Aarrrgh. Infected again, probably virtumonde again ...

Status
Not open for further replies.
Follow-ups on tasks; questions

Hi pskelley,

OK, some follow-ups on the tasks you requested. Sorry for the length of the post.

1) MDAC. I tried the custom Windows update, but there was nothing for MDAC in the list. I found the following information on the Windows “MDAC Utility: Component Checker” page:

“MCAC is installed with numerous Microsoft products and an also be redistributed using the redistribution program (mdac_typ.exe) that you can download from … Windows XP SP2 or later versions of Windows also installs MDAC as an ‘out of box’ system component of the Windows operating system. Since MDAC in windows XP SP2 or later is newer thant the version (MMDAC 2.8 SP1) in the last MDAC redistribution program, mdac_typ.exe no longer installs MDAC on Windows XP SP2 and later version.”

On my computer there is a version of MSADOX.DLL located in “[Drive letter]:\Program Files\Common Files\System\ado” and it has a file modified date of 4/18/2008, which I don’t understand because I installed SP2 for Windows XP in 4/2009. So I installed the MDAC Utility Component Checker (wasn’t easy to find and install), ran it, and it said I have MDAC 2.8 SP1 on Windows XP SP3. MDAC 2.8 SP1 is the most current version.

The version of MSADOX.DLL in C:\I386 dates back to the original installation of Windows XP that came with my computer – the modified date is 8/18/2001 and the creation date is 5/19/2002. PSI is not complaining about the version of MSADOX.DLL in “C:\Program Files\Common Files\System\ado”. PSI says if the installation path is not “[Drive letter]:\Program Files\Common Files\System\ado” but rather is in a backup area like c:\I386, then the user the Ignore Directories & Paths option so that PSI does not look in that location. PSI lists the Installation Path as c:\I386\MSADOX.DLL. Having said that, do you think I should tell PSI to ignore the version in c:\I386, or that I should back it up and delete it like I did for the shockwave files in c:\I386, or talk to Microsoft Support?

2) c:\I386\SWFLASH.OCX – I deleted the file as you instructed, after backing it up to CD.

3) c:\I386\SwInit.exe – I deleted the file as you instructed, after backing it up to CD.

4) McAfee. Regarding the 3 items in the Security Center, the first one (firewall) is green/ on. The second one (automatic updates) is yellow/ check settings. That’s because I prefer to have the updates downloaded but then I decide when I want to install them. The third (virus protection) one comes up red when I restart, but turns green some minutes after I re-enable the McAfee manually using a right click option on the McAfee icon in the systray. [As soon as I re-enable McAfee manually, it starts scanning – it takes awhile for the Security Center to recognize it.] Please note that this behavior was not happening with McAfee before the infection. I believe the McAfee was disabled entirely by the infection. It came back sometime after we ran ComboFix. I only noticed this behavior after we ran MBAM, so I don’t know whether this behavior started right after ComboFix, or later. This might be a moot question because I need to get a new antivirus program anyway?

Do I need a new antivirus program in place before doing the other steps, or can I make do for now by re-enabling McAfee manually?

As an aside, did I read somewhere that some malware can impersonate the Security Center?

5) Zofaziba – I deleted it and it has not regenerated itself (like it did with the first infection whenever I would try to delete it).


Before I start uninstalling ComboFix, run MBAM, etc., since it seems like we’re near the end, let me get some questions in while I can:

6) Related to deleting and reactivating the Windows restore, I also have Recovery Commander checkpoints as part of my Fix-It Utilities program. I don’t think those are protected storage, so I assume I don’t have to delete those?

7) Do I plug in and check my external HDs and flash drive after I get a clean MBAM report? Do I use MBAM and a virus scan to check them?

8) What about other user accounts? With the first infection in early April, after we had finished the forum thread, I discovered that there were still some stray startup entries in some user accounts. These were pointing toward malware files that we had removed, so when logging in to those accounts a popup would appear saying that the file they were pointing to couldn’t be found. Clicking “OK” would remove the pop-up. I have 2 administrative logins (plus “Administrator” in safe mode which I can’t get into because I lost the original password somehow), and 5 regular user accounts. How do we make sure there aren’t any remnants in other accounts?

