• Announcements

    • Budfred

      IE 11 copy/paste problem

      It has come to our attention that people using Internet Explorer 11 (IE 11) are having trouble with copy/paste to the forum. If you encounter this problem, using a different browser like Firefox or Chrome seems to get around the problem. We do not know what the problem is, but it seems to be specific to IE 11 and we are hopeful that Microsoft will eventually fix it.
    • Budfred

      PLEASE READ - Reversing upgrade   02/23/2017

      We have found that this new upgrade is somewhat of a disaster.  We are finding lots of glitches in being able to post and administer the forum.  Additionally, there are new costs associated with the upgrade that we simply cannot afford.  As a result, we have decided to reverse course and go back to the previous version of our software.  Since this will involve restoring it from a backup, we will lose posts that have been added since January 30 or possibly even some before that.    If you started a topic during that time, we urge you to make backups of your posts and you will need to start the topics over again after the change.  You can simply paste the copies of your posts that you created at that point.    If you joined the forum this month, you will need to re-register since your membership will be lost along with the posts.  Since you have a concealed password, we cannot simply restore your membership for you.   We are going to backup as much as we can so that it will reduce inconvenience for our members.  Unfortunately we cannot back everything up since much will be incompatible with the old version of our software.  We apologize for the confusion and regret the need to do this even though it is not viable to continue with this version of the software.   We plan to begin the process tomorrow evening and, if it goes smoothly, we shouldn't be offline for very long.  However, since we have not done this before, we are not sure how smoothly it will go.  We ask your patience as we proceed.
Sign in to follow this  
Followers 0
jddqr

CWS variant? CWShredder doesn't help

6 posts in this topic

Hi folks,

 

Fixing a friend's computer last night that was struck with what seems to be a CWS variant. Spy-bot refused to load. Ad-aware loaded and cleaned what seemed to be a CWS process in memory, but the second it was finished, CWS found its way back into Memory. Other anti-virus programs (Symantec NAV) refuse to load.

 

Ran the latest version of CWShredder and it claimed the system is clean. But everytime Internet Explorer is run, pop-up windows appear and the usual CWS damage is done.

 

Here is the HijackThis log. I didn't see anything immediately obvious, but I'm no spyware expert :) Is this a new CWS variant?

 

Would appreciate any/all help. Thanks in advance.

 

 

Logfile of HijackThis v1.97.7

Scan saved at 1:28:20 PM, on 6/29/2004

Platform: Windows XP SP1 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe

C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Common Files\Symantec Shared\ccProxy.exe

C:\Program Files\Common Files\Symantec Shared\DJSNETCN.exe

C:\PROGRA~1\Iomega\System32\ActivityDisk.exe

C:\Program Files\Norton AntiVirus\navapsvc.exe

C:\WINDOWS\System32\nvsvc32.exe

C:\Program Files\Norton AntiVirus\SAVScan.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

C:\WINDOWS\atlwx32.exe

C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe

C:\WINDOWS\system32\netke.exe

C:\PROGRA~1\HEWLET~1\HPSHAR~1\hpgs2wnf.exe

C:\Program Files\Common Files\Symantec Shared\ccApp.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Palm\HOTSYNC.EXE

C:\Program Files\Hewlett-Packard\AiO\hp officejet 5100

series\Bin\hpoant07.exe

C:\Program Files\WinZip\WZQKPICK.EXE

C:\PROGRA~1\HEWLET~1\AiO\Shared\Bin\hpoevm07.exe

C:\Program Files\Hewlett-Packard\AiO\Shared\bin\hpOSTS07.exe

C:\Program Files\Hewlett-Packard\AiO\Shared\bin\hpOFXM07.exe

C:\Program Files\EarthLink TotalAccess\TaskPanl.exe

C:\Program Files\SpyKiller\spykiller.exe

C:\WINDOWS\System32\hpoipm07.exe

C:\Palm\palm.exe

C:\Program Files\EarthLink TotalAccess\MailClnt.exe

C:\Documents and Settings\John\Desktop\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar =

