PDA

View Full Version : Possible Virtumonde infection



msorens
2008-12-02, 17:18
HijackThis 2.0.2 log results. Immediately following I have some notes on steps I have taken so far.

============================ LOG BEGIN =================
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:52:26 AM, on 12/2/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16735)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
C:\WINDOWS\system32\nvsvc32.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
C:\Program Files\Webroot\Enterprise\Spy Sweeper\spysweeper.exe
C:\Program Files\Webroot\Enterprise\Spy Sweeper\commagent.exe
C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
C:\WINDOWS\TEMP\TE213A.EXE
C:\Program Files\BillP Studios\WinPatrol\WinPatrol.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
C:\Program Files\Launchy\Launchy.exe
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\Program Files\Webroot\Enterprise\Spy Sweeper\SpySweeperUI.exe
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRAM FILES\BOOKMARK-MANAGER\BOOKMARK-MANAGER.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\Rundll32.exe
C:\WINDOWS\system32\Rundll32.exe
C:\Program Files\Trillian\trillian.exe
C:\PROGRAM FILES\RUBBER DUCKY\RUBBERDUCKY.EXE
C:\PROGRAM FILES\FREECOMMANDER\FREECOMMANDER.EXE
C:\Program Files\Opera\opera.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://iq-net.aiq.local/avista/login/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://iq-net.avistaadvantage.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://iq-net.aiq.local/avista/login/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O1 - Hosts: 172.29.6.90 ADVAS1
O1 - Hosts: 172.29.6.90 ADVAS2
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [SpySweeperEnterprise] "C:\Program Files\Webroot\Enterprise\Spy Sweeper\\SpySweeperUI.exe"
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [penufuyoso] "Rundll32.exe" "C:\WINDOWS\system32\vufalesi.dll",s
O4 - HKCU\..\Run: [penufuyoso] "Rundll32.exe" "C:\WINDOWS\system32\vufalesi.dll",s
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [penufuyoso] Rundll32.exe "C:\WINDOWS\system32\vufalesi.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [penufuyoso] Rundll32.exe "C:\WINDOWS\system32\vufalesi.dll",s (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [penufuyoso] Rundll32.exe "C:\WINDOWS\system32\vufalesi.dll",s (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [penufuyoso] Rundll32.exe "C:\WINDOWS\system32\vufalesi.dll",s (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O4 - Startup: Trillian.lnk = C:\Program Files\Trillian\trillian.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://iq-net.avistaadvantage.com
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1219866374983
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1219866368218
O16 - DPF: {82774781-8F4E-11D1-AB1C-0000F8773BF0} (DLC Class) - https://transfers.ds.microsoft.com/FTM/TransferSource/grTransferCtrl.cab
O16 - DPF: {C4847596-972C-11D0-9567-00A0C9273C2A} (Crystal Report Viewer Control) - http://advantageweb/viewer/activeXViewer/activexviewer.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = AIQ.local
O17 - HKLM\Software\..\Telephony: DomainName = AIQ.local
O17 - HKLM\System\CCS\Services\Tcpip\..\{13256694-9ED9-4DF5-9B09-C0E7E46DBDED}: NameServer = 172.28.2.4,10.1.10.100
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = AIQ.local
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: SearchList = aiq.local,avistaadvantage.com
O17 - HKLM\System\CS1\Services\Tcpip\..\{13256694-9ED9-4DF5-9B09-C0E7E46DBDED}: NameServer = 172.28.2.4,10.1.10.100
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = AIQ.local
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: SearchList = aiq.local,avistaadvantage.com
O17 - HKLM\System\CS2\Services\Tcpip\..\{13256694-9ED9-4DF5-9B09-C0E7E46DBDED}: NameServer = 172.28.2.4,10.1.10.100
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: SearchList = aiq.local,avistaadvantage.com
O20 - AppInit_DLLs: "C:\WINDOWS\system32\pomawiha.dll"
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: DameWare Mini Remote Control (DWMRCS) - DameWare Development LLC - C:\WINDOWS\SYSTEM32\DWRCS.EXE
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: OfficeScanNT Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
O23 - Service: OfficeScanNT Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
O23 - Service: Webroot CommAgent Service (WebrootCommAgentService) - Webroot Software, Inc. - C:\Program Files\Webroot\Enterprise\Spy Sweeper\commagent.exe
O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. - C:\Program Files\Webroot\Enterprise\Spy Sweeper\spysweeper.exe

--
End of file - 7843 bytes

============================ LOG END =================

Notes on my observations and steps taken so far:
(Please note that I am a software engineer so I may sound like I know what I am doing but I have been frustrated at every step so far--I definitely need expert assistance here; thanks!)

I first observed a problem when WinPatrol gave a new startup program alert for \windows\system32\perutigu.dll, \windows\system32\pomawiha.dll, and \windows\system32\dosaforu.dll. Though I directed WinPatrol to delete them, WinPatrol again reported them on its next check 2 minutes later and every time after.

I then checked SpySweeper and it had started silently logging startup entry warnings for \windows\system32\vufalesi.dll (which you will observe in the hijack log above) with a mention of virtumonde.

I did a System Restore taking my machine two days back to where I thought I was clean but apparently not; the same problem reoccurred. Some time later, unfortunately, my System Restore history was wiped out so I no longer have an option of going further back.

I ran TrendMicro OfficeScan and it reported no problems.

I ran AdAware (which claimed support for virtumonde removal) and it reported no problems.

I ran Spybot and it found 5 virtumonde-related items. Attempting to clean it claimed to clean the registry entries but not the single file reference.

In WinPatrol I do not find any active tasks or services that could be continually regenerating the startup entries so out of sheer perplexity (my inexperience showing here!) I ran Blacklight to check for rootkits but it reported no problems.

In WinPatrol >> Hidden Files I found a dozen files all reported as "first detected" on 12/1/2008 10:40AM. A couple of these matched the popups that WinPatrol had originally complained about and all of them had similarly strange names so I attempted to delete them. The system would not let me however, so I set msconfig to diagnostic mode, rebooted, and then could delete most but not all of them. The one that would not delete is pomawiha.dll. One other note here: there is one file that looks normal in this group (\windows\system32\loginui.exe.manifest) but it did have the same time stamp indicated. Reviewing its contents, though, it certainly seemed innocuous so I left it alone (also because I saw it does exist on a clean, neighboring computer).

ken545
2008-12-04, 01:19
Hello msorens

Welcome to Safer Networking.

Please read Before You Post (http://forums.spybot.info/showthread.php?t=288)

This appears to be a company machine, read this please.
http://forums.spybot.info/showpost.php?p=25712&postcount=5

Ken