In the last couple of weeks I've serviced several machines that had an 
"internet speed monitor" spyware installed file names were something like 
issm.exe. The files were in a subfolder of %ProgramFiles%. Of course this 
malware never seems to travel alone. It generally starts off with some sort of 
trojan that downloads more material into the computer and it only gets hairier 
from there. Additions to the Run keys in the registry are a given, along with 
addons to Internet Explorer's list of browser helper objects and toolbars.

My kit of goodies for eliminating infections from computers consists of the 
following:

Autoruns (use this instead of msconfig.exe)
http://www.microsoft.com/technet/sysinternals/Utilities/AutoRuns.mspx

HijackThis (conveniently displays reg entries that pertain to IE and startup 
apps)
http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis

EZPCFix (displays various settings of registry, can purge temp directories, 
etc.)
http://www.ezpcfix.net/

LSPFix (manage your Layered Service Providers. eliminate NewDotNet, 3rd party 
firewall, etc)
http://cexx.org/lspfix.htm

WinsockXPFix by Option^Explicit (repairs/rebuilds winsock settings in 
Win9x,2K,&XP)
no official site im aware of, available on various file mirrors, google is your 
friend

plus everything I mentioned previously (SmitRem, SDFix, AVG, Ad-aware, etc.)

I would highly recommend you roll your own copy of the "Ultimate Boot CD 4 
Windows". It's a customized Bart PE bootable CD with just about every 
maintenance tool a techie would need, including most of the ones I've 
mentioned. Be sure you update the definitions for the virus scanners before 
creating the disc. You can use this cd to boot into a clean Windows environment 
that is loaded into the system memory. Go to http://www.ubcd4win.net for more 
info and the download links.

Right now the trickiest things for me to find on my own are the malware that 
are installing themselves as drivers in the Services area of the registry. 
These entries won't be detected by the likes of HijackThis. This is where SDFix 
and Combofix have been saving my bacon.


I always do a manual analysis of the following registry keys:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
   ..\RunOnce
   ..\runservices
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
   ..\RunOnce
   ..\RunEx\
   ..\runservices
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon


When hunting for infected files I find that they tend to be in these folders:

%systemdrive%
%systemroot%
%systemroot%\system32
%systemroot%\system32\drivers
%temp%
%programfiles%

A good way to identify them is when the file has a modified/creation date that 
is very recent. The exe and dll files often lack a version tab when you check 
the file properties.

Files that can't be deleted because they are already active can sometimes be 
removed after you disable the read&execute attribute in the security 
permissions on the file. This only works on NTFS partitions.

If you are ultimately successful in disabling the autostart of the malware then 
you can rely on the use of multiple AV and Malware scanners to handle any 
residue you couldnt find on your own. Good luck.

-Tharin O.

FP <[EMAIL PROTECTED]> wrote:       some of these I had, the combofix did not. 
got my  permissions bad. So far so good, looks like it might fly. Still had a 
persistant  ( internet speed control ) or something to that affect. 
superspyware remover  seems so far to have got that.  I may still install my 
webroot sw and do  another scan. running more av scans. gpedit is still defunc 
but no  biggy.
  
 thanks
 fred
    ----- Original Message ----- 
   From:    Tharin Olsen    
   To: The Hardware List 
   Sent: Tuesday, October 02, 2007 12:57    PM
   Subject: Re: [H] restoring policy's    ?
   

Download any of the tools below. I think the first two, SDFix    and ComboFix, 
are the most recent. Essentially they are self-extracting    archives with 
batch scripts that will reset the changed policy settings, scan    for various 
trojans and malware, then give you a final report when its over.    If you 
understand what details the report has it can clue you in on whether    there 
is more material that needs to be dealt with. Run them while in safe    mode.

SDFix
http://downloads.andymanchesta.com/RemovalTools/SDFix.exe

ComboFix
http://download.bleepingcomputer.com/sUBs/ComboFix.exe

SmitFraudFix
http://siri.urz.free.fr/Fix/SmitfraudFix_En.php

SmitRem
http://noahdfear.geekstogo.com/

If    its reeeaally messed up I'd recommend pulling the drive and scanning it 
with a    good computer with hopefully several antivirus tools i.e. AntiVir, 
AVG, Avast,    Panda, etc. And also sweep the drive with more than one Malware 
scanner like    Ad-aware, Spybot Search & Destroy, AVG AntiSpyware, or Webroot. 
Then    re-run one of the tools I posted the links for. If those steps dont 
take care    of it it may be better to just format and start over.

-Tharin    O.

FORC5 <[EMAIL PROTECTED]> wrote:   Have      a REALLY screwed up one. Spyware 
or something has basically locked out      everything. While I did get the 
control panel back none of the applets run.      gpedit.msc says file not found.

can not manage users. Was able to fix      this a little and it is better but 
some of this needs to be restored. I      suspect a whole system restore is 
needed to be honest but I always respect a      challenge. :-D

Any suggestions will be helpful. ( or tools      )
fp

-- 
Tallyho ! ]:8)
Taglines below !
--
Nobody      home but the lights, and they're out  too.



Reply via email to