http://start.earthlink.net/AL/Search

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page =

res://C:\WINDOWS\system32\ktows.dll/sp.html#12802

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =

res://ktows.dll/index.html#12802

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =

http://start.earthlink.net

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =

http://www.earthlink.net/partner/more/msie...ton/search.html

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =

res://ktows.dll/index.html#12802

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =

res://C:\WINDOWS\system32\ktows.dll/sp.html#12802

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =

res://ktows.dll/index.html#12802

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =

res://C:\WINDOWS\system32\ktows.dll/sp.html#12802

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

C:\WINDOWS\SYSTEM\blank.htm

O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program

Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx

O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program

Files\Norton AntiVirus\NavShExt.dll

O2 - BHO: (no name) - {E5ADF72A-DBBF-7E41-89A6-F5404F212316} -

C:\WINDOWS\system32\ntfj32.dll

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} -

C:\WINDOWS\System32\msdxm.ocx

O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} -

C:\Program Files\Norton AntiVirus\NavShExt.dll

O4 - HKLM\..\Run: [HP OfficeJet Series 700] "C:\Program

Files\Hewlett-Packard\HP OfficeJet Series 700\bin\ktchnsnk.exe" -reg

"Software\Hewlett-Packard\OfficeJet Series 700\Install"

O4 - HKLM\..\Run: [zzzHPSETUP] D:\Setup.exe

O4 - HKLM\..\Run: [share-to-Web Namespace Daemon] C:\Program

Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe

O4 - HKLM\..\Run: [Excite Private Messenger Pipe] C:\Program

Files\Excite\PrvtMsgr\bin\x8IMPipe.exe

O4 - HKLM\..\Run: [netke.exe] C:\WINDOWS\system32\netke.exe

O4 - HKLM\..\Run: [helpw] "helpw.exe"

O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec

Shared\ccApp.exe"

O4 - HKLM\..\Run: [NAV CfgWiz] C:\Program Files\Common Files\Symantec

Shared\CfgWiz.exe /GUID NAV /CMDLINE "REBOOT"

O4 - HKLM\..\Run: [bootWarn] C:\Program Files\Norton AntiVirus\BootWarn.exe

/a

O4 - HKLM\..\Run: [iS CfgWiz] C:\Program Files\Common Files\Symantec

Shared\cfgwiz.exe /GUID NIS /CMDLINE "REBOOT"

O4 - HKLM\..\RunServices: [DJSNetCN] C:\Program Files\Common Files\Symantec

Shared\DJSNETCN.exe

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe"

/background

O4 - HKCU\..\Run: [ssgrate.exe] C:\WINDOWS\System32\sysdoor.exe

O4 - HKCU\..\Run: [winudll.exe] C:\WINDOWS\System32\winudll.exe

O4 - HKCU\..\Run: [E6TaskPanel] "C:\Program Files\EarthLink

TotalAccess\TaskPanl.exe" -winstart

O4 - HKCU\..\Run: [spyKiller] C:\Program Files\SpyKiller\spykiller.exe

/startup

O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common

Files\Adobe\Calibration\Adobe Gamma Loader.exe

O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common

Files\Adobe\Calibration\Adobe Gamma Loader.exe

O4 - Global Startup: BigFix.lnk = C:\Program Files\BigFix\BigFix.exe

O4 - Global Startup: HotSync Manager.lnk = C:\Palm\HOTSYNC.EXE

O4 - Global Startup: HPAiODevice(hp officejet 5100 series) - 1.lnk =

C:\Program Files\Hewlett-Packard\AiO\hp officejet 5100

series\Bin\hpoant07.exe

O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program

Files\WinZip\WZQKPICK.EXE

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel

present

O8 - Extra context menu item: E&xport to Microsoft Excel -

res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000

O9 - Extra button: ICQ (HKLM)

O9 - Extra 'Tools' menuitem: ICQ (HKLM)

O9 - Extra button: Real.com (HKLM)

O9 - Extra button: MoneySide (HKLM)

O9 - Extra button: Messenger (HKLM)

O9 - Extra 'Tools' menuitem: Messenger (HKLM)

O12 - Plugin for .spop: C:\Program Files\Internet

Explorer\Plugins\NPDocBox.dll

O12 - Plugin for .tiff: C:\Program Files\Internet

Explorer\PLUGINS\npqtplugin5.dll

O14 - IERESET.INF: START_PAGE_URL=http://www.emachines.com

O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} -

http://ak.imgfarm.com/images/nocache/funwe...StationeryIniti

alSetup1.0.0.8.cab

O16 - DPF: {1DA3C4AB-E6B6-47A6-B0F3-1BD81524B51B} (ActiveWorldsDownload

Control) - http://www.activeworlds.com/products/Activ...ldsDownload.cab

O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus

scanner) -

http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cab

O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) -

http://tools.ebayimg.com/eps/wl/activex/EP...ol_v1-0-3-9.cab

O16 - DPF: {4E888414-DB8F-11D1-9CD9-00C04F98436A} (Microsoft.WinRep) -

https://webresponse.one.microsoft.com/oas/ActiveX/winrep.cab

O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility

Class) -

http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object)