9) Is the Window firewall sufficient or do I need something better? [If it’s just fancier feature options rather than stronger protection, it might not help me because I don’t even understand the features in Windows Firewall, I just use the defaults, I think.]

10) In addition to a real-time virus scanner, do I also need a real-time Malware scanner, such as is contained in the purchase version of MBAM or Ad-Aware? Do those clash with the real-time virus scanning? Are there combination products that scan in real time for all threats simultaneously?

11) Given the nature of this infection, will I need to change Windows user account passwords, online passwords (banking, Paypal, etc.), other passwords (for the ISP connection, email server, etc.)?

Regards,

InfectedComputer
 
I will comment only when I think it is needed.

1) If you have additional questions about this subject, ask them here:
http://support.microsoft.com/

4) I don't know what you want to do with McAfee? being out of date is likely what is causing the Security Center to show red. If you want to install a new freeware program, uninstall McAfee in Add Remove first.

Here are freeware programs (install only one)
http://free.grisoft.com/ww.download-avg-anti-virus-free-edition
FAQ: http://www.avg.com/faq
AVG Free Forum: http://freeforum.avg.com/

http://www.avast.com/eng/avast_4_home.html
What's new in avast! version 4
http://www.avast.com/eng/whats_new_in_avast_v2.html

http://www.free-av.com/
http://www.free-av.com/en/support/index.html
Do I need a new antivirus program in place before doing the other steps, or can I make do for now by re-enabling McAfee manually?
I would say yes, the out of date program is likely giving you no protection anyway.
As an aside, did I read somewhere that some malware can impersonate the Security Center?
That's true but there is no evidence of that infection on theis computer...so don't be conerned.

6) I do not use the program, you would have to ask that question at the programs website.

Please read all links that I already posted, most of your questions are answered there.

11) Strong passwords: How to create and use them
http://www.microsoft.com/athome/security/privacy/password.mspx
5 tips to keep your passwords secret
http://www.microsoft.com/protect/yourself/password/secret.mspx

When you complete all of the instructions I already posted, post a fresh HJT log and tell me about any malware issues.
 
Hi,

Sorry it’s taken so long to reply, but this has been endless. The item numbering below is new. I've put some questions below in bold italics. I’ve at least skimmed each of the links you sent.

1) OK, I got a little out of sequence. I uninstalled McAfee and installed the 30-day trial of Kaspersky Internet Security, which includes their virus scanner, firewall, anti-malware, anti-spam, etc. I installed it in “interactive” mode, which means it pops up every time there is something questionable and prompts for a response. After restarting after the install, the real-time detection popped up the following message on 2 occasions:

“Kaspersky detected suspicious activity: Unknown application shows itself as a hidden object. Such behavior can be a result of user actions or can be caused by a malicious program – rootkit.” I clicked on "Terminate" both times.

I ran a full Kaspersky scan and included the deep rootkit option. The scan identified the nasties still located in the system restore folders and in the Qoobox folder from ComboFix. It also identified 3 “highly dangerous” files that PSI missed. More on that below.

I started the uninstall of ComboFix and had to click “allow” for dozens of Kaspersky popups as the uninstall proceeded. Eventually the ComboFix completed. However, the c:\ComboFix folder remains, and still contains two files – CF31660 (windows command processor) and Nircmd. Should I delete this folder?

Then I turned off the system restore, did a complete shutdown, and powered back up. When I logged back in the Security Center popped up with a message in the systray saying “Kaspersky Internet Security is turned off” but that went away as soon as Kaspersky loaded in the systray. It hasn’t done that since, but Kaspersky is coming up relatively late in the login process. Is there something I can or should do to get Kaspersky to load sooner in the sequence?

Then I turned system restore back on. I noticed that something (the Kaspersky install) had reset my Windows Explorer so that it wasn’t showing hidden and system files anymore. I went into options and reselected them to be visible.

I plugged in the Ethernet cable, updated MBAM and ran a full scan. Scan was clean.

2) Kaspersky had detected 3 “highly dangerous” files that PSI missed. The first was “flash.ocx” in a folder in c:\windows\SoftwareDistribution\Download. I followed their link to an Adobe update page. I had already done this update before on the advice of PSI (for \I386\SWFLASH.OCX, which we deleted), but I did the update again anyway. File still there. Should I use the Kaspersky quarantine option on it?

