A stubborn case of Win32:DNSChanger-VJ [Trj]

O’, sagacious malware slayers, I seek counsel.

The fiend Win32:DNSChanger-VJ [Trj] has seized a hold upon my system, and regardless of updated virus definitions, will not gracefully face banishment. Thrice upon the hour, Avast shields me, and guards against it attempting to subvert System32/Services.exe to its own vile means. I seek now more subtle and effective means of vanquishing the foe, and have attached to my plea logs of rootkit and OTL.

I await your wisdom.

I’m not sure if I got the logs right, though. I could really use a hand here. Thanks for the help in advance.

Additionally, the rootkit log.

hey and welcome to the forum. an malware expert will check those logs and give you further instruction on how to proceed.

i would suggest you have a go with malwarebytes antimalware also and see if that can find anything.

http://filehippo.com/download_malwarebytes_anti_malware/

i would suggest you have a go with malwarebytes antimalware also and see if that can find anything.
he already have it.....as seen in the OTL log ;) the aswMBR log say siref rootkit......and MBAM does not kill that.....yet

Ok this is the new variant so I am still gently feeling my way around it… Therefore it may take a little longer than normal

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Be advised that when the fix commences it will shut down all running processes and you may lose the desktop and icons, they will return on reboot

If you have Malwarebytes 1.6 or better installed please disable it for the duration of this run
To disable MBAM
Open the scanner and select the protection tab
Remove the tick from “Start with Windows”
Reboot and then run OTL

http://i1224.photobucket.com/albums/ee362/Essexboy3/mbamstop.jpg

Run OTL

[*]Under the Custom Scans/Fixes box at the bottom, paste in the following

:OTL IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = 127.0.0.1:9421; O2 - BHO: (no name) - {88c7f2aa-f93f-432c-8f0e-b7d85967a527} - No CLSID value found. O3 - HKLM\..\Toolbar: (no name) - {88c7f2aa-f93f-432c-8f0e-b7d85967a527} - No CLSID value found. O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {88C7F2AA-F93F-432C-8F0E-B7D85967A527} - No CLSID value found. O4 - Startup: C:\Users\Christian Diez\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gdii.lnk = File not found O4 - Startup: C:\Users\Christian Diez\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gdii.lnk = File not found

:Files
ipconfig /flushdns /c
C:\Windows\assembly\GAC_32\Desktop.ini
C:\Windows\assembly\GAC_64\Desktop.ini

:Commands
[purity]
[resethosts]
[emptytemp]
[CREATERESTOREPOINT]
[Reboot]


[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done
[*]Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

THEN

Download the latest version of TDSSKiller from here and save it to your Desktop.

[*]Doubleclick on TDSSKiller.exe to run the application

http://dl.dropbox.com/u/73555776/TDSSFront.JPG

[*]Then click on Change parameters.

http://dl.dropbox.com/u/73555776/TDSSConfig.JPG

[*]Check the boxes beside Verify Driver Digital Signature and Detect TDLFS file system, then click OK.

[*]Click the Start Scan button.

[*]If a suspicious object is detected, the default action will be Skip, click on Continue.

http://dl.dropbox.com/u/73555776/TDSSFound.JPG

[*]If malicious objects are found, they will show in the Scan results and offer three (3) options.
[*]Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

[*]Get the report by selecting Reports

http://dl.dropbox.com/u/73555776/TDSSEnd.JPG

[*]Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

Please copy and paste its contents on your next reply.

FINALLY

Download and Install Combofix

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

  • IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here

[*]Double click on ComboFix.exe & follow the prompts.
[*]Accept the disclaimer and allow to update if it asks

http://img.photobucket.com/albums/v706/ried7/NSIS_disclaimer_ENG.png

http://img.photobucket.com/albums/v706/ried7/NSIS_extraction.png

[*]When finished, it shall produce a log for you.
[*]Please include the C:\ComboFix.txt in your next reply.

Notes:

  1. Do not mouse-click Combofix’s window while it is running. That may cause it to stall.
  2. Do not “re-run” Combofix. If you have a problem, reply back for further instructions.
  3. If after the reboot you get errors about programmes being marked for deletion then reboot, that will cure it.

Please make sure you include the combo fix log in your next reply as well as describe how your computer is running now

I ran TDSSKiller and then, after turning off Avast, Combofix. The latter failed to produce a log but here’s what I’ve got off TDSSKiller.