- http://active.macromedia.com/flash2/cabs/swflash.cab

O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) -

http://tools.ebayimg.com/eps/activex/EPSControl_v1-0-3-0.cab

O17 -

HKLM\System\CCS\Services\Tcpip\..\{5D857159-27EE-44F0-A948-03EBA3F1845E}:

NameServer = 207.69.188.186 207.69.188.185

O17 -

HKLM\System\CCS\Services\Tcpip\..\{E03E3674-BBDD-4639-8FF4-2452C2521FDB}:

NameServer = 207.69.188.185,207.69.188.186

Share this post


Link to post
Share on other sites

Hi,

 

I'm replying to myself because I have no idea what this BHO is:

 

O2 - BHO: (no name) - {E5ADF72A-DBBF-7E41-89A6-F5404F212316} -

C:\WINDOWS\system32\ntfj32.dll

 

The BHO database had nothing with this filename nor CLSID.

 

Any help???? Ideas?

Share this post


Link to post
Share on other sites

Another note...

 

I'm almost certain that this is related to the new IE Malware reported on Slashdot this evening:

 

Slashdot page on vulnerability

 

The person in question had just visited citibank.com a few days ago, and that coincides when this problem arose. I read the article linked to from Slashdot, and citibank.com is indeed one of the problem sites.

 

The issue now, there doesn't seem to be any fix for this at the moment! :eek:

 

Does anyone have any comment? Please? :)

Share this post


Link to post
Share on other sites

This is a new variant of CWS which requires special treatment to remove.

 

Please take the following steps:

 

First, please enable viewing of hidden/system files per the instructions here: http://www.xtra.co.nz/help/0,,4155-1916458,00.html

 

IMPORTANT Be sure all browser and explorer windows are closed.

 

Using the Task Manager end the task on the following processes:

atlwx32.exe

system32\netke.exe

 

Next, go to Start->Run and type "Services.msc" (without quotes) then hit OK.

Scroll down and find the service called "Network Security Service".

When you find it, double-click on it.

In the next window that opens, click the Stop button, then change the Startup Type to Disabled.

Now hit Apply and then OK and close any open windows.

 

 

Run HijackThis and place a check mark next to the following items:

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar =

http://start.earthlink.net/AL/Search

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page =

res://C:\WINDOWS\system32\ktows.dll/sp.html#12802

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =

res://ktows.dll/index.html#12802

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =

res://ktows.dll/index.html#12802

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =

res://C:\WINDOWS\system32\ktows.dll/sp.html#12802

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =

res://ktows.dll/index.html#12802

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =

res://C:\WINDOWS\system32\ktows.dll/sp.html#12802

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

C:\WINDOWS\SYSTEM\blank.htm

 

O2 - BHO: (no name) - {E5ADF72A-DBBF-7E41-89A6-F5404F212316} -

C:\WINDOWS\system32\ntfj32.dll

 

O4 - HKLM\..\Run: [zzzHPSETUP] D:\Setup.exe

O4 - HKLM\..\Run: [netke.exe] C:\WINDOWS\system32\netke.exe

O4 - HKLM\..\Run: [helpw] "helpw.exe"

O4 - HKCU\..\Run: [ssgrate.exe] C:\WINDOWS\System32\sysdoor.exe

O4 - HKCU\..\Run: [winudll.exe] C:\WINDOWS\System32\winudll.exe

 

O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} -

http://ak.imgfarm.com/images/nocache/funwe...StationeryIniti

alSetup1.0.0.8.cab

Press 'Fix Checked'.

 

Exit HiJackThis.

 

Reboot into Safe Mode* and delete the following files: <insert R* entry dll's>

(also deleted any *.dat files with the same name as one of these *.exe files)

C:\WINDOWS\atlwx32.exe

C:\WINDOWS\system32\netke.exe

C:\WINDOWS\system32\ktows.dll

C:\WINDOWS\system32\ntfj32.dll

D:\Setup.exe

C:\WINDOWS\system32helpw.exe"

C:\WINDOWS\System32\sysdoor.exe

C:\WINDOWS\System32\winudll.exe

 

While still in Safe Mode* finish the cleanup process, please run through the rest of these steps:

 

Go to Start --> Run and type Regedit then click Ok.

Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services

and highlight Services in the left pane. In the right pane, look for any of these entries:

 

__NS_Service

__NS_Service_2

__NS_Service_3

 

If any are listed, right-click that entry in the right pane and choose Delete.

 

Now navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root

and highlight Root in the Left Pane. In the right pane, look for these entries:

 

LEGACY___NS_Service

LEGACY___NS_Service_2

LEGACY___NS_Service_3

 

If you find it, right-click it in the right-pane and choose delete.

 

If you have trouble deleting a key. Then click once on the key name (LEGACY__NS_SERVICE_ or another name that starts with LEGACY__NS_SERVICE) to highlight it. Then click on the Permission menu option under Security or Edit. Then Uncheck "Allow inheritable permissions" and press copy. Then click on everyone and put a checkmark in "full control". Then press apply and ok and attempt to delete the key again.

 

Exit regedit, boot in Normal Mode.

 

To remove the remainder of the files this exploit deposits, run this Online AntiVirus scan, removing all it finds:

 

Trend Micro (PC-cillin) - Free on-line Scan

http://housecall.antivirus.com

 

 

=== Check ActiveX Settings ===

Adjust your security settings for ActiveX:

Go to Internet Options/Security/Internet, press 'default level', then OK.

Now press "Custom Level."

In the ActiveX section, set the first option, 'Download signed controls', to 'Prompt; set the

second option, 'Download unsigned controls', to 'Disable'; and finally, set 'Initialize and Script ActiveX controls not marked as safe" to 'Disable'.

 

 

=== Replace Deleted Files ===

It is also possible that the infection may have deleted up to three files from your system. If these files are present, to be safe I suggest you overwrite them with a new copy.

 

Go here: http://www.spywareinfo.com/~merijn/winfiles.html#control and download the version of control.exe for your operating system. If you are running Windows 2000, copy it to c:\winnt\system32\. For Windows XP, copy it to c:\windows\system32\.

 

Download the Hoster from here: http://members.aol.com/toadbee/hoster.zip

Press 'Restore Original Hosts' and press 'OK'

Exit Program.

 

If you have Spybot S&D installed you may also need to replace one file.

Go here: http://www.spywareinfo.com/~merijn/winfiles.html#sdhelper and download SDHelper.dll. Copy the file to the folder containing you Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)

 

Additionally, Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! If they have been changed, reset your active x security settings in IE as recommended.

 

 

Download the latest version of Adaware (get the free edition)

http://www.lavasoft.de/software/adaware/

(choose download from the left hand menu)

 

Go to: Select Full Install and choose the download location of your choice (1.7mb)

Choose Download from http://fileforum.betanews.com/detail.php3?fid=965718306 <--(I found FileForum easiest)

 

Be sure to UPDATE BEFORE SCANNING FIRST!! That is a very important step and I have included easy directions.

 

After download and installing first, please update the program. Just open Adaware and click on *Check for Updates Now* and then *Connect*. It will find a new reference-file. Click *ok* and let it download and install the updates by clicking on *Finish* .This will return you to the main screen. You should now see Reference File # :01R325 22.06.2004 or higher listed.

 

Next, go to Settings (the gear icon at the top) and then *Scanning* and checkmark these items so they will be green:

Scan within archives

Scan my IE Favorites for banned URLS

Scan my hosts file

 

Then click *proceed* to save settings.

 

Click on *Tweak* next. And checkmark to make this green also:

Automatically try to unregister objects prior to deletion

 

Click on *proceed*

 

Next, from the main screen, click on *Start* (lower righthand corner) and put a dot in the box next to *use Custom scanning options*, then click *Next* to start your scan.

 

Checkmark any items found after scanning to remove (this will actually put them in quarantine and can recover from backup if any should not be removed).

 

Reboot your PC after cleaning with Adaware and scan again. Repeat the process until no further items are found as bad.

 

Run HiJackThis and post a new log in this thread.

 

 

 

* How to Boot into Safe Mode:

http://service1.symantec.com/SUPPORT/tsgen...001052409420406

Share this post


Link to post
Share on other sites
Sign in to follow this  
Followers 0