3) The other two “highly dangerous” files that Kaspersky indentified were two different versions of msxml4.dll in two folders under c:\windows\WinSxS. I followed the Kaspersky link for these two files and found links to fixes for MSXML 3.0, 4.0, and 6.0. Apparently all three can be installed on a computer simultaneously – 3.0 and 4.0 have legacy functions not covered by 6.0. I checked add/remove software and found that I had MSXML 4.0 SP2 installed. The fix recommended for that was Microsoft KB954430. I downloaded the update and ran it. It offered 3 options: modify, repair, and remove. I chose “repair”. After it ran, both of the msxml4.dll files were still there. Also in the add/remove list was MSMXL 4.0 SP2 Parser and SDK. I clicked on “Click here for support information” and was directed to http://www.msdn.microsoft.com/xml (sorry, I can't seem to figure out how to stop this from converting to a live link). There I found a link to MSXML 4.0 Service Pack 3 (SP3) which “provides a number of security and reliability bug fixes.” So I ran that. Now, in add/remove programs I have MSXML 4.0 SP2 (KB954430), MSXML 4.0 SP2 Parser and SDK, and MSXML 4.0 SP3 Parser. But the two problematic copies of msxml4.dll remain. Should I use the Kaspersky quarantine option on these 2 files?

[BTW, the release notes for SP3 say it has some changes that may break compatibility with earlier versions of 4.0. So I don’t know if I should uninstall 4.0 SP2 Parser and SDK. I don’t know if I should uninstall 4.0 SP2 because I don’t know what the difference is between 4.0 and 4.0 Parser. I don’t know what the heck this program does anyway and whether I need it at all.) The release notes say that users should upgrade (or also install) version 6.0, and that MSXML version 6.0 is packaged with Windows XP SP3. I upgraded to Windows XP SP3 last month, but no MSXML version 6.0 is installed. Maybe I should buy a Mac.]

4) Windows Security Center is not showing in my system tray, but when I open it from the control panel it’s showing Kaspersky firewall and virus protection both on.

5) I logged into all my other user accounts and ran Kaspersky quick scan and MBAM quick scan. In two of the accounts MBAM found registry entries pointing to some of the nasties that we’ve already removed. These were identified as Trojan.Vundo.H in one account and Trojan.Vundo in the other. I had MBAM fix these, successfully. Logs are below.

When I scan with MBAM in an administrative account, why doesn’t it find registry startup nasties in the other user accounts? Are there other types of things in the other accounts that won’t be found? Must scanning always be done in every user account?

6) I looked at the password link you provided. My question is rather, is the nature of this infection such that I should change all of my passwords (regardless of whether they are strong or not)?

7) Time to reinstall Spybot S&D and immunize?

It feels like we're just about done. :)

Regards,

InfectedComputer


-----------------------------------------------------

Malwarebytes' Anti-Malware 1.36
Database version: 2168
Windows 5.1.2600 Service Pack 3

5/24/2009 1:13:34 PM
mbam-log-2009-05-24 (13-13-34).txt

Scan type: Quick Scan
Objects scanned: 89630
Time elapsed: 5 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pijupakapa (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm2fdd1d53 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2cee2ecf (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


--------------------------------------

Malwarebytes' Anti-Malware 1.36
Database version: 2175
Windows 5.1.2600 Service Pack 3

5/24/2009 5:08:31 PM
mbam-log-2009-05-24 (17-08-31).txt

Scan type: Quick Scan
Objects scanned: 83601
Time elapsed: 5 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
 
Here is what I asked for:

When you complete all of the instructions I already posted, post a fresh HJT log and tell me about any malware issues.
And I did not get it.

I ran a full Kaspersky scan and included the deep rootkit option. The scan identified the nasties still located in the system restore folders and in the Qoobox folder from ComboFix. It also identified 3 “highly dangerous” files that PSI missed. More on that below.

I you had followed directions in my post #20, combofix would have been uninstalled and System Restore files would have been cleaned before you ran Kaspersky.

Ask your Kaspersky question here:
http://forum.kaspersky.com/index.php?showforum=36

This topic is closed
 
Status
Not open for further replies.
Back
Top