I apologize in advance for the lenght of this post, my English and for treating basic punctuation as a game of chance. Still, I would appreciate it if someone could wade through it all and offer some ideas.
For the last week or so I have struggled with a virus infection that is slowly driving me to drink[1].
It started with me noticing that a process that I did not really recognize was running on my computer; Nothing uncommon there really, but this process' name was "file33.exe", was located in my local temp directory and was adorned with the default VB project icon. It might as well have been named "virus.exe" and have a skull and cross-bone icon.
After swearing profusely for a few minutes, mostly at NIS 2009, I decided to try to scan the file with NIS just in case. No dice. NIS happily pronounced the file clean and a pillar of the community. Not to be hampered by that I proceeded to manually quarantine the file via NIS' interface and promply had it sent to Symantec using the built in feature. Being slightly paranoid by this point I restarted my machine, booted it up with the NIS CD and scanned it. It was -according to NIS- clean.
The next day I noticed something else; I had two instances of csrss.exe running. Thinking that it could maybe be quite natural I nontheless fired up Sysinternals Process Explorer for a better view. One of the csrss instances was running from "C:\WINDOWS\Config" which is -as far as I know- the wrong place for it. So, well, I scanned it with NIS; No dice, NIS called it safe. This time however before comitting the file to isolation I sent it off to Jotti ( http://virusscan.jotti.org/en/ ) for a second opinion. Three of the scanners (whose names i can't remember) called it some variation of RBot (r.Bot, rbot.. etc.). So I isolated that one too and shipped it off to Symantec.
The next day I noticed that NIS, without my help, had identified the fact that the phony csrss.exe had resurfaced and had blocked and removed it.. 4 times in a span of 1 minute during the night. Goodie.. So something is downloading malware to my computer between 1 and 2am every night. Because this continue to happen every night at around the same time, but with different files.
Some of the files NIS tags with the generic "Trojan Horse" and some are tagged the same way but labeled as detected by SONAR. The last thing(s) NIS detected (at 01:05 CET+1 this morning) was 9 .tmp files lodged in (drumroll): "C:\Documents and Settings\All Users\Programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\BASH\" called bhc1.tmp to bhc7.tmp with 2 more files called bhc1a.tmp and bhcc.tmp.
So now I get malware installing itself into my Norton installation... Or is NIS detecting itself?
Normally I would have just reinstalled my computer, but now I am really curious. I have tried 5 other virus scanners with nothing found. And yet.. Every night new malware tries to install itself in different locations. I think I have a prime suspect in an elusive reg key called something ending in: winlogon ->shell. That shows up for a second when it makes HijackThis crash on a first run. Subsequent runs works fine but shows nothing out of the ordinary...
I really would like to find the root cause of this, especially since it it will not be detected by anything...
I run Windows XP SP3 fully patched with NIS 2009 and for the last two days with the addition of ThreatFire (http://www.threatfire.com/) which tends to play well with others (it have not detected any root cause either).
[1] - Not that I need any excuse.
Regards,
R. Growler.