Also, aside from Avast going off for two instances of shenanigans, an injector and DNSChanger again aimed at System32/Services.exe, my computer has been running fine. Though before Combofix, there wasn’t an injector warning. I also haven’t particularly strained the rig since this started popping up.

OK lets try this

First delete combofix from your desktop

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Be advised that when the fix commences it will shut down all running processes and you may lose the desktop and icons, they will return on reboot

If you have Malwarebytes 1.6 or better installed please disable it for the duration of this run
To disable MBAM
Open the scanner and select the protection tab
Remove the tick from “Start with Windows”
Reboot and then run OTL

http://i1224.photobucket.com/albums/ee362/Essexboy3/mbamstop.jpg

Run OTL

[*]Under the Custom Scans/Fixes box at the bottom, paste in the following

:OTL NetSvcs:64bit: Sharedaccess - C:\Windows\SysNative\svchost.exe (Microsoft Corporation)

:Files
ipconfig /flushdns /c

:Commands
[emptytemp]
[CREATERESTOREPOINT]
[Reboot]


[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done
[*]Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

THEN

Download a fresh copy of Combofix but save the programme as Gotcha

Download ComboFix from one of the following locations:
Link 1
Link 2

Here’s the OTL log I had upon successful reboot. Without the option to return to previous successful boot, I wouldn’t even have been able to enter safe mode. I ran Combofix from my desktop, renamed to Gotcha, but was again unable to find any kind of log from it.

Now Avast is blocking 7 malicious URLs in addition to any injectors or DNSChangers.

Hmm this is a hard one, I think I have determined the launch point but it may have a protective driver with it

Could you re-run OTL please with the following custom scan

[*]Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
[*]Select All Users
[*]Under the Custom Scan box paste this in
netsvcs
%SYSTEMDRIVE%*.exe

OK it appears that that I may need to disable your cd emulator

Please download DeFogger and save it to your desktop.

[*]Once downloaded, double-click on the DeFogger icon to start the tool.
[*]The application window will appear.
[*]You should now click on the Disable button to disable your CD Emulation drivers.
[*]When it prompts you whether or not you want to continue, please click on the Yes button to continue.
[*]When the program has completed you will see a Finished! message. Click on the OK button to exit the program.
[*]If CD Emulation programs are present and have been disabled, DeFogger will now ask you to reboot the machine. Please allow it to do so by clicking on the OK button.

THEN

Please retry Combofix

Following the instructions of that post, I ran defogger, got the linked log (that exceeds forum attachment size) and rebooted. Avast then warned me of a suspicious program opening which I denied, upon reboot. The program is currently stopping Combofix from finishing an operation. I’m receiving the following error.

Error opening file for writing:

C:\32788R22FWJFW\License\iexplore.exe

Click Abort to stopt he installation,
Retry to try again, or
Ignore to skip this file.

Then with the lit buttons Abort, Retry and Ignore.

Here is the defogger log.
http://dl.dropbox.com/u/24972563/defogger_disable.log

When combofix is reunning please do not allow Avast to sandbox/delete/quarantine anything. Some of the routines used by Combofix are similar to malware although in this case are benign

I’m getting warnings about the DNSChanger trying to inject system32/services.exe every 5-20 minutes. Should I really turn off Avast for the scan?

IN that case no as it sounds like it may be a file type infector

Can you burn a CD ?

Please download the following programmes to your desktop:

Dr Web Live CD

ImgBurn

Install IMGBurn

[]Double click Dr Web
[
]IMGBurn will open
[*]Burn the ISO to a cd

[]Reboot the infected computer with the CD in the drive
[
]Ensure that the first boot device is CD - If you are not sure about that then see this page for instructions
[*]As loading starts, a dialogue window will prompt you to choose between the standard and safe modes.

http://i1224.photobucket.com/albums/ee362/Essexboy3/Dr%20Web%20shots/livecdbootscreen.gif

[*]Use arrow keys to select DrWeb-LiveCD (Default)

[*]When the system is loaded, check the disks or folders you want to scan, and click on “Start”.

http://i1224.photobucket.com/albums/ee362/Essexboy3/Dr%20Web%20shots/livecdDriveselection.gif

[]The programme will now scan for and cure/delete any malware that it finds. Allow it to do so
[
]Once completed reboot to normal windows
[*]No log is produced so once in normal windows run a fresh OTL scan and let me know if the problems persist