We had missed a TV program from the previous day, so
After the boot was complete, we tried to go back and watch the program. Google appeared to work ok, but clicking the link returned a 404 not found error.
It took a few minutes to realize that some links were returning 404 errors and that others were being redirected to ad sites. When I manually entered the url's in the browser's address bar the sites displayed as expected. The only "obvious" problem was that the Google links were no longer working.
Using various tools (described below), I was able to determine that all requests to Google and all clicks on the search results were being sent to a site in Germany.
18 hours later, the virus was gone (thanks to TDSSKiller) and the system was working correctly. (Well, its Windows .. so I just have to assume it was ok.)
Background
At any rate, the automatic re-boot took an extremely long time. My initial analysis found that over 7,800 files were created during the reboot. It is possible that these were created by the Microsoft Search Indexer (a parasite that has no way to turn it off). But there is no way to know for sure. I was surprised that many of the "files" actually listed the files in various sub-directories.
The system started producing a number of error boxes similar to the following
winpeshl.exe failed to execute |
Since that was a new error, I tried to locate it on the hard drive - no such file. (It was also not found on Windows XP systems.)
Using Process Explorer, I noticed that one of the svchost.exe processes (there are several) kept starting and stopping .. and that it was running winrscmde. When I searched for a file named winrscmde, it also did not exist on the drive. This (fake) version of svchost.exe was being run by the Task Scheduler Engine associated with network access.
C:\Windows\System32\taskeng.exe |
However, there was another "weird" - svchost.exe is normally located at
C:\WINDOWS\system32\svchost.exe |
C:\WINDOWS\svchost.exe |
Not only that, when I looked (via Properties in Windows Explorer) its internal name was winrscmde.
Initial Attempt
When booting to Safe Mode (press F8 before the Windows logo is displayed), there was an option to restore the system to an earlier state. When I selected that, the following error was displayed
winpeshl.exe failed to execute |
After another reboot, I got to Safe Mode and ran System Restore again .. it worked (completed), but it still did not fix the system.
After the problem was fixed (see below), booting to Safe Mode no longer provides the same menu options. Specifically, the system restore option is not available. I assume (but do not know) that the virus somehow change the Safe Mode options.
Agent Ransack
(I later discovered that Agent Ransack has a recursion problem with certain Vista directories. I consider this to be a Vista design problem and not a problem with a legacy program that functioned without failure on Windows XP.)
The newer versions of Agent Ransack allow you to limit searches by either date changed (the default) or the date created (available via the Date tab). (This is perhaps the best, if not only, reason to upgrade.) When I filtered the search by creation date, it located
Creation Date Changed Date C:\WINDOWS\svchost.exe 3/19/12 1/20/08 |
Windows Defender
Control Panel / Administrative Tools / Computer Management Event Viewer / Windows Logs / System |
Windows Defender Real-Time Protection agent has detected changes. Microsoft recommends you analyze the software that made these changes for potential risks.
Scan ID: {F2BA7D8B-4BC4-4F36-9E4A-2E5233858735} Name: Trojan:Win32/Alureon.FO ID: 170134 Severity ID: 5 Alert Type: Spyware or other potentially unwanted software Detection Type: Heuristics |
So .. Windows Defender found
Trojan:Win32/Alureon.FO |
"potentially unwanted software" |
This was no trojan. I did not download and run some software. All I did was to use a web browser. (Yes - I know that these download and run javascript programs, but that is not the definition of a trojan.) At any rate, Microsoft provides explicit details on the Win32/Alureon family of bad software. I went through all the suggested changes - none of those applied to my system.
TCPView
To debug this, I booted into Safe Mode (mainly so that all the other crap would not be running) and ran TCPView (by System Internals) to see what ip addresses the system was connecting to. I discovered that requests to Google were going to
85.195.93.243 |
At this point, I modified my router to permanently block that address. Now, none of the computers on the local network can get to that address.
On the router, under Setup / Advanced Routing, I set all accesses to 85.0.0.0 / 255.0.0.0 to redirect to one of my local machines. (The router would not let me redirect the accesses to the real Google server.) This completely blocked all access to the foreign server. (It would have been smarter to just block 85.195.93.243 / 255.255.255.255) I was able to verify the block using ping.
Attempts to search Google for that IP address (on a separate machine) returned little information - lots of other people were having similar problems, but there were no solutions. One of the infected systems was running Ubuntu 12.04.
File Locking
c:\windows\svchost.exe |
c:\windows\sysWOW64\winrshost.exe |
c:\windows\svchost.exe |
At this point, I replaced c:\windows\svchost.exe with a different program with its ReadOnly attribute set. The system was no longer able to replace the file, the replacement file was never executed, and the other problems did NOT go away.
TDSSKiller
c:\windows\sysWOW64\winrshost.exe |
c:\windows\svchost.exe |
Since this virus had infected the Master Boot Record, this crap was loaded before Windows started. As a result, it had complete control of the system. That might also explain how a Ubuntu (Linux) system could become infected.
Notes
When 404 errors were not returned, some of the clicks went to the following sites.
Yes, we changed all the passwords of everything. I hope we did it before any damage was done.
Remember - your systems are vulnerable. It does not matter if you are running virus protection or not. Knowledge and perseverance are your only protection.
Author: Robert Clemenzi