Author Topic: Rootkit: Hidden Process  (Read 5935 times)

0 Members and 1 Guest are viewing this topic.

emtee

  • Guest
Rootkit: Hidden Process
« on: October 10, 2011, 10:18:05 PM »
Hi,

I went away for the weekend while I was away, a full system scan picked up 790 infected files, all saying "Threat: Rootkit: Hidden Process". On my return (48 hours later), I manually ran another full scan (quick scan showed nothing) and this time over 1900 infected files were found with similar, but also new PIDs.

I haven't attempted to delete these processes as yet - as I'd rather know that's the right way to proceed first.

I'm running Win7 64 Bit

I've followed the instructions on this page (http://forum.avast.com/index.php?topic=53253.0) and all logs are attached.
- MBAM said all clear
- I've also installed and run OTL and aswMBR

Many thanks in advance

Offline essexboy

  • Malware removal instructor
  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 40589
  • Dragons by Sasha
    • Malware fixes
Re: Rootkit: Hidden Process
« Reply #1 on: October 10, 2011, 10:22:37 PM »
Hi the PID indicates they were in memory, were you including memory with the scan

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following
    Quote
    :OTL
    @Alternate Data Stream - 991 bytes -> C:\Users\Martin\AppData\Local\Temp:GFHzUP5kpl78Nccs6c6Q4Omf
    @Alternate Data Stream - 975 bytes -> C:\ProgramData\Microsoft:L97cnIazImsixyj7os38JOcJZIyt
    @Alternate Data Stream - 967 bytes -> C:\ProgramData\Microsoft:qJgpCt5EVt6QuVO9m9uD
    @Alternate Data Stream - 932 bytes -> C:\ProgramData\Microsoft:kp3TyZgm76VDG3IvvuwMD4
    @Alternate Data Stream - 1171 bytes -> C:\ProgramData\Microsoft:aVhTuKEdglyXTiHVNZw0m
    @Alternate Data Stream - 1169 bytes -> C:\ProgramData\MicrosoftZWU34PpqmY4C1mgGTcwv
    @Alternate Data Stream - 1122 bytes -> C:\ProgramData\Microsoft:5ryNcMND1xdPAdvkhHSmAOp
    @Alternate Data Stream - 1068 bytes -> C:\Users\Martin\AppData\Local\Temp:Tsys33dkwB78BYHJhGN1h
    @Alternate Data Stream - 1051 bytes -> C:\ProgramData\Microsoft:0KZvrEJ6jN6n6AvbSyheajOe
    @Alternate Data Stream - 1042 bytes -> C:\ProgramData\Microsoft:FBFobTWbGKnZb0KbY5G411yXrPVjXC
    @Alternate Data Stream - 1006 bytes -> C:\ProgramData\Microsoft:wC6qIBU5kSd3asYho2RhABc0i

    :Files
    ipconfig /flushdns /c

    :Commands
    [purity]
    [resethosts]
    [emptytemp]
    [EMPTYFLASH]
    [CREATERESTOREPOINT]
    [Reboot]
  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
  • Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

emtee

  • Guest
Re: Rootkit: Hidden Process
« Reply #2 on: October 10, 2011, 10:44:10 PM »
Attached

And thank you for an amazingly quick response.   :)

Offline essexboy

  • Malware removal instructor
  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 40589
  • Dragons by Sasha
    • Malware fixes
Re: Rootkit: Hidden Process
« Reply #3 on: October 10, 2011, 10:47:11 PM »
Hmm a fresh ads appeared - not happy with that

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following
    Quote
    :OTL
    @Alternate Data Stream - 1169 bytes -> C:\ProgramData\Microsoft:dZWU34PpqmY4C1mgGTcwv

    :Files
    ipconfig /flushdns /c

    :Commands
    [purity]
    [resethosts]
    [emptytemp]
    [EMPTYFLASH]
    [CREATERESTOREPOINT]
    [Reboot]
  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
  • Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.
.
THEN
.
Download and Install Combofix
 
Download ComboFix from one of the following locations:
Link 1
Link 2
 
VERY IMPORTANT !!! Save ComboFix.exe to your Desktop
 
* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
  • Double click on ComboFix.exe & follow the prompts.
  • Accept the disclaimer and allow to update if it asks




  • When finished, it shall produce a log for you.
  • Please include the C:\ComboFix.txt in your next reply.[/b]
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.


