Ransomed virus

Hello,

 

I'm hoping to remove a ransomed virus from a computer at our office.  The machine gave the user some kind of "You have violated US law" message.  The machine was then powered off manually.  At this point the machine will boot, but shortly after loading, the entire screen is greyed out and nothing can be done.  The odd thing is that there are no more ransom demands, it just stays grey.  So I have no idea on what this bug even is.

 

Windows XP SP3

Running NIS 2012

 

I've tried booting into safe mode, but I get a BSOD that says I need to verify the integrity of my harddrive (/chkdsk) and if that does not work that I may have a virus.

 

I've tried the Norton Power Eraser, but because the bug seems to have messed up my networking, the box to "Scan for Risks" is not active.

 

I also loaded the Norton Bootable Recovery Tool and used it to scan the machine, but nothing was found.

 

Any suggestions on what this virus might be, how to remove it and if I need to be on the lookout for it jumping to other machines on our network?

 

Thanks,

 

Dale

 

How did you get NPE on to your system to run it, or try and run it if the desktop is locked??

 

Quads

Thanks for the quick reply!

 

I used the Norton Bootable Recovery Tool on a different machine to create a boot disk.  Also on the other machine, I downloaded NPE.exe and created another CD with NPE on it.  I booted the infected machine from NBRT disc, which gave me the option to open a command prompt.  I swapped in the CD with NPE on it and ran it from the command prompt.

 

ANY other user other than the thread starter is not to use any instructions, scripts or proceedures,  The work though in cleaning a system is individual and only for that system due to a number of factors.

 

 

 

Please do not run any tools unless instructed to do so. 

  • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability. Do as the instructions ask nothing extra or run things twice
  • If I ask a Question just answer it, don't run anything unless it states.
  • Major steps used:

1. Find

2. Break

3. Destroy

4. Cleanup  (including system as a whole)

 

Please read every post completely before doing anything. 

  • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

 

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forum, (sometimes :smileylol:)

  • Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.

 

 

Please download  OTLPEnet  Download  hxxp://oldtimer.geekstogo.com/OTLPENet.exe    to your desktop  (change the xx to tt(filesize 120,9 MB approx.)

  • When downloaded double click on OTLPENet.exe and make sure there is a blank CD in your CD drive. This will automatically create a bootable CD.
  • Reboot your system using the boot CD you just created.
    Note : If you do not know how to set your computer to boot from CD follow the steps here
  • Your system should now display a REATOGO-X-PE desktop.  Depending on your system hardware it can take a long time to load the CD
  • Double-click on the OTLPE icon.
  • Ensure the box "Automatically Load All Remaining Users" is checked and press OK
  • OTL should now start.
  • Change Services, Drivers, Standard and Extra Registry to All
  • Press Run Scan to start the scan.
  • When finished, the file will be saved in drive C:\OTL.txt
  • Copy this file to your USB drive if you do not have internet connection on this system
  • Please post the contents of the OTL.txt file in your reply.
  • Depending on your type of internet connection, you maybe able to get online as well so you can access this Forum easily.

Hrere is screenshots showing the deasktop, It is an older CD version http://forum.malekal.com/otlpe-live-t23453.html

 

 

Quads

Thanks again for the reply Quads. Since I cannot access anything in Windows on the infected computer, I am planning to download the OTLPENet.exe on another computer (Windows 7 instead of XP) and will run it on the that other computer to create the boot disc. Is this OK? I have access to other XP machines if necessary. Also I will not be able to complete this tonight, but will tackle it first thing in the morning tomorrow. I gave up on it earlier tonight after spending several hours on it and came home to get some dinner and sleep. I appreciate your help with this and will post a reply as soon as I am able to. Dale

It is OK, as long as it is a PC that can burn CDs.

Then you will have a Bootable CD,   XP machines just make things a little tougher nowdays as they don't have the Repair options on boot that Vista and Win 7 has for the use of FRST.

 

Quads

Quads,

 

I was able to complete the scan and am attaching the OLT.txt file.  Thank you for your help with this.

