files\\Xfire\\Xfire.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\EA GAMES\\The Battle for Middle-earth \\game.dat"=

"c:\\Program Files\\EA GAMES\\The Battle for Middle-earth \\patchget.dat"=

"c:\\Program Files\\Adobe\\Adobe Dreamweaver CS4\\Dreamweaver.exe"=

"c:\\Program Files\\Microsoft Games\\Halo Custom Edition\\haloce.exe"=

"c:\\Program Files\\Common Files\\Adobe\\CS4ServiceManager\\CS4ServiceManager.exe"=

"c:\\Program Files\\Call of Duty Game of the Year Edition\\CoDMP.exe"=

"c:\\Program Files\\AIM\\aim.exe"=

"c:\\Program Files\\Doom 3\\Doom3.exe"=

"c:\\Program Files\\Google\\Google Earth\\plugin\\geplugin.exe"=

"c:\\Program Files\\Google\\Google Earth\\client\\googleearth.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

"c:\\Program Files\\2K Games\\BioShock 2\\SP\\Builds\\Binaries\\Bioshock2.exe"=

"c:\\Program Files\\2K Games\\BioShock 2\\MP\\Builds\\Binaries\\Bioshock2.exe"=

"c:\\WINDOWS\\system32\\dpnsvr.exe"=

"c:\\WINDOWS\\system32\\dxdiag.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"5353:TCP"= 5353:TCP:Adobe CSI CS4

R3 stdriver;Sound Tap Upper Class Filter Driver v2.0.0.0;c:\windows\system32\drivers\stdriver32.sys [10/2/2010 8:53 PM 52824]

S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/3/2010 3:46 PM 135664]

S3 Amazon Download Agent;Amazon Download Agent;c:\program files\Amazon\Amazon Games & Software Downloader\AmazonGSDownloaderService.exe [12/2/2010 10:44 PM 401920]

S3 kbeepm;kbeepm;\??\c:\docume~1\Jeremy\LOCALS~1\Temp\kbeepm.sys --> c:\docume~1\Jeremy\LOCALS~1\Temp\kbeepm.sys [?]

S3 motccgp;Motorola USB Composite Device Driver;c:\windows\system32\drivers\motccgp.sys [3/30/2008 5:52 PM 17920]

S3 motccgpfl;MotCcgpFlService;c:\windows\system32\drivers\motccgpfl.sys [3/30/2008 5:52 PM 7680]

S3 motport;Motorola USB Diagnostic Port;c:\windows\system32\drivers\motport.sys [3/30/2008 5:52 PM 22528]

.

Contents of the 'Scheduled Tasks' folder

2010-12-24 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 15:50]

2010-12-27 c:\windows\Tasks\At1.job

- c:\windows\system32\cmd.exe [2004-08-10 00:12]

2010-12-27 c:\windows\Tasks\At2.job

- c:\windows\system32\cmd.exe [2004-08-10 00:12]

2010-12-27 c:\windows\Tasks\At3.job

- c:\windows\system32\cmd.exe [2004-08-10 00:12]

2010-12-27 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-03 20:46]

2010-12-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-03 20:46]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.yahoo.com/

uSearchMigratedDefaultURL = 687474703a2f2f7777772e476f6f676c652e636f6d2f

uInternet Connection Wizard,ShellNext = iexplore

uInternet Settings,ProxyOverride = *.local

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html

IE: Open Picture in &Microsoft PhotoDraw - c:\progra~1\MI1933~1\Office\1033\phdintl.dll/phdContext.htm

TCP: {67EFFA61-4D6A-465D-A5F1-683A0288137A} = 207.172.3.8,207.172.3.9

FF - ProfilePath - c:\documents and settings\Jeremy\Application Data\Mozilla\Firefox\Profiles\tf592upe.default\

FF - prefs.js: browser.search.defaulturl - hxxp://aim.search.aol.com/aol/search?query={searchTerms}&invocationType=tb50-ff-aim-chromesbox-en-us&tb_uuid=100000000000000002&tb_oid=23-05-2010&tb_mrud=23-05-2010

FF - prefs.js: browser.startup.homepage - hxxp://my.earthlink.net/

FF - prefs.js: keyword.URL - hxxp://slirsredirect.search.aol.com/redirector/sredir?sredir=2706&invocationType=tb50-ff-aim-ab-en-us&tb_uuid=100000000000000002&tb_oid=23-05-2010&tb_mrud=23-05-2010&query=

FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}

FF - Ext: Seekdns: {7BA9F755-DCD4-4B60-8AE8-EE3662C7C733} - c:\program files\Mozilla Firefox\extensions\{7BA9F755-DCD4-4B60-8AE8-EE3662C7C733}

FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}

FF - Ext: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}

FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension

FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff

FF - Ext: DivX Plus Web Player HTML5 <video>: {23fcfd51-4958-4f00-80a3-ae97e717ed8b} - c:\program files\DivX\DivX Plus Web Player\firefox\html5video

FF - Ext: DivX HiQ: {6904342A-8307-11DF-A508-4AE2DFD72085} - c:\program files\DivX\DivX Plus Web Player\firefox\wpa

FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false

.