Please make sure you include the combo fix log in your next reply as well as describe how your computer is running now

emtee

  • Guest
Re: Rootkit: Hidden Process
« Reply #4 on: October 10, 2011, 11:50:25 PM »
Files attached. Again, thanks for your help

emtee

  • Guest
Re: Rootkit: Hidden Process
« Reply #5 on: October 11, 2011, 09:46:35 AM »
A full scan overnight reported "no threat found". Assuming all is ok in the logs I put in my last post, I wanted to say a massive thank you (again).

Amazing support- will continue to recommend Avast with confidence.

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67194
Re: Rootkit: Hidden Process
« Reply #6 on: October 11, 2011, 01:17:30 PM »
Amazing support- will continue to recommend Avast with confidence.
Thank you.
The best things in life are free.

Offline essexboy

  • Malware removal instructor
  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 40589
  • Dragons by Sasha
    • Malware fixes
Re: Rootkit: Hidden Process
« Reply #7 on: October 11, 2011, 07:08:12 PM »
Looks like the additional ads was created between the post and the application of the fix, all looks good now.  When you are happy let me know and I will remove my tools  ;D

emtee

  • Guest
Re: Rootkit: Hidden Process
« Reply #8 on: October 11, 2011, 07:09:58 PM »
Happy? I'm delighted!   ;)

I was expecting that to be a lot more painful than it was. Cheers!

Offline essexboy

  • Malware removal instructor
  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 40589
  • Dragons by Sasha
    • Malware fixes
Re: Rootkit: Hidden Process
« Reply #9 on: October 11, 2011, 08:31:58 PM »
Subject to no further problems   :)

I will remove my tools now and give some recommendations, but, I would like you to run for 24 hours or so and come back if you have any problems 
.
Now the best part of the day ----- Your log now appears clean  :thumbsup:
.
A good workman always cleans up after himself so..The following will implement some cleanup procedures as well as reset  System Restore points:
.
Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following
    Quote
    :Commands
    [resethosts]
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [Reboot]
  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
.
Remove ComboFix
.
  • Hold down the Windows key + R on your keyboard. This will display the Run dialogue box
  • In the Run box, type in ComboFix /Uninstall (Notice the space between the "x" and "/") then click OK
    .

    .
  • Follow the prompts on the screen
  • A message should appear confirming that ComboFix was uninstalled
.
Run OTL and hit the cleanup button.  It will remove all the programmes we have used plus itself. 
.
We will now confirm that your hidden files are set to that, as some of the tools I use will change that
  • Click Start.
  • Open My Computer.
  • Select the Tools menu and click Folder Options.
  • Select the View Tab.
  • Under the Hidden files and folders heading select Do not show hidden files and folders.
  • Click Yes to confirm.
  • Click OK.
.
 SPRING CLEAN
.
To manually create a new Restore Point
 
  • Go to Control Panel and select System
  • Select System
  • On the left select System Protection and accept the warning if you get one
  • Select System Protection Tab
  • Select Create at the bottom
  • Type in a name i.e. Clean
  • Select Create
.
Now we can purge the infected ones
  • GoStart > All programs > Accessories > system tools
  • Right click Disc cleanup and select run as administrator
  • Select Your main drive and accept the warning if you get one
  • For a few moments the system will make some calculations
  • Select the More Options tab
  • In the System Restore and Shadow Backups select Clean up
  • Select Delete on the pop up
  • Select OK
  • Select Delete
.
Now that you are clean, to help protect your computer in the future I recommend that you get the following free programmes:

Malwarebytes.  Update and run weekly to keep your system clean
.
Download and install FileHippo update checker and run it monthly it will show you which programmes on your system need updating and give a download link
.
It is critical to have both a firewall and anti virus to protect your system and to keep them updated. To keep your operating system up to date visit
.
To learn more about how to protect yourself while on the internet read our little guide  How did I get infected in the first place ?
.
Keep safe  :wave:

wakeman

  • Guest
Re: Rootkit: Hidden Process
« Reply #10 on: October 12, 2011, 10:18:53 PM »
I was recently on the internet and this popped up on my flash drive scan Alureon-G@mbr [Rtk]. I don't know if it's on my flash drive or the computer I'm on. Here are my scan results with aswMBR

aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-10-12 15:42:36
-----------------------------
15:42:36.007    OS Version: Windows 5.1.2600 Service Pack 3
15:42:36.007    Number of processors: 2 586 0x170A
15:42:36.007    ComputerName: DC-LIB-L905  UserName: mgcdub
15:42:36.882    Initialize success
15:48:37.619    AVAST engine defs: 11101201
15:49:32.614    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-16
15:49:32.614    Disk 0 Vendor: WDC_WD2500AAJS-75M0A0 02.03E02 Size: 238418MB BusType: 3
15:49:34.645    Disk 0 MBR read successfully
15:49:34.645    Disk 0 MBR scan
15:49:34.692    Disk 0 MBR:Alureon-G [Rtk]
15:49:34.692    Disk 0 TDL4@MBR code has been found
15:49:34.692    Disk 0 MBR [TDL4]  **ROOTKIT**
15:49:34.708    Disk 0 scanning C:\WINDOWS\system32\drivers
15:49:34.708    Service scanning
15:49:35.567    Modules scanning
15:49:40.316    Disk 0 trace - called modules:
15:49:40.348    ntkrnlpa.exe CLASSPNP.SYS disk.sys atapi.sys hal.dll pciide.sys PCIIDEX.SYS
15:49:40.348    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8a716548]
15:49:40.348    3 CLASSPNP.SYS[b80e8fd7] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP2T0L0-16[0x8a673030]
15:49:41.473    AVAST engine scan C:\WINDOWS
15:49:41.863    AVAST engine scan C:\WINDOWS\system32
15:50:45.514    AVAST engine scan C:\WINDOWS\system32\drivers
15:50:57.622    AVAST engine scan C:\Documents and Settings\mgcdub
15:51:27.041    AVAST engine scan C:\Documents and Settings\All Users
15:51:45.571    Scan finished successfully
15:56:15.187    Disk 0 MBR has been saved successfully to "C:\Documents and Settings\mgcdub\My Documents\Downloads\MBR.dat"
15:56:15.187    The log file has been saved successfully to "C:\Documents and Settings\mgcdub\My Documents\Downloads\aswMBR.txt"


What would you suggest?

Offline essexboy

  • Malware removal instructor
  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 40589
  • Dragons by Sasha
    • Malware fixes
Re: Rootkit: Hidden Process
« Reply #11 on: October 12, 2011, 10:34:30 PM »
It was on your flash drive as all the other programmes would have given an indication

Download the latest version of TDSSKiller from here and save it to your Desktop.
 
 
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
     

     
  • Check the boxes beside Verify Driver Digital Signature and Detect TDLFS file system, then click OK.
     

     
  • Click the Start Scan button.
     

     
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
     

     
  • If malicious objects are found, they will show in the Scan results and offer three (3) options.
  • Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.
     

     
  • Note: If [color="#0000FF"]Cure is not available, please choose Skip instead, do not choose Delete unless instructed.[/b][/color]
A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste its contents on your next reply.

KusanagiShiro

  • Guest
Re: Rootkit: Hidden Process
« Reply #12 on: October 21, 2011, 12:55:19 AM »
TDSS killer found no rootkits.

Offline essexboy

  • Malware removal instructor
  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 40589
  • Dragons by Sasha
    • Malware fixes
Re: Rootkit: Hidden Process
« Reply #13 on: October 21, 2011, 07:45:01 PM »
Why would it ?