 

Dale

 

Hi

 

Remove hard drive from infected computer and connect it to another PC. Then run Norton AntiVirus or ... use a big weapon -
ComboFix

 

OLT is for women, real men use ComboFix. :smileywink:

dalel,

 

Please stick with Quads' instructions.

 

Regards,

Kelly


lukaszn wrote:

Hi

 

Remove hard drive from infected computer and connect it to another PC. Then run Norton AntiVirus or ... use a big weapon -
ComboFix

 

OLT is for women, real men use ComboFix. :smileywink:


 

Yeah right, the amount of users that use Combofix or other tools and end up with Windows problems, then require us to try an repair the problem shows that you do not jump in with advanced tools, one user used a bootkit remover and the problem is still not fixed after like after 18 pages, due to using the tool.

I also see problems where people take out a Hard Drive without the likes of antistatic gear,  Companies don't cover warranties when the correct gear was not used.

 

Quads

DDue to the fact it is an old version of OTL on the boot CD all I want to do is break the ransom, so we have Normal Mode available when booting Windows on the Hard Drive.

 

 

Start OTL, (OTLPE, using CD)  under   Copy and paste the custom script attached which you open in for instance Notepad,(include the : at the start of :OTL and all the way to the end / bottom)  and run the script. (Red Run Fix Button)

 

The output log, should be placed in the C:\ _OTL folder after.

 

Quads

Quads,

 

That fix seems to have worked, allowing me to boot into windows in normal mode.  I am attaching the log if you need it.  It is located in c:\_OTL\Moved Files and there is a 10525012_021757 folder in there as well with two files that seem to have been moved (irb700.exe and security.exe).  What is the next step?

 

Thanks,

 

Dale

OK, in Normal Mode from now on

 

Please read carefully Read all of this message first

 

Already Downloaded.


  • Ensure that Combofix is saved directly to the Desktop <--- Very important  (Not in the Download(s) or Temp folders)

  • Disable all security programs as they will have a negative effect on Combofix, Disabled for say 1 hour or more.
  • Close any open browsers and any other programs you might have running

 

Right click the combofix.exe on the desktop and select from the menu "Run as Administrator"

 

  • If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
  • When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review


****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze ****

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

*EXTRA NOTES*

  • If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
  • If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
  • If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)

 

Quads

Quads,

 

Attached is the combofix log.

 

Thank you,

 

Dale

I couldn't quite believe the number OTL was stating "[1753 C:\*.tmp files -> C:\*.tmp -> ]"  until I saw the combofix log.

 

Please read carefully and follow these steps.


Download TDSSKiller from http://support.kaspersky.com/faq/?qid=208280684  click on the TDSSkiller.exe green link.

 

Double click on TDSSKiller.exe to run the application,

Open the Change Parameters option and select the detect TDL File system

 

TDSSKiller Parameters.jpg

 

Click OK

 

Then on Start Scan.


If an infected file is detected, the default action will be Cure, click on Continue.
If a suspicious file is detected, the default action will be Skip, click on Continue.

 

Look for the Filesystem detection

 

TDSSFS.jpg


It may ask you to reboot the computer to complete the process. Click on Reboot Now.


If no reboot is require, click on Report. A log file should appear. Please copy and paste into Notepad and attach back here.
If a reboot is required, the report can also be found in your root directory, (usually C:\ ) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please attach the log in the post back.

 

Quads

Done!  Three files found and put into quarantine.

 

 

You ticked the wrong parameter

 

Quads

Hmmm....I had the top three checked and the "Additional Options", had only "Detect TDLFS file system" checked.  Am I missing something?

Log shows you accidently did this

 

02:01:21.0140 3492 Scan started
02:01:21.0140 3492 Mode: Manual; SigCheck;

 

Instead of  (from one of my tests with malware

 

21:33:34.0457 2108 Scan started
21:33:34.0457 2108 Mode: Manual; TDLFS;

 

Quads

OK, well I ran it again...didn't find anything.  Of course, the three other files are in quarantine