- - - - ORPHANS REMOVED - - - -

WebBrowser-{EEE6C35B-6118-11DC-9C72-001320C79847} - (no file)

WebBrowser-{6638A9DE-0745-4292-8A2E-AE530E7B9B3F} - (no file)

WebBrowser-{604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - (no file)

AddRemove-Microsoft Interactive Training - c:\windows\orun32.isu

AddRemove-RealJukebox 1.0 - c:\program files\Common Files\Real\Update_OB\r1puninst.exe

AddRemove-{8BCAFB73-49AE-4AC4-00A1-70E4EC38BD4E} - c:\program files\Electronic Arts\The Lord of the Rings

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-12-27 21:22

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1623549275-955799543-3290489870-1006\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]

"??"=hex:24,7d,d5,73,ee,f9,be,6c,2d,28,0a,53,38,e9,ac,5a,ed,35,f6,ea,93,80,2f,

a1,1a,8e,65,af,49,98,30,c6,d0,66,38,4a,c6,8f,bc,8e,9b,a8,91,47,c8,6f,3a,fc,\

"??"=hex:cf,55,c7,95,2b,14,4d,f8,66,7b,0c,1b,19,52,fe,22

[HKEY_USERS\S-1-5-21-1623549275-955799543-3290489870-1006\Software\SecuROM\License information*]

"datasecu"=hex:18,3c,29,12,29,4e,33,4f,58,74,47,76,95,71,f1,54,f3,a4,ac,c1,53,

aa,50,5a,98,6b,4e,1c,c8,32,aa,30,2d,80,c8,59,32,47,e9,5b,a4,93,9c,48,e8,22,\

"rkeysecu"=hex:03,11,e9,0a,9d,31,f9,c7,e2,30,d7,dc,cf,23,13,2f

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10l_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]

"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]

@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10l_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]

@Denied: (A 2) (Everyone)

@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(800)

c:\windows\system32\l3codeca.acm

c:\windows\system32\scg726.acm

c:\windows\system32\alf2cd.acm

c:\windows\system32\AC3ACM.acm

c:\windows\system32\NavLogon.dll

.

Completion time: 2010-12-27 21:25:00

ComboFix-quarantined-files.txt 2010-12-28 02:24

Pre-Run: 196,214,693,888 bytes free

Post-Run: 198,076,669,952 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Windows XP Home"

- - End Of File - - 8576685AB8D37D726EDBDC85236375A7

===

Again -- many thanks for the help, and I wish you a happy and healthy new year!

-- Phil

Link to post
Share on other sites

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the U, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the U, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :lol:

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*] WOT , Web of Trust, As 'Googling' is such an integral part of internet life, this free browser add on warns you about risky websites that try to scam visitors, deliver malware or send spam. It is especially helpful when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:

    Green to go

    Yellow for caution

    Red to stop

    WOT has an addon available for both Firefox and IE.

    [*]Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly.

    This will ensure your computer has always the latest security updates available installed on your computer.

    If there are new updates to install, install them immediately, reboot your computer, and revisit the site

    until there are no more critical updates.

Only run one Anti-Virus and Firewall program.

I would suggest you read:

PC Safety and Security--What Do I Need?.

How to Prevent Malware:

Link to post
Share on other sites

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the U, it needs to be there.

Done.

This machine used to run a (very old) Norton Antivirus Corporate Edition (NAVCE 7.61, provided by my then-employer to employees, for unlimited home use). A couple of months ago I replaced it with MSSE. Apparently, the lousy reputation that Symantec's product installation/uninstallation has is well-deserved :-). The uninstall of NAVCE left behind something called Norton Internet Worm Protection -- which Combofix apparently turned off. Symantec also left behind a NavLogon.dll that is loaded by Windows' WinLogon process, which apparently checks the run state of Symantec security products at shell-start and shutdown, and briefly puts up the red X task tray shield and a balloon that says that Norton Internet Worm Protection is turned off. So since I no longer am running any Symantec products on that machine (at least not intentionally!) I downloaded and ran Symantec's Norton Removal Tool, which apparently removed the (remains of the) Norton Internet Worm Protection. WinLogon is still loading NavLogon.dll (Symantec really does have a problem understanding the phrase "completely off the machine", I guess), but it is no longer producing task tray notifications.

In retrospect I might have jumped the gun a bit on removing Norton Internet Worm Protection. I removed it before running combofix /uninstall. combofix /uninstall might have turned it back on, and I could have left it there running happily. But probably just as well to be rid of it.

My son says that he's seeing lag in at least one of his games, that he hadn't seen before the attack. (It's an oldie but goodie -- Lord of the Rings:Fellowship of the Ring, circa 2002. He's seeing lag during battle scenes, which I gather are more computationally intense than other parts of the game.)

Could this be due to either:

(a.) settings changed or deleted and not restored by combofix?

(b.) some sort of malware still on the machine? (Granted, the combofix scan looks clean, but worth asking just in case.)

Thanks again for the help!

Link to post
Share on other sites

Try this remover and see if we can get rid of Symantec altogether.

That might be part of the problem

If your anti-virus will not uninstall, it is first recommended to uninstall it with AppRemover by Opswat. Go to their homepage and you will see they have support for removal of other AV's as well http://www.appremover.com/

I ran AppRemover -- in the mode to clean up after incomplete installs -- and it didn't detect the navlogon.dll, either on disk or loaded into the winlogon process.

I ran Opswat's AmIOESISOK app, to see what it would detect, and it found all the programs it should have, and none that it shouldn't have :-).

Link to post
Share on other sites

Delete the file

c:\windows\system32\NavLogon.dll

There are registry entries that reference navlogon.dll:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\NavLogon (entire key)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs, value C:\WINDOWS\System32\NavLogon.dll=(REG_DWORD)0x00000001

Should I delete those